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") setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) setsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$DRM_IOCTL_AGP_ENABLE(r4, 0x40086432, &(0x7f0000000340)=0x8) setreuid(0xee00, r2) 12:14:41 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, 0x0) 12:14:41 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, 0x0, 0x0) 12:14:41 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', 0x0, 0xffffffffffff24c6, 0x5, &(0x7f00000004c0)=[{&(0x7f00000001c0)="906d", 0x2, 0x81}, {&(0x7f0000000200)="94c175bb2dc86d0978237410747077eb4def97fea3ec6e0bef8a698f7fde", 0x1e, 0x4}, {&(0x7f0000000240)="84c738fac8d727e5a91f5a2d238ea18c75b776fef21dff21ea13baf78122e9fcc46abef689508fb5466f5f5b30d86ec4a518563240a82cef54604b84fca429077cb2279ffd5cf3d9be8d357911dc3085a5ec42f20d3305e4b1c903333e6c943b6e0b75012bdcde7737f0ffd6c9cff77d4f7d9c2334b95ac54bf755df67299677789135bbdaad04a5852079b172a5460a98f038a2c920359fbcc670ba55eac846ba57d5b9daa822", 0xa7, 0x6}, {&(0x7f0000000300)="0a79d9868c3b28485c684bc317", 0xd, 0x3}, {&(0x7f0000000340)="e12316129edd1bec6839f0695c656f3d39eb5953e07dcc93ab7cd644da3a54bae01eae97d914685c3dbcc245a11e8afc3ccec207856b1242db68b78407e96e60d94eb0759da1716179d4810ad137f3aaa7a40f866c462a969cbee45c281b5604e7ca64e3ebab533ba85f01054635775673f843e6dd17d285b525dc6a284dc06ec9d0f24f145cdb199994dfdd9d73eea5fa6428a26119e391a6e85794ce107fc4890167f5f75db1", 0xa7, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)={[{@nodatacow='nodatacow'}], [{@hash='hash'}]}) 12:14:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x2}, 0x0) 12:14:41 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, 0x0) 12:14:41 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, 0x0, 0x0) 12:14:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$can_raw(r1, &(0x7f0000000380)={&(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000240)=""/133, 0x85}], 0x2, &(0x7f0000000340)=""/58, 0x3a}, 0x40010141) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000000)={0x2, [0x5, 0x7]}, 0x8) r4 = socket(0x10, 0x3, 0x0) r5 = socket(0x11, 0x800000003, 0x0) ioperm(0x7e9b660d, 0x4, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000400)=0x14) sendmsg$nl_route_sched(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@newqdisc={0x34, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9, 0x1, 'cake\x00'}, {0x4}}]}, 0x34}}, 0x0) 12:14:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x41, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000180)=0x20) r1 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) setsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)) accept4$ax25(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x80800) setreuid(0xee00, r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) munmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000) r5 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r5, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) getsockopt$inet_int(r5, 0x0, 0x30, &(0x7f0000000200), &(0x7f0000000240)=0x4) ioctl$DRM_IOCTL_SET_VERSION(r4, 0xc0106407, &(0x7f00000001c0)={0x100, 0x3, 0x6, 0xb9}) 12:14:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) setsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) setreuid(0xee00, r1) r3 = socket$inet(0x2, 0x3, 0x7) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r4, 0x84, 0x0, &(0x7f0000000000)={r6}, &(0x7f0000000040)=0x10) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000240)=@assoc_id=r6, 0x4) setsockopt$ARPT_SO_SET_REPLACE(r3, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) r7 = accept(r3, &(0x7f0000000100)=@l2tp={0x2, 0x0, @initdev}, &(0x7f0000000180)=0x80) ioctl$sock_inet_SIOCDARP(r7, 0x8953, &(0x7f00000001c0)={{0x2, 0x4e23, @loopback}, {0x6, @remote}, 0x28, {0x2, 0x8, @private=0xa010101}, 'veth1\x00'}) 12:14:41 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [{0x20, ','}], 0xa, "2e131e8cdc1ed8ae396c16c6c6198f77a729a0289629848bc32259feb6813b7044b614d5d51736ef22b20590c840cc46f8de3d2977b4964ddfa0f51bd3d12facb08366b97a82441bd1f1e9f00291310cbe6a1ca3ba4809ff49399ba605c328c028bd79d6a772b72f7010ad795deeebf815a2f49144bdc2584642afb162ca31ea0d021949f97a5f79"}, 0x95) 12:14:41 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f00000001c0)="906d", 0x2, 0x81}, {&(0x7f0000000200)="94c175bb2dc86d0978237410747077eb4def97fea3ec6e0bef8a698f7fde", 0x1e, 0x4}, {&(0x7f0000000240)="84c738fac8d727e5a91f5a2d238ea18c75b776fef21dff21ea13baf78122e9fcc46abef689508fb5466f5f5b30d86ec4a518563240a82cef54604b84fca429077cb2279ffd5cf3d9be8d357911dc3085a5ec42f20d3305e4b1c903333e6c943b6e0b75012bdcde7737f0ffd6c9cff77d4f7d9c2334b95ac54bf755df67299677789135bbdaad04a5852079b172a5460a98f038a2c920359fbcc670ba55eac846ba57d5b9daa822", 0xa7, 0x6}, {&(0x7f0000000300)="0a79d9868c3b28485c684bc317", 0xd, 0x3}, {&(0x7f0000000340)="e12316129edd1bec6839f0695c656f3d39eb5953e07dcc93ab7cd644da3a54bae01eae97d914685c3dbcc245a11e8afc3ccec207856b1242db68b78407e96e60d94eb0759da1716179d4810ad137f3aaa7a40f866c462a969cbee45c281b5604e7ca64e3ebab533ba85f01054635775673f843e6dd17d285b525dc6a284dc06ec9d0f24f145cdb199994dfdd9d73eea5fa6428a26119e391a6e85794ce107fc4890167f5f75db1", 0xa7, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)={[{@nodatacow='nodatacow'}], [{@hash='hash'}]}) 12:14:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x3}, 0x0) [ 1102.883755][T30035] QAT: Invalid ioctl 12:14:41 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, "2e131e8cdc1ed8ae396c16c6c6198f77a729a0289629848bc32259feb6813b7044b614d5d51736ef22b20590c840cc46f8de3d2977b4964ddfa0f51bd3d12facb08366b97a82441bd1f1e9f00291310cbe6a1ca3ba4809ff49399ba605c328c028bd79d6a772b72f7010ad795deeebf815a2f49144bdc2584642afb162ca31ea0d021949f97a5f79"}, 0x93) 12:14:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r1, 0xfffffffffffffff9, 0xfffffffffffffffa, 0x5, 0x7fff}) r2 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) setsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) r4 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video36\x00', 0x2, 0x0) ioctl$int_in(r4, 0x5452, &(0x7f00000001c0)=0x400) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r5, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) getsockopt$sock_int(r5, 0x1, 0x2c, 0xfffffffffffffffe, &(0x7f0000000100)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)) setreuid(0xee00, r3) 12:14:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f0000000100)=0x1) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="3c00000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000002900010063616b65000000000c00000008000a0001c20000"], 0x3c}}, 0x0) 12:14:41 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:14:41 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f00000001c0)="906d", 0x2, 0x81}, {&(0x7f0000000200)="94c175bb2dc86d0978237410747077eb4def97fea3ec6e0bef8a698f7fde", 0x1e, 0x4}, {&(0x7f0000000240)="84c738fac8d727e5a91f5a2d238ea18c75b776fef21dff21ea13baf78122e9fcc46abef689508fb5466f5f5b30d86ec4a518563240a82cef54604b84fca429077cb2279ffd5cf3d9be8d357911dc3085a5ec42f20d3305e4b1c903333e6c943b6e0b75012bdcde7737f0ffd6c9cff77d4f7d9c2334b95ac54bf755df67299677789135bbdaad04a5852079b172a5460a98f038a2c920359fbcc670ba55eac846ba57d5b9daa822", 0xa7, 0x6}, {&(0x7f0000000300)="0a79d9868c3b28485c684bc317", 0xd, 0x3}, {&(0x7f0000000340)="e12316129edd1bec6839f0695c656f3d39eb5953e07dcc93ab7cd644da3a54bae01eae97d914685c3dbcc245a11e8afc3ccec207856b1242db68b78407e96e60d94eb0759da1716179d4810ad137f3aaa7a40f866c462a969cbee45c281b5604e7ca64e3ebab533ba85f01054635775673f843e6dd17d285b525dc6a284dc06ec9d0f24f145cdb199994dfdd9d73eea5fa6428a26119e391a6e85794ce107fc4890167f5f75db1", 0xa7, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)={[{@nodatacow='nodatacow'}], [{@hash='hash'}]}) 12:14:41 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0'}, 0xb) 12:14:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x4}, 0x0) [ 1103.040123][T30053] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 12:14:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8, 0x0, {0x8030000}}, {0x28}}}}, 0x440) setsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)) setreuid(0xee00, r1) 12:14:41 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0'}, 0xb) [ 1103.146980][T30062] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 12:14:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) r4 = socket$inet(0x2, 0x3, 0x7) r5 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r5, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) setsockopt$ARPT_SO_SET_REPLACE(r5, 0x0, 0x60, &(0x7f0000000400)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) bind(r4, &(0x7f0000000080)=@l2={0x1f, 0x101, @any, 0x1000}, 0xd) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x8) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="407a6b76a845c4b9ab00"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff000000000900010063616b65000000000c00020008000a0001c20000"], 0x3c}}, 0x0) 12:14:42 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2000001, &(0x7f0000000400)={[{@nodatacow='nodatacow'}], [{@hash='hash'}]}) 12:14:42 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0'}, 0xb) 12:14:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x5}, 0x0) 12:14:42 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{&(0x7f00000001c0)="906d", 0x2, 0x81}, {&(0x7f0000000200)="94c175bb2dc86d0978237410747077eb4def97fea3ec6e0bef8a698f7fde", 0x1e, 0x4}, {&(0x7f0000000240)="84c738fac8d727e5a91f5a2d238ea18c75b776fef21dff21ea13baf78122e9fcc46abef689508fb5466f5f5b30d86ec4a518563240a82cef54604b84fca429077cb2279ffd5cf3d9be8d357911dc3085a5ec42f20d3305e4b1c903333e6c943b6e0b75012bdcde7737f0ffd6c9cff77d4f7d9c2334b95ac54bf755df67299677789135bbdaad04a5852079b172a5460a98f038a2c920359fbcc670ba55eac846ba57d5b9daa822", 0xa7, 0x6}, {&(0x7f0000000300)="0a79d9868c3b28485c684bc317", 0xd, 0x3}, {&(0x7f0000000340)="e12316129edd1bec6839f0695c656f3d39eb5953e07dcc93ab7cd644da3a54bae01eae97d914685c3dbcc245a11e8afc3ccec207856b1242db68b78407e96e60d94eb0759da1716179d4810ad137f3aaa7a40f866c462a969cbee45c281b5604e7ca64e3ebab533ba85f01054635775673f843e6dd17d285b525dc6a284dc06ec9d0f24f145cdb199994dfdd9d73eea5fa6428a26119e391a6e85794ce107fc4890167f5f75db1", 0xa7, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)={[{@nodatacow='nodatacow'}], [{@hash='hash'}]}) 12:14:42 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, "2e131e8cdc1ed8ae396c16c6c6198f77a729a0289629848bc32259feb6813b7044b614d5d51736ef22b20590c840cc46f8de3d2977b4964ddfa0f51bd3d12facb08366b9"}, 0x4f) 12:14:42 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:14:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) socket$can_j1939(0x1d, 0x2, 0x7) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) io_uring_register$IORING_UNREGISTER_FILES(r5, 0x3, 0x0, 0x0) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="3c00000024000b0f00"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff000000000900010063616b65000000000c00020008592d0001c20000"], 0x3c}}, 0x0) 12:14:42 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0'}, 0xb) 12:14:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x6}, 0x0) 12:14:42 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2000001, &(0x7f0000000400)={[{@nodatacow='nodatacow'}], [{@hash='hash'}]}) 12:14:42 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x7, 0x20200) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9, 0x1, 'cake\x00'}, {0xc, 0x2, [@TCA_CAKE_DIFFSERV_MODE={0x8, 0x3, 0xc201}]}}]}, 0x3c}}, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000e80)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000e40)={&(0x7f0000000740)={0x6f0, 0x0, 0x8, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_DEBUG_HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_DEBUG_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x130, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0xa4, 0x3, 0x0, 0x1, [{0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '$\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '}&#})!#\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x1a, 0x2, '/proc/capi/capi20ncci\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '^]/.%\\}\''}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ':\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7ff}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/audio#\x00'}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}, @ETHTOOL_A_BITSET_MASK={0x77, 0x5, "126eec359bcf1cbe1b874c8cc37a3de06557494b5bd3c65868f4c300a2f18bcc379ff08a7ecc03218674912256802ee407bc400f4e4c72aaf2cd66176e3778d3a979ce8b2f5027c6bc1f202d797f15d2c9ec6d9df9c420400d8fe1399bd7de89f032499059681f9d487d35131562d8abfc8170"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x148, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}, @ETHTOOL_A_BITSET_VALUE={0xc, 0x4, "355e5a27391aa488"}, @ETHTOOL_A_BITSET_BITS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xd05a}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_BITS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '@\\,$%@\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x3d, 0x5, "d4b3b80b4bd318b558f5775aa719b2fe472fbc2fc4daf69fcc1681ff4e09417f6a3175c591daf03855fc4b8b781fce5150ee33118347bab701"}, @ETHTOOL_A_BITSET_MASK={0x5e, 0x5, "e01be0e7b450ea14f96268249074083cb85ec9a27c0fb20f3f59a3d6ec603d8e7d9b7aa8f2fb928499b63ac4df5e630fc8b0c48cd0fd4ba3a66da284bf8bd766b249659d1fc704279a0e9795a08fa8b420fc59dc2567096fb8dc"}, @ETHTOOL_A_BITSET_VALUE={0x4a, 0x4, "bd4b0f8c1ec7cc80841087eecec8e28585511dc23b1fefaca64856f4fa5f7d361c00ea96202ee08108bd35c916e407087f4b9f9340aeedaaf822c5b0aa47e9001d66d16707b7"}]}, @ETHTOOL_A_DEBUG_HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_DEBUG_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x38c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x3}, @ETHTOOL_A_BITSET_MASK={0xc2, 0x5, "e743bd7e5068f3f25f3f1a64272dc480fa71c1cc2a6e45a19f54bc3aeb7d1db81cb19d1a90daacb966e780e6f2bc45b66bf5def18f05fa9fb24c33773227287f83816b34e2ad1dc2e5c664cb1f012159568d3bfd792f1fa72f5fee02f4db43540eb647addb24303ad40203e7329ed96de270e06a1eff3d548a2071e86a1c8891b1eb6c05af076ebc4bfb32771f3fa01212c11764de8cee55dbdf087d535e6ffd6c51caa455cd784b7da87f0c914f934cb11d8ad92db0eec3a6d34b2b9fe1"}, @ETHTOOL_A_BITSET_VALUE={0x54, 0x4, "b2a16a6c3ad9452c12e90f4ce9c0e3133262d6df76ae52a515dca13d7dfa7e8263392a79d8ff5552306065ced937ffb44ecf6e07016789e2c33af866e5299a64bbadf2660b960255f221596586564de6"}, @ETHTOOL_A_BITSET_VALUE={0xea, 0x4, "775e9ce99e57812e9f40dc98867fdcde0aa65dc244d3dda4a75f1d18b5602c23b2eadc3007b78b3ac7fef24495c9c07265c6f34b56550038f45f9d2185a50fa52de0815778aac441476c3b916270b89bdffd323b9b32085651ed793fc70cc218cd1f6fc2d68c91fa0c4dc6283f6fa5603ec9d317aeadc54b9f69b4e7fdd41b13ed8f92209f9df465989ca8f263da6ac924e5e9e5b3acdad0766b45363497df3f6b608dddadfa687b3531cbbc35d38a0340e02719c51a1f1cb6ac4aaf294fe8c7ff1a60440d0e49906c48259b2d3a6bfab185c0478afe7c9ffb8e9c52e6904b6cc42217ecbe03"}, @ETHTOOL_A_BITSET_VALUE={0xd0, 0x4, "9b0f0f7140c0ff7413957690f68fcfda14b81dbb2e960ec47ac94edf83c245c0b12a1092118ffa7d64edc05a5271429a97887879e364cf09d5304203c308b36fd5aa2963c5cba498ab445dec2466957fcd1d5f21ee3ec3f0093d98beb745c89014e5e42909550d45d7721c860e72da803202c475d5ca7b50f4b7e3a671e1c826f82df343febfdcb578428270eb9b52c1c7f2bcd9d870f0fc96322e30808216d1a9e39a80de0d90b37af52a306212cbc799933a58cb18c12c39c263227d518f76710899e3269efe674b906b49"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x8f, 0x4, "2165b4b86b754b1b3e1e59015720d060f54ad513f10919737804e43045f7504644505c159e6438ca785671ab386f2084cdba90ee8f42e35b9ce0a1cad1de34b8e0a93139464f9163e7407f1e10648932f2b6251ca028d96338266b9cbae2e73fddb5aa6d137088cecc13c534d7af6741b711d72177d712b24688059cff916ef850df1488e6d9b36276e15f"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x3ff}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0x6f0}, 0x1, 0x0, 0x0, 0xc010}, 0x0) ioctl$SIOCPNDELRESOURCE(r0, 0x89ef, &(0x7f00000000c0)=0x8) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) socket$tipc(0x1e, 0x5, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000005, 0x10, r2, 0x1bc8f000) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f0000000400)=""/139, &(0x7f0000000140)=0x8b) setuid(0x0) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsgid(r4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r6) write$P9_RSTATu(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7c0000007d020000005100476278040000080100000001000000000000000000103209000000fdffffff7f0000000000000016002f7072b888c8606064095e3f37729c9d6f632f636170692f6361706932306e6363690008005e5d2f2e255c7d270000006a220016002f70726f632f636170692f6361706932306e6363", @ANYRES32=0x0, @ANYRES32=r4, @ANYRES32=r6], 0x7c) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x2040, 0x0) ioctl$TIOCL_PASTESEL(r2, 0x541c, &(0x7f0000000000)) 12:14:42 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0'}, 0xb) [ 1103.938057][T30105] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:14:42 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@nodatacow='nodatacow'}], [{@hash='hash'}]}) 12:14:42 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2000001, &(0x7f0000000400)={[{@nodatacow='nodatacow'}], [{@hash='hash'}]}) [ 1104.055899][T30114] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:14:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x8}, 0x0) 12:14:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010063616b65000000000c00020008000a0001c2000009eb3e09462381c6ff92aed1e47faa3b63594e454630032ff8cc9b1a637b9814ec6b1b54bed908b587ad6cfa802630b0ec99e0d9ae189088389d926d85fa79237b127aa3934ab3ec77a0426504ca247c17857a9ea28f7bbd6d3a0b7819ba62a8d173485bfc53729fdee7870b300cf4d278f862a28a4a231ba9d49c058dac48d5b0471c4d2cfec09dea10792294034165f677193ab0"], 0x3c}}, 0x0) 12:14:42 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0'}, 0xb) 12:14:43 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:14:43 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r3, 0x4b72, &(0x7f0000000280)={0x0, 0x0, 0x3, 0x100000, 0x0, &(0x7f0000000440)="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"}) ioctl$KDGKBDIACR(r3, 0x4b4a, &(0x7f0000000100)=""/147) r4 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r4, &(0x7f0000000140), 0x4924b68, 0x0) setsockopt$SO_J1939_SEND_PRIO(r4, 0x6b, 0x3, &(0x7f0000000080)=0x3, 0x4) r5 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt(r5, 0x10001, 0x40, &(0x7f00000001c0)=""/39, &(0x7f0000000200)=0x27) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r2, 0xc008551c, &(0x7f0000000040)={0xafb, 0x18, [0x5, 0x7c7, 0xfffffffd, 0x7fff, 0x0, 0xc7]}) 12:14:43 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, "2e131e8cdc1ed8ae396c16c6c6198f77a729a0289629848bc32259feb6813b7044b6"}, 0x2d) 12:14:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x1d, 0x2, 0x0) r4 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000180)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_read(r4, 0x3f, 0xa5, &(0x7f0000000240)=""/165) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x4c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x1, 0x81, 0x1000, 0x81, 0x0, 0xf6, 0x76, 0x2}}, {0x8, 0x2, [0xf6fa, 0x20]}}]}]}, 0x4c}}, 0x0) 12:14:43 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x9}, 0x0) 12:14:43 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:14:43 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0'}, 0xb) 12:14:43 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x1588, 0x11, 0x0, 0x170) [ 1104.853182][T30150] can: request_module (can-proto-0) failed. 12:14:43 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0xa}, 0x0) 12:14:43 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:14:43 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0'}, 0xb) 12:14:43 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0'}, 0xb) [ 1105.136561][T10050] usb 2-1: new high-speed USB device number 8 using dummy_hcd 12:14:44 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) 12:14:44 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0xb}, 0x0) 12:14:44 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, "2e131e8cdc1ed8ae396c16c6c6198f77a7"}, 0x1c) [ 1105.656474][T10050] usb 2-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 1105.665551][T10050] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1105.698651][T10050] usb 2-1: Product: syz [ 1105.711237][T10050] usb 2-1: Manufacturer: syz [ 1105.720449][T10050] usb 2-1: SerialNumber: syz 12:14:46 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0'}, 0xb) 12:14:46 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:14:46 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0xc}, 0x0) 12:14:46 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x1588, 0x11, 0x0, 0x170) 12:14:46 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) [ 1107.801083][T10050] usb 2-1: USB disconnect, device number 8 12:14:46 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0'}, 0xb) 12:14:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_G_EXT_CTRLS(r2, 0xc0205647, &(0x7f0000000180)={0x20000, 0x9b1, 0x101, 0xffffffffffffffff, 0x0, &(0x7f0000000140)={0x9a0901, 0x2, [], @p_u32=&(0x7f0000000100)=0x9}}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r5) fchown(r3, r5, 0xffffffffffffffff) r6 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0x10, 0x3, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000280)='mptcp_pm\x00') sendmsg$MPTCP_PM_CMD_SET_LIMITS(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x1c, r9, 0x1, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8}]}, 0x1c}}, 0x0) sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x60, r9, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_ADDR={0x34, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x5}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @loopback}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @broadcast}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @broadcast}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}]}, 0x60}, 0x1, 0x0, 0x0, 0x4040000}, 0x20000000) r10 = socket(0x11, 0x800000003, 0x0) bind(r10, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r7, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r11, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9, 0x1, 'cake\x00'}, {0xc, 0x2, [@TCA_CAKE_DIFFSERV_MODE={0x8, 0xa, 0xc201}]}}]}, 0x3c}}, 0x0) 12:14:46 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0xf}, 0x0) 12:14:46 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0'}, 0xb) 12:14:46 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:14:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010063616b65000000000c00020008000a0001c20000ea9a815cfa97825c3d1254273b517e33adc1886b7bcbde7d78b07404408ee57ab345ce91997633eb0773bec327d653367e07daf46088ac6d1ad89a66df58ca30a97f38d2228a5aff0ffba55f5ed045a15e20bf3fdc0e45dc5857777165b234db50b687f1d7e390399f6539351470e031e4b70562427e62f2de80d2c3792a506ab386b930e332cd4fa1fb636d6b619342385ff8245e29309495a79506882afe35f7cfebe6f8ec5d1580ba6c8484f414de23001005db6a8f89810250efbc262ce0e1655f00"], 0x3c}}, 0x0) 12:14:46 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, "2e131e8cdc1ed8ae39"}, 0x14) 12:14:46 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) 12:14:46 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x10}, 0x0) 12:14:47 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) 12:14:47 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x1588, 0x11, 0x0, 0x170) 12:14:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r3, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) ioctl$F2FS_IOC_GARBAGE_COLLECT(r3, 0x4004f506, &(0x7f0000000100)=0x1) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="3c00000024000700000002000000d29a20200020", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000900010063616b65000000000c008100e6ff0a0001c20000"], 0x3c}}, 0x0) 12:14:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x11}, 0x0) 12:14:47 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:14:47 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) 12:14:47 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) 12:14:47 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, "2e131e8cdc"}, 0x10) 12:14:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x12}, 0x0) 12:14:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000100)={0x1, 0x2, 0x1, 0x7ff, 0x40, "3c07c51c3ee345b64482142feb6f38ef7773d0", 0x6, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1d, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9, 0x1, 'cake\x00'}, {0xc, 0x2, [@TCA_CAKE_DIFFSERV_MODE={0x8, 0xa, 0xc201}]}}]}, 0x3c}}, 0x0) 12:14:47 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) 12:14:47 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)) [ 1108.964313][T30283] can: request_module (can-proto-0) failed. 12:14:47 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)) [ 1109.045809][T30287] can: request_module (can-proto-0) failed. 12:14:48 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:14:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x13}, 0x0) 12:14:48 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0'}, 0xb) 12:14:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(r0, &(0x7f0000000100)='security.ima\x00', &(0x7f0000000140)=@md5={0x1, "154ced401f564cd09aa85724d7dca517"}, 0x11, 0x4) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDCTL_SEQ_NRMIDIS(r5, 0x8004510b, &(0x7f0000000180)) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9, 0x1, 'cake\x00'}, {0xc, 0x2, [@TCA_CAKE_DIFFSERV_MODE={0x8, 0xa, 0xc201}]}}]}, 0x3c}}, 0x0) 12:14:48 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)) 12:14:48 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:14:48 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0'}, 0xb) 12:14:48 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0'}, 0xb) 12:14:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x60}, 0x0) 12:14:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}, {0xe}}, [@qdisc_kind_options=@q_cake={{0x9, 0x1, 'cake\x00'}, {0xc, 0x2, [@TCA_CAKE_DIFFSERV_MODE={0x8, 0xa, 0x2}]}}]}, 0x3c}}, 0x0) 12:14:48 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)) 12:14:48 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:14:48 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) 12:14:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0x38e8) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="3c00000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="00000900010063616b65000000000c00020008a8e900b4c20000"], 0x3c}}, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x13e, 0x13e, 0xa, [@enum={0x7, 0xa, 0x0, 0x6, 0x4, [{0x0, 0x4}, {0xb, 0x3}, {0xc, 0x27}, {0x0, 0x9}, {0xf, 0x3}, {0xd, 0x7ff}, {0xc, 0x101}, {0xa, 0xe449}, {0x4, 0x27e}, {0x1, 0xffffffff}]}, @ptr={0x0, 0x0, 0x0, 0x2, 0x4}, @datasec={0xf, 0x3, 0x0, 0xf, 0x3, [{0x3, 0x2, 0xa4}, {0x3, 0xb, 0x3}, {0x4, 0x1e3, 0x2}], "03bba3"}, @datasec={0xd, 0x2, 0x0, 0xf, 0x3, [{0x4, 0x170c, 0x9}, {0x4, 0xfb50, 0x9}], "b754ba"}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x1}}, @restrict={0x8, 0x0, 0x0, 0xb, 0x2}, @union={0xd, 0x2, 0x0, 0x5, 0x0, 0x9, [{0x0, 0x4, 0x6}, {0x9, 0x0, 0x627}]}, @struct={0x9, 0x2, 0x0, 0x4, 0x1, 0x8, [{0x4, 0x5, 0x1}, {0xd, 0x2, 0x9}]}, @var={0x1, 0x0, 0x0, 0xe, 0x2}]}, {0x0, [0x5f, 0x5f, 0x0, 0x0, 0x30, 0x30, 0x5f, 0x30]}}, &(0x7f0000000100)=""/238, 0x162, 0xee}, 0x20) ioctl$F2FS_IOC_GARBAGE_COLLECT(r5, 0x4004f506, &(0x7f0000000280)) 12:14:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x300}, 0x0) 12:14:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8], 0xc0, 0xe8}, {0x28}}}}, 0x440) setsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)) setreuid(0xee00, r1) [ 1110.081077][T30349] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 12:14:48 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c26a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) [ 1110.203583][T30358] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 12:14:49 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:14:49 executing program 4 (fault-call:1 fault-nth:0): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) 12:14:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x3e8}, 0x0) 12:14:49 executing program 1: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9, 0x1, 'cake\x00'}, {0xc, 0x2, [@TCA_CAKE_DIFFSERV_MODE={0x8, 0x3, 0xc201}]}}]}, 0x3c}}, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x48, 0x0, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x4}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0xfffffffe, 0x2}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @local}]}, 0x48}, 0x1, 0x0, 0x0, 0x4040}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r1, &(0x7f0000000140), 0x4924b68, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000380)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x18, r3, 0x721, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x4}]}, 0x18}}, 0x0) r4 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r4, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@initdev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in=@dev}}, &(0x7f0000000140)=0xe8) sendmsg$ETHTOOL_MSG_FEATURES_GET(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x68282100}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x7c, r3, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x8014}, 0x800) r6 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r6, 0xc01064b5, &(0x7f0000000340)={&(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0], 0x4}) r7 = socket(0x10, 0x3, 0x0) r8 = socket(0x11, 0x800000003, 0x0) bind(r8, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r8, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r7, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r9, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9, 0x1, 'cake\x00'}, {0xc, 0x2, [@TCA_CAKE_DIFFSERV_MODE={0x8, 0xa, 0xc201}]}}]}, 0x3c}}, 0x0) 12:14:49 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) 12:14:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x500}, 0x0) 12:14:49 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0x7, '.'}, 0xc) 12:14:49 executing program 2 (fault-call:4 fault-nth:0): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:14:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000480)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x30, r5, 0x5, 0x0, 0x0, {0x1, 0x0, 0x5}, [@SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd93}]}, 0x30}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r3, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r5, 0x400, 0x70bd27, 0x25dfdbfe, {}, [@SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x40]}]}, 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x40) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9, 0x1, 'cake\x00'}, {0xc, 0x2, [@TCA_CAKE_DIFFSERV_MODE={0x8, 0xa, 0xc201}]}}]}, 0x3c}}, 0x0) 12:14:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x600}, 0x0) 12:14:49 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0x8, '.'}, 0xc) [ 1110.975554][T30395] FAULT_INJECTION: forcing a failure. [ 1110.975554][T30395] name failslab, interval 1, probability 0, space 0, times 0 [ 1110.989271][T30395] CPU: 1 PID: 30395 Comm: syz-executor.2 Not tainted 5.8.0-rc7-syzkaller #0 [ 1110.997985][T30395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1111.008245][T30395] Call Trace: [ 1111.011546][T30395] dump_stack+0x1f0/0x31e [ 1111.015915][T30395] should_fail+0x38a/0x4e0 [ 1111.020365][T30395] ? __se_sys_memfd_create+0xfb/0x490 [ 1111.025753][T30395] should_failslab+0x5/0x20 [ 1111.030279][T30395] __kmalloc+0x74/0x330 [ 1111.034443][T30395] ? strnlen_user+0x206/0x2c0 [ 1111.039139][T30395] __se_sys_memfd_create+0xfb/0x490 [ 1111.044353][T30395] ? do_syscall_64+0x22/0xe0 [ 1111.048949][T30395] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1111.055033][T30395] do_syscall_64+0x73/0xe0 [ 1111.059479][T30395] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1111.065402][T30395] RIP: 0033:0x45c429 [ 1111.069656][T30395] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1111.090673][T30395] RSP: 002b:00007f0fbaaf5a98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1111.099110][T30395] RAX: ffffffffffffffda RBX: 000000000078bf00 RCX: 000000000045c429 [ 1111.107379][T30395] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1591 [ 1111.115372][T30395] RBP: 00007f0fbaaf5ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1111.123379][T30395] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1111.131584][T30395] R13: 00007ffe69553daf R14: 00007f0fbaaf69c0 R15: 000000000078bf0c 12:14:49 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c26a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) 12:14:50 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:14:50 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0x9, '.'}, 0xc) 12:14:50 executing program 2 (fault-call:4 fault-nth:1): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:14:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x900}, 0x0) 12:14:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9, 0x1, 'cake\x00'}, {0xc, 0x2, [@TCA_CAKE_DIFFSERV_MODE={0x8, 0xa, 0xc201}]}}]}, 0x3c}}, 0x0) [ 1111.477886][T30408] FAULT_INJECTION: forcing a failure. [ 1111.477886][T30408] name failslab, interval 1, probability 0, space 0, times 0 12:14:50 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xb, '.'}, 0xc) [ 1111.521910][T30408] CPU: 0 PID: 30408 Comm: syz-executor.2 Not tainted 5.8.0-rc7-syzkaller #0 [ 1111.530620][T30408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1111.540803][T30408] Call Trace: [ 1111.544105][T30408] dump_stack+0x1f0/0x31e [ 1111.548448][T30408] should_fail+0x38a/0x4e0 [ 1111.552919][T30408] ? shmem_alloc_inode+0x17/0x40 [ 1111.557884][T30408] should_failslab+0x5/0x20 [ 1111.562408][T30408] kmem_cache_alloc+0x53/0x2d0 [ 1111.567188][T30408] ? shmem_match+0x150/0x150 [ 1111.571834][T30408] shmem_alloc_inode+0x17/0x40 [ 1111.576612][T30408] ? shmem_match+0x150/0x150 [ 1111.581236][T30408] new_inode_pseudo+0x64/0x240 [ 1111.586014][T30408] new_inode+0x25/0x1d0 [ 1111.590212][T30408] shmem_get_inode+0x10e/0x6f0 [ 1111.594993][T30408] ? _raw_spin_unlock+0x24/0x40 [ 1111.599864][T30408] __shmem_file_setup+0x11e/0x270 [ 1111.604900][T30408] __se_sys_memfd_create+0x25e/0x490 [ 1111.610200][T30408] ? do_syscall_64+0x22/0xe0 [ 1111.614809][T30408] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1111.620892][T30408] do_syscall_64+0x73/0xe0 [ 1111.625326][T30408] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1111.631264][T30408] RIP: 0033:0x45c429 [ 1111.635193][T30408] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1111.654813][T30408] RSP: 002b:00007f0fbaaf5a98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1111.663240][T30408] RAX: ffffffffffffffda RBX: 000000000078bf00 RCX: 000000000045c429 [ 1111.671222][T30408] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1591 [ 1111.679227][T30408] RBP: 00007f0fbaaf5ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1111.687220][T30408] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1111.687228][T30408] R13: 00007ffe69553daf R14: 00007f0fbaaf69c0 R15: 000000000078bf0c 12:14:50 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xc, '.'}, 0xc) 12:14:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0xa00}, 0x0) 12:14:50 executing program 2 (fault-call:4 fault-nth:2): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:14:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/meminfo\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r4, 0x40045542, &(0x7f0000000140)=0xfffffffe) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vim2m\x00', 0x2, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=@gettaction={0x110, 0x32, 0x400, 0x70bd27, 0x25dfdbfe, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc}, @action_gd=@TCA_ACT_TAB={0x34, 0x1, [{0xc, 0x3, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x6}}, {0xc, 0x8, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x32}}, {0xc, 0x17, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3f}}, {0xc, 0x17, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1}}, @action_gd=@TCA_ACT_TAB={0x3c, 0x1, [{0xc, 0xe, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0x10, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}, {0x10, 0x4, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}, {0xc, 0x1f, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}]}, @action_gd=@TCA_ACT_TAB={0x54, 0x1, [{0xc, 0x3, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x101}}, {0xc, 0x1d, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x81}}, {0x10, 0x19, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x10, 0x4, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'sample\x00'}}, {0xc, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0xc, 0x3, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}]}, @action_gd=@TCA_ACT_TAB={0x20, 0x1, [{0x10, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'sample\x00'}}, {0xc, 0x1c, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}]}]}, 0x110}}, 0x0) 12:14:50 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xd, '.'}, 0xc) [ 1111.946681][T30430] FAULT_INJECTION: forcing a failure. [ 1111.946681][T30430] name failslab, interval 1, probability 0, space 0, times 0 [ 1112.011301][T30430] CPU: 1 PID: 30430 Comm: syz-executor.2 Not tainted 5.8.0-rc7-syzkaller #0 [ 1112.020030][T30430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1112.030104][T30430] Call Trace: [ 1112.033407][T30430] dump_stack+0x1f0/0x31e [ 1112.037786][T30430] should_fail+0x38a/0x4e0 [ 1112.042230][T30430] ? security_inode_alloc+0x32/0x1e0 [ 1112.047529][T30430] should_failslab+0x5/0x20 [ 1112.052045][T30430] kmem_cache_alloc+0x53/0x2d0 [ 1112.056836][T30430] security_inode_alloc+0x32/0x1e0 [ 1112.061963][T30430] inode_init_always+0x3f4/0xa50 [ 1112.066928][T30430] ? shmem_match+0x150/0x150 [ 1112.071556][T30430] new_inode_pseudo+0x7b/0x240 [ 1112.076340][T30430] new_inode+0x25/0x1d0 [ 1112.080519][T30430] shmem_get_inode+0x10e/0x6f0 [ 1112.085300][T30430] ? _raw_spin_unlock+0x24/0x40 [ 1112.090193][T30430] __shmem_file_setup+0x11e/0x270 [ 1112.095270][T30430] __se_sys_memfd_create+0x25e/0x490 [ 1112.100572][T30430] ? do_syscall_64+0x22/0xe0 [ 1112.105179][T30430] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1112.111264][T30430] do_syscall_64+0x73/0xe0 [ 1112.115702][T30430] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1112.121602][T30430] RIP: 0033:0x45c429 [ 1112.125503][T30430] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1112.145126][T30430] RSP: 002b:00007f0fbaaf5a98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1112.153573][T30430] RAX: ffffffffffffffda RBX: 000000000078bf00 RCX: 000000000045c429 [ 1112.161555][T30430] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1591 [ 1112.169543][T30430] RBP: 00007f0fbaaf5ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1112.177524][T30430] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1112.185500][T30430] R13: 00007ffe69553daf R14: 00007f0fbaaf69c0 R15: 000000000078bf0c 12:14:51 executing program 3 (fault-call:1 fault-nth:0): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 12:14:51 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:14:51 executing program 2 (fault-call:4 fault-nth:3): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:14:51 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xe, '.'}, 0xc) 12:14:51 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0xb00}, 0x0) 12:14:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@newqdisc={0x3c, 0x24, 0xf0b, 0x20, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xf}, {0xffff, 0xd}}, [@qdisc_kind_options=@q_cake={{0x9, 0x1, 'cake\x00'}, {0xc, 0x2, [@TCA_CAKE_DIFFSERV_MODE={0x8, 0xa, 0xc201}]}}]}, 0x3c}}, 0x0) [ 1112.351373][T30446] FAULT_INJECTION: forcing a failure. [ 1112.351373][T30446] name failslab, interval 1, probability 0, space 0, times 0 [ 1112.365912][T30446] CPU: 0 PID: 30446 Comm: syz-executor.3 Not tainted 5.8.0-rc7-syzkaller #0 [ 1112.374637][T30446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1112.384703][T30446] Call Trace: [ 1112.388027][T30446] dump_stack+0x1f0/0x31e [ 1112.392383][T30446] should_fail+0x38a/0x4e0 [ 1112.396824][T30446] ? tomoyo_realpath_from_path+0xd8/0x630 [ 1112.402558][T30446] should_failslab+0x5/0x20 [ 1112.407080][T30446] __kmalloc+0x74/0x330 [ 1112.411251][T30446] ? tomoyo_realpath_from_path+0xcb/0x630 [ 1112.416994][T30446] tomoyo_realpath_from_path+0xd8/0x630 [ 1112.422599][T30446] tomoyo_path_number_perm+0x18f/0x690 [ 1112.428142][T30446] security_file_ioctl+0x55/0xb0 [ 1112.433102][T30446] __se_sys_ioctl+0x48/0x160 [ 1112.437711][T30446] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1112.443794][T30446] do_syscall_64+0x73/0xe0 [ 1112.448249][T30446] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1112.454156][T30446] RIP: 0033:0x45c429 [ 1112.458072][T30446] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1112.477860][T30446] RSP: 002b:00007f867e18fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1112.486284][T30446] RAX: ffffffffffffffda RBX: 00000000000184c0 RCX: 000000000045c429 [ 1112.494270][T30446] RDX: 0000000020000000 RSI: 000000000000541c RDI: 0000000000000003 [ 1112.502251][T30446] RBP: 00007f867e18fca0 R08: 0000000000000000 R09: 0000000000000000 [ 1112.510257][T30446] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1112.518243][T30446] R13: 00007fffda75d0bf R14: 00007f867e1909c0 R15: 000000000078bf0c 12:14:51 executing program 3 (fault-call:1 fault-nth:1): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) [ 1112.562885][T30446] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1112.605075][T30462] FAULT_INJECTION: forcing a failure. [ 1112.605075][T30462] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1112.618340][T30462] CPU: 0 PID: 30462 Comm: syz-executor.3 Not tainted 5.8.0-rc7-syzkaller #0 [ 1112.618349][T30462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1112.618354][T30462] Call Trace: [ 1112.618371][T30462] dump_stack+0x1f0/0x31e [ 1112.618387][T30462] should_fail+0x38a/0x4e0 [ 1112.649737][T30462] prepare_alloc_pages+0x28c/0x4a0 [ 1112.649760][T30462] __alloc_pages_nodemask+0xbc/0x5e0 [ 1112.660217][T30462] ? __lock_acquire+0x116c/0x2c30 [ 1112.665262][T30462] kmem_getpages+0x49/0x900 [ 1112.669696][T30464] FAULT_INJECTION: forcing a failure. [ 1112.669696][T30464] name failslab, interval 1, probability 0, space 0, times 0 [ 1112.669790][T30462] cache_grow_begin+0x7b/0x2e0 [ 1112.687204][T30462] cache_alloc_refill+0x359/0x3f0 [ 1112.692282][T30462] ? check_preemption_disabled+0x51/0x140 [ 1112.698050][T30462] __kmalloc+0x30c/0x330 [ 1112.702314][T30462] ? tomoyo_realpath_from_path+0xd8/0x630 [ 1112.708056][T30462] tomoyo_realpath_from_path+0xd8/0x630 [ 1112.713684][T30462] tomoyo_path_number_perm+0x18f/0x690 [ 1112.719186][T30462] security_file_ioctl+0x55/0xb0 [ 1112.724156][T30462] __se_sys_ioctl+0x48/0x160 [ 1112.728764][T30462] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1112.734865][T30462] do_syscall_64+0x73/0xe0 [ 1112.739473][T30462] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1112.745411][T30462] RIP: 0033:0x45c429 [ 1112.749497][T30462] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1112.769696][T30462] RSP: 002b:00007f867e18fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1112.778904][T30462] RAX: ffffffffffffffda RBX: 00000000000184c0 RCX: 000000000045c429 [ 1112.786987][T30462] RDX: 0000000020000000 RSI: 000000000000541c RDI: 0000000000000003 [ 1112.795071][T30462] RBP: 00007f867e18fca0 R08: 0000000000000000 R09: 0000000000000000 [ 1112.803059][T30462] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1112.812271][T30462] R13: 00007fffda75d0bf R14: 00007f867e1909c0 R15: 000000000078bf0c [ 1112.820273][T30464] CPU: 1 PID: 30464 Comm: syz-executor.2 Not tainted 5.8.0-rc7-syzkaller #0 [ 1112.828974][T30464] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1112.839053][T30464] Call Trace: [ 1112.842344][T30464] dump_stack+0x1f0/0x31e [ 1112.846708][T30464] should_fail+0x38a/0x4e0 [ 1112.851139][T30464] ? __d_alloc+0x2a/0x6d0 12:14:51 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:14:51 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xf, '.'}, 0xc) [ 1112.855482][T30464] should_failslab+0x5/0x20 [ 1112.859998][T30464] kmem_cache_alloc+0x53/0x2d0 [ 1112.864811][T30464] __d_alloc+0x2a/0x6d0 [ 1112.869079][T30464] ? lockdep_init_map_waits+0x2c/0x9a0 [ 1112.874557][T30464] d_alloc_pseudo+0x19/0x70 [ 1112.879070][T30464] alloc_file_pseudo+0xc8/0x240 [ 1112.883943][T30464] __shmem_file_setup+0x194/0x270 [ 1112.889156][T30464] __se_sys_memfd_create+0x25e/0x490 [ 1112.894487][T30464] ? do_syscall_64+0x22/0xe0 [ 1112.894501][T30464] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1112.894511][T30464] do_syscall_64+0x73/0xe0 [ 1112.894523][T30464] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1112.894533][T30464] RIP: 0033:0x45c429 12:14:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}, {0x0, 0xa}}, [@qdisc_kind_options=@q_cake={{0x9, 0x1, 'cake\x00'}, {0xc, 0x2, [@TCA_CAKE_DIFFSERV_MODE={0x8, 0xa, 0xc201}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x10}, 0x0) r5 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x1a, r5) r6 = add_key(&(0x7f0000000140)='rxrpc_s\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000400)="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", 0x1000, r5) keyctl$clear(0x7, r6) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x40800, 0x0) 12:14:51 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0xc00}, 0x0) [ 1112.894544][T30464] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 12:14:51 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) [ 1112.894549][T30464] RSP: 002b:00007f0fbaad4a98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1112.894560][T30464] RAX: ffffffffffffffda RBX: 000000000078bfa0 RCX: 000000000045c429 12:14:51 executing program 2 (fault-call:4 fault-nth:4): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) [ 1112.894566][T30464] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1591 [ 1112.894572][T30464] RBP: 00007f0fbaad4ca0 R08: 0000000000000000 R09: 0000000000000000 12:14:51 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:14:51 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0xf00}, 0x0) [ 1112.894578][T30464] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1112.894585][T30464] R13: 00007ffe69553daf R14: 00007f0fbaad59c0 R15: 000000000078bfac 12:14:52 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) fcntl$setstatus(r0, 0x4, 0x400) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r5, &(0x7f0000000140), 0x4924b68, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000380)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x18, r7, 0x721, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x4}]}, 0x18}}, 0x0) r8 = socket(0x10, 0x3, 0x0) r9 = socket(0x11, 0x800000003, 0x0) bind(r9, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r9, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r8, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r10, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9, 0x1, 'cake\x00'}, {0xc, 0x2, [@TCA_CAKE_DIFFSERV_MODE={0x8, 0x3, 0xc201}]}}]}, 0x3c}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r5, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000400)={0x4c0, r7, 0x800, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0xd73b94f5c2527709}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x2cc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0xa6, 0x4, "6d58b39ec8f41150ecc7f50022de4f41e707c4153eb9057a372a9cd539728581ec39de3777260ddfbb5218bf71505c09e312b5dca8048af7855bd8ae1b747f540d862b77b73cf1bccc9358a88961210c28ea473313d9737b5e5940b287b14865cfc1f230d90f3142115d9d29bb42dcef2d3d3b1f908080d59fa6d330e30567a433d65338f38de559ada82f653e1d17e58e1e68f66a535bb6e65a07081bff96c2b422"}, @ETHTOOL_A_BITSET_MASK={0xee, 0x5, "6b42eb370c23df4caaea46e78d17e6d5c717b9a1647051941db7763683b253f1e2ac9e43612003f24cd9712eacbb8b714f7469f1a5adf629681d327c85fe3a699c28fccb6cf829b72b67956400e34e830ccd833b2389444fbf8f6bc47985563cebee700256b218986d13f862b259b502615692bd7a290c3443de5d60f30dfcebba4ed0441aa9510d368e39bc032a04a9c6ede11dbad1664b93790b97ae06b75b48f53edfb2d45789d2aa104015b03a5e2de2790220d730c269c35a729f65218ee7bdfbe91a3fb20bff5c9e1d551d584314673f5a973f2827384f4df4940059619fa461d745a9d974600b"}, @ETHTOOL_A_BITSET_VALUE={0xec, 0x4, "b0e7558e658f213aee7558dd993fa84c3a66f91a4c4c1355aecb4cd33c22b21ac354ba1ca4460a9806b5cd848c77c920c88f4432062484eadc4c9a616e074d9953111bdf7150dc8d1d9138af2964e9c7d1bb3362701947ae0d96040e69b5021698a0a38f658c9692ca6064d8d4b42780d6844c2e76ea7b48740b211c08d133ff6ae9387bbc53dbc16e7a98594cb9a9dbc257480d756905a576af998334b558a0886438c7638a3ac0b7019cf5beb46d2346a8a423dcbbd7a73303829a729f5460c25bb47d986176c4e18549d9342701262623e29ce16f1918ca2dd9992ba4e058b88392355b9fc09f"}, @ETHTOOL_A_BITSET_BITS={0x34, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'cake\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xf1e8}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfff}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x54, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x50, 0x5, "69c79bbf27386ec9b7c12f858def5361fa42837759fd89356bac8687a202851acf22d8c34e6106dcfcd106d15b7f659f6d5883d8afb244d9417c1148f2f0bb89ef979025b09fc87e99ffea41"}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x144, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xb255}, @ETHTOOL_A_BITSET_BITS={0x138, 0x3, 0x0, 0x1, [{0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '-\x1f.#[\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'cake\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'cake\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-},((@}([$\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '-\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3f}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3f}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffffd}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x11}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '}\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'cake\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '{,\xdc])\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '\xf6:+:#$\x00'}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '\x96^\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1ff}]}, {0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, '-%#&(():#m)\xb9\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'cake\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xab03}]}]}]}]}, 0x4c0}, 0x1, 0x0, 0x0, 0x4080}, 0x40055) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xfff3}, {0x3, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9, 0x1, 'cake\x00'}, {0xc, 0x2, [@TCA_CAKE_DIFFSERV_MODE={0x8, 0xa, 0xc201}]}}]}, 0x3c}}, 0x0) 12:14:52 executing program 3 (fault-call:1 fault-nth:2): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 12:14:52 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0x18, '.'}, 0xc) [ 1113.289324][T30491] FAULT_INJECTION: forcing a failure. [ 1113.289324][T30491] name failslab, interval 1, probability 0, space 0, times 0 [ 1113.363576][T30491] CPU: 1 PID: 30491 Comm: syz-executor.2 Not tainted 5.8.0-rc7-syzkaller #0 [ 1113.372466][T30491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1113.382534][T30491] Call Trace: [ 1113.385847][T30491] dump_stack+0x1f0/0x31e [ 1113.390217][T30491] should_fail+0x38a/0x4e0 [ 1113.390237][T30491] ? __alloc_file+0x26/0x390 [ 1113.390249][T30491] should_failslab+0x5/0x20 [ 1113.390262][T30491] kmem_cache_alloc+0x53/0x2d0 [ 1113.390277][T30491] __alloc_file+0x26/0x390 [ 1113.390288][T30491] ? alloc_empty_file+0x49/0x1b0 [ 1113.390302][T30491] alloc_empty_file+0xa9/0x1b0 [ 1113.390313][T30491] alloc_file+0x5d/0x4f0 [ 1113.390329][T30491] alloc_file_pseudo+0x1b0/0x240 [ 1113.390354][T30491] __shmem_file_setup+0x194/0x270 [ 1113.437661][T30491] __se_sys_memfd_create+0x25e/0x490 [ 1113.437683][T30491] ? do_syscall_64+0x22/0xe0 [ 1113.437697][T30491] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1113.437707][T30491] do_syscall_64+0x73/0xe0 [ 1113.437717][T30491] entry_SYSCALL_64_after_hwframe+0x44/0xa9 12:14:52 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:14:52 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0x1a, '.'}, 0xc) [ 1113.437729][T30491] RIP: 0033:0x45c429 [ 1113.437740][T30491] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1113.437754][T30491] RSP: 002b:00007f0fbaaf5a98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1113.495947][T30491] RAX: ffffffffffffffda RBX: 000000000078bf00 RCX: 000000000045c429 [ 1113.503935][T30491] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1591 [ 1113.511919][T30491] RBP: 00007f0fbaaf5ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1113.519901][T30491] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1113.527887][T30491] R13: 00007ffe69553daf R14: 00007f0fbaaf69c0 R15: 000000000078bf0c 12:14:52 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 12:14:52 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:14:52 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0x1b, '.'}, 0xc) 12:14:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0xfcd}, 0x0) 12:14:52 executing program 2 (fault-call:4 fault-nth:5): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:14:52 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) getsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9, 0x1, 'cake\x00'}, {0xc, 0x2, [@TCA_CAKE_DIFFSERV_MODE={0x8, 0xa, 0xc201}]}}]}, 0x3c}}, 0x0) 12:14:52 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x2, &(0x7f0000000000)) 12:14:52 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, 'O'}, 0xc) 12:14:52 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:14:52 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x10, &(0x7f0000000000)) 12:14:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x1100}, 0x0) [ 1113.883385][T30528] FAULT_INJECTION: forcing a failure. [ 1113.883385][T30528] name failslab, interval 1, probability 0, space 0, times 0 12:14:52 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, "9b"}, 0xc) 12:14:52 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0x18, '.'}, 0xc) 12:14:52 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b2f, &(0x7f0000000000)) [ 1113.991545][T30528] CPU: 1 PID: 30528 Comm: syz-executor.2 Not tainted 5.8.0-rc7-syzkaller #0 [ 1114.000262][T30528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1114.010360][T30528] Call Trace: [ 1114.013665][T30528] dump_stack+0x1f0/0x31e [ 1114.018024][T30528] should_fail+0x38a/0x4e0 [ 1114.022501][T30528] ? security_file_alloc+0x32/0x200 [ 1114.027740][T30528] should_failslab+0x5/0x20 [ 1114.032254][T30528] kmem_cache_alloc+0x53/0x2d0 [ 1114.037064][T30528] security_file_alloc+0x32/0x200 [ 1114.037083][T30528] __alloc_file+0xd7/0x390 [ 1114.037097][T30528] alloc_empty_file+0xa9/0x1b0 [ 1114.037110][T30528] alloc_file+0x5d/0x4f0 [ 1114.037125][T30528] alloc_file_pseudo+0x1b0/0x240 [ 1114.037149][T30528] __shmem_file_setup+0x194/0x270 [ 1114.037165][T30528] __se_sys_memfd_create+0x25e/0x490 [ 1114.037178][T30528] ? do_syscall_64+0x22/0xe0 [ 1114.037193][T30528] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1114.037205][T30528] do_syscall_64+0x73/0xe0 [ 1114.037217][T30528] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1114.037228][T30528] RIP: 0033:0x45c429 [ 1114.037239][T30528] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1114.037251][T30528] RSP: 002b:00007f0fbaaf5a98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1114.123760][T30528] RAX: ffffffffffffffda RBX: 000000000078bf00 RCX: 000000000045c429 12:14:52 executing program 2 (fault-call:4 fault-nth:6): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:14:52 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b30, &(0x7f0000000000)) [ 1114.123769][T30528] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1591 [ 1114.123775][T30528] RBP: 00007f0fbaaf5ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1114.123782][T30528] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1114.123789][T30528] R13: 00007ffe69553daf R14: 00007f0fbaaf69c0 R15: 000000000078bf0c 12:14:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x1200}, 0x0) 12:14:52 executing program 1 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:14:52 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '\v'}, 0xc) [ 1114.245083][T30549] FAULT_INJECTION: forcing a failure. [ 1114.245083][T30549] name failslab, interval 1, probability 0, space 0, times 0 [ 1114.268896][T30549] CPU: 1 PID: 30549 Comm: syz-executor.2 Not tainted 5.8.0-rc7-syzkaller #0 [ 1114.277623][T30549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1114.287689][T30549] Call Trace: [ 1114.291017][T30549] dump_stack+0x1f0/0x31e [ 1114.295400][T30549] should_fail+0x38a/0x4e0 [ 1114.299847][T30549] ? tomoyo_realpath_from_path+0xd8/0x630 [ 1114.306463][T30549] should_failslab+0x5/0x20 [ 1114.306491][T30549] __kmalloc+0x74/0x330 12:14:53 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b31, &(0x7f0000000000)) [ 1114.306506][T30549] ? tomoyo_realpath_from_path+0xcb/0x630 [ 1114.306521][T30549] tomoyo_realpath_from_path+0xd8/0x630 [ 1114.306543][T30549] tomoyo_path_perm+0x17d/0x740 [ 1114.306561][T30549] ? trace_lock_release+0x137/0x1a0 [ 1114.306598][T30549] security_path_truncate+0xc0/0x140 [ 1114.306612][T30549] do_sys_ftruncate+0x443/0x690 [ 1114.306631][T30549] ? lock_is_held_type+0x87/0xe0 [ 1114.306644][T30549] ? do_syscall_64+0x22/0xe0 [ 1114.306657][T30549] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1114.306668][T30549] do_syscall_64+0x73/0xe0 [ 1114.306681][T30549] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1114.306693][T30549] RIP: 0033:0x45c3f7 [ 1114.306706][T30549] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 3c e5 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1114.306714][T30549] RSP: 002b:00007f0fbaaf5a98 EFLAGS: 00000213 ORIG_RAX: 000000000000004d [ 1114.306726][T30549] RAX: ffffffffffffffda RBX: 000000000078bf00 RCX: 000000000045c3f7 [ 1114.306733][T30549] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1114.306739][T30549] RBP: 0000000000000007 R08: 0000000000000000 R09: 0000000000000000 [ 1114.306747][T30549] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000000000007 [ 1114.306756][T30549] R13: 00007ffe69553daf R14: 00007f0fbaaf69c0 R15: 000000000078bf0c [ 1114.330486][T30555] FAULT_INJECTION: forcing a failure. [ 1114.330486][T30555] name failslab, interval 1, probability 0, space 0, times 0 [ 1114.330505][T30555] CPU: 1 PID: 30555 Comm: syz-executor.1 Not tainted 5.8.0-rc7-syzkaller #0 [ 1114.330513][T30555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1114.330517][T30555] Call Trace: [ 1114.330534][T30555] dump_stack+0x1f0/0x31e [ 1114.330548][T30555] should_fail+0x38a/0x4e0 [ 1114.330566][T30555] ? __se_sys_memfd_create+0xfb/0x490 [ 1114.330576][T30555] should_failslab+0x5/0x20 [ 1114.330587][T30555] __kmalloc+0x74/0x330 [ 1114.330600][T30555] ? strnlen_user+0x206/0x2c0 [ 1114.330615][T30555] __se_sys_memfd_create+0xfb/0x490 [ 1114.330626][T30555] ? do_syscall_64+0x22/0xe0 [ 1114.330638][T30555] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1114.330648][T30555] do_syscall_64+0x73/0xe0 [ 1114.330659][T30555] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1114.330669][T30555] RIP: 0033:0x45c429 [ 1114.330678][T30555] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1114.330685][T30555] RSP: 002b:00007fc4d6832a98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1114.330695][T30555] RAX: ffffffffffffffda RBX: 000000000078bf00 RCX: 000000000045c429 [ 1114.330702][T30555] RDX: 00000000200004d8 RSI: 0000000000000000 RDI: 00000000004c1591 [ 1114.330709][T30555] RBP: 00007fc4d6832ca0 R08: fe03f80fe03f80ff R09: 0000000002000001 [ 1114.330716][T30555] R10: 00000000003fa6d0 R11: 0000000000000246 R12: 0000000000000000 [ 1114.330723][T30555] R13: 00007fff184ac23f R14: 00007fc4d68339c0 R15: 000000000078bf0c [ 1114.449785][T30549] ERROR: Out of memory at tomoyo_realpath_from_path. 12:14:53 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:14:53 executing program 1 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:14:53 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b32, &(0x7f0000000000)) 12:14:53 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '\f'}, 0xc) 12:14:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x1300}, 0x0) 12:14:53 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b33, &(0x7f0000000000)) 12:14:53 executing program 2 (fault-call:4 fault-nth:7): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) [ 1114.808419][T30569] FAULT_INJECTION: forcing a failure. [ 1114.808419][T30569] name failslab, interval 1, probability 0, space 0, times 0 12:14:53 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '\r'}, 0xc) [ 1114.885013][T30569] CPU: 0 PID: 30569 Comm: syz-executor.1 Not tainted 5.8.0-rc7-syzkaller #0 [ 1114.893780][T30569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1114.903872][T30569] Call Trace: [ 1114.907207][T30569] dump_stack+0x1f0/0x31e [ 1114.911900][T30569] should_fail+0x38a/0x4e0 [ 1114.916335][T30569] ? shmem_alloc_inode+0x17/0x40 [ 1114.921280][T30569] should_failslab+0x5/0x20 [ 1114.925828][T30569] kmem_cache_alloc+0x53/0x2d0 [ 1114.925848][T30569] ? shmem_match+0x150/0x150 [ 1114.925870][T30569] shmem_alloc_inode+0x17/0x40 [ 1114.940063][T30569] ? shmem_match+0x150/0x150 [ 1114.940075][T30569] new_inode_pseudo+0x64/0x240 [ 1114.940090][T30569] new_inode+0x25/0x1d0 [ 1114.953602][T30569] shmem_get_inode+0x10e/0x6f0 [ 1114.958587][T30569] ? _raw_spin_unlock+0x24/0x40 [ 1114.963486][T30569] __shmem_file_setup+0x11e/0x270 [ 1114.968622][T30569] __se_sys_memfd_create+0x25e/0x490 [ 1114.975434][T30569] ? do_syscall_64+0x22/0xe0 12:14:53 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, "0e"}, 0xc) [ 1114.980052][T30569] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1114.986153][T30569] do_syscall_64+0x73/0xe0 [ 1114.990588][T30569] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1114.996498][T30569] RIP: 0033:0x45c429 [ 1115.000417][T30569] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1115.020506][T30569] RSP: 002b:00007fc4d6832a98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1115.028946][T30569] RAX: ffffffffffffffda RBX: 000000000078bf00 RCX: 000000000045c429 [ 1115.028954][T30569] RDX: 00000000200004d8 RSI: 0000000000000000 RDI: 00000000004c1591 12:14:53 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b34, &(0x7f0000000000)) 12:14:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x3f00}, 0x0) [ 1115.028960][T30569] RBP: 00007fc4d6832ca0 R08: fe03f80fe03f80ff R09: 0000000002000001 [ 1115.028967][T30569] R10: 00000000003fa6d0 R11: 0000000000000246 R12: 0000000000000001 [ 1115.028973][T30569] R13: 00007fff184ac23f R14: 00007fc4d68339c0 R15: 000000000078bf0c [ 1115.159459][T30589] FAULT_INJECTION: forcing a failure. [ 1115.159459][T30589] name failslab, interval 1, probability 0, space 0, times 0 [ 1115.159524][T30589] CPU: 0 PID: 30589 Comm: syz-executor.2 Not tainted 5.8.0-rc7-syzkaller #0 [ 1115.159531][T30589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1115.159537][T30589] Call Trace: [ 1115.159555][T30589] dump_stack+0x1f0/0x31e [ 1115.159572][T30589] should_fail+0x38a/0x4e0 [ 1115.159590][T30589] ? tomoyo_encode2+0x25a/0x560 [ 1115.159603][T30589] should_failslab+0x5/0x20 [ 1115.159620][T30589] __kmalloc+0x74/0x330 [ 1115.159642][T30589] ? tomoyo_realpath_from_path+0xd8/0x630 [ 1115.159661][T30589] ? rcu_read_lock_sched_held+0x2f/0xa0 [ 1115.159679][T30589] tomoyo_encode2+0x25a/0x560 [ 1115.159699][T30589] ? dynamic_dname+0xf0/0xf0 [ 1115.159714][T30589] tomoyo_realpath_from_path+0x5d6/0x630 [ 1115.159738][T30589] tomoyo_path_perm+0x17d/0x740 [ 1115.159756][T30589] ? irqtime_account_irq+0xb4/0x1f0 [ 1115.159794][T30589] security_path_truncate+0xc0/0x140 [ 1115.159813][T30589] do_sys_ftruncate+0x443/0x690 12:14:54 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b35, &(0x7f0000000000)) [ 1115.159835][T30589] ? lock_is_held_type+0x87/0xe0 [ 1115.159862][T30589] ? do_syscall_64+0x22/0xe0 [ 1115.159885][T30589] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1115.159897][T30589] do_syscall_64+0x73/0xe0 [ 1115.159911][T30589] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1115.159921][T30589] RIP: 0033:0x45c3f7 [ 1115.159934][T30589] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 3c e5 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1115.159943][T30589] RSP: 002b:00007f0fbaaf5a98 EFLAGS: 00000213 ORIG_RAX: 000000000000004d [ 1115.159958][T30589] RAX: ffffffffffffffda RBX: 000000000078bf00 RCX: 000000000045c3f7 [ 1115.159966][T30589] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1115.159973][T30589] RBP: 0000000000000007 R08: 0000000000000000 R09: 0000000000000000 [ 1115.159982][T30589] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000000000007 [ 1115.159989][T30589] R13: 00007ffe69553daf R14: 00007f0fbaaf69c0 R15: 000000000078bf0c [ 1115.160936][T30589] ERROR: Out of memory at tomoyo_realpath_from_path. 12:14:54 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:14:54 executing program 2 (fault-call:4 fault-nth:8): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:14:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x4000}, 0x0) 12:14:54 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b36, &(0x7f0000000000)) 12:14:54 executing program 1 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:14:54 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, "0f"}, 0xc) 12:14:54 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b37, &(0x7f0000000000)) 12:14:54 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, "ff"}, 0xc) [ 1115.743379][T30614] FAULT_INJECTION: forcing a failure. [ 1115.743379][T30614] name failslab, interval 1, probability 0, space 0, times 0 [ 1115.790528][T30617] FAULT_INJECTION: forcing a failure. [ 1115.790528][T30617] name failslab, interval 1, probability 0, space 0, times 0 [ 1115.809751][T30614] CPU: 1 PID: 30614 Comm: syz-executor.1 Not tainted 5.8.0-rc7-syzkaller #0 [ 1115.818460][T30614] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1115.828533][T30614] Call Trace: [ 1115.831844][T30614] dump_stack+0x1f0/0x31e [ 1115.831861][T30614] should_fail+0x38a/0x4e0 12:14:54 executing program 1 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:14:54 executing program 2 (fault-call:4 fault-nth:9): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) [ 1115.831876][T30614] ? security_inode_alloc+0x32/0x1e0 12:14:54 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b3a, &(0x7f0000000000)) [ 1115.831887][T30614] should_failslab+0x5/0x20 12:14:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x4788}, 0x0) [ 1115.831898][T30614] kmem_cache_alloc+0x53/0x2d0 [ 1115.831913][T30614] security_inode_alloc+0x32/0x1e0 [ 1115.831927][T30614] inode_init_always+0x3f4/0xa50 [ 1115.831940][T30614] ? shmem_match+0x150/0x150 [ 1115.831953][T30614] new_inode_pseudo+0x7b/0x240 [ 1115.831965][T30614] new_inode+0x25/0x1d0 [ 1115.831982][T30614] shmem_get_inode+0x10e/0x6f0 [ 1115.831997][T30614] ? _raw_spin_unlock+0x24/0x40 [ 1115.832014][T30614] __shmem_file_setup+0x11e/0x270 [ 1115.832028][T30614] __se_sys_memfd_create+0x25e/0x490 [ 1115.832040][T30614] ? do_syscall_64+0x22/0xe0 [ 1115.832052][T30614] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1115.832063][T30614] do_syscall_64+0x73/0xe0 [ 1115.832075][T30614] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1115.832085][T30614] RIP: 0033:0x45c429 [ 1115.832096][T30614] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1115.832103][T30614] RSP: 002b:00007fc4d6832a98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1115.832115][T30614] RAX: ffffffffffffffda RBX: 000000000078bf00 RCX: 000000000045c429 [ 1115.832122][T30614] RDX: 00000000200004d8 RSI: 0000000000000000 RDI: 00000000004c1591 [ 1115.832129][T30614] RBP: 00007fc4d6832ca0 R08: fe03f80fe03f80ff R09: 0000000002000001 [ 1115.832136][T30614] R10: 00000000003fa6d0 R11: 0000000000000246 R12: 0000000000000002 [ 1115.832143][T30614] R13: 00007fff184ac23f R14: 00007fc4d68339c0 R15: 000000000078bf0c [ 1115.841016][T30617] CPU: 1 PID: 30617 Comm: syz-executor.2 Not tainted 5.8.0-rc7-syzkaller #0 [ 1115.841025][T30617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1115.841029][T30617] Call Trace: [ 1115.841046][T30617] dump_stack+0x1f0/0x31e [ 1115.841062][T30617] should_fail+0x38a/0x4e0 [ 1115.841081][T30617] ? tomoyo_encode2+0x25a/0x560 [ 1115.841090][T30617] should_failslab+0x5/0x20 [ 1115.841102][T30617] __kmalloc+0x74/0x330 [ 1115.841115][T30617] ? tomoyo_realpath_from_path+0xd8/0x630 [ 1115.841125][T30617] ? rcu_read_lock_sched_held+0x2f/0xa0 [ 1115.841140][T30617] tomoyo_encode2+0x25a/0x560 [ 1115.841156][T30617] ? dynamic_dname+0xf0/0xf0 [ 1115.841170][T30617] tomoyo_realpath_from_path+0x5d6/0x630 [ 1115.841193][T30617] tomoyo_path_perm+0x17d/0x740 [ 1115.841209][T30617] ? trace_lock_release+0x137/0x1a0 [ 1115.841245][T30617] security_path_truncate+0xc0/0x140 [ 1115.841259][T30617] do_sys_ftruncate+0x443/0x690 [ 1115.841277][T30617] ? lock_is_held_type+0x87/0xe0 [ 1115.841290][T30617] ? do_syscall_64+0x22/0xe0 [ 1115.841303][T30617] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1115.841314][T30617] do_syscall_64+0x73/0xe0 [ 1115.841326][T30617] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1115.841337][T30617] RIP: 0033:0x45c3f7 [ 1115.841350][T30617] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 3c e5 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1115.841357][T30617] RSP: 002b:00007f0fbaaf5a98 EFLAGS: 00000213 ORIG_RAX: 000000000000004d [ 1115.841370][T30617] RAX: ffffffffffffffda RBX: 000000000078bf00 RCX: 000000000045c3f7 [ 1115.841378][T30617] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1115.841385][T30617] RBP: 0000000000000007 R08: 0000000000000000 R09: 0000000000000000 [ 1115.841393][T30617] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000000000007 [ 1115.841400][T30617] R13: 00007ffe69553daf R14: 00007f0fbaaf69c0 R15: 000000000078bf0c [ 1115.841431][T30617] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1116.009260][T30634] FAULT_INJECTION: forcing a failure. [ 1116.009260][T30634] name failslab, interval 1, probability 0, space 0, times 0 [ 1116.009279][T30634] CPU: 1 PID: 30634 Comm: syz-executor.1 Not tainted 5.8.0-rc7-syzkaller #0 [ 1116.009286][T30634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1116.009290][T30634] Call Trace: [ 1116.009306][T30634] dump_stack+0x1f0/0x31e [ 1116.009322][T30634] should_fail+0x38a/0x4e0 [ 1116.009340][T30634] ? __d_alloc+0x2a/0x6d0 [ 1116.009359][T30634] should_failslab+0x5/0x20 [ 1116.009372][T30634] kmem_cache_alloc+0x53/0x2d0 [ 1116.009388][T30634] __d_alloc+0x2a/0x6d0 [ 1116.009400][T30634] ? lockdep_init_map_waits+0x2c/0x9a0 [ 1116.009415][T30634] d_alloc_pseudo+0x19/0x70 [ 1116.009426][T30634] alloc_file_pseudo+0xc8/0x240 [ 1116.009446][T30634] __shmem_file_setup+0x194/0x270 [ 1116.009461][T30634] __se_sys_memfd_create+0x25e/0x490 [ 1116.009474][T30634] ? do_syscall_64+0x22/0xe0 [ 1116.009485][T30634] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1116.009498][T30634] do_syscall_64+0x73/0xe0 [ 1116.009509][T30634] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1116.009518][T30634] RIP: 0033:0x45c429 [ 1116.009531][T30634] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1116.009539][T30634] RSP: 002b:00007fc4d6832a98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1116.009558][T30634] RAX: ffffffffffffffda RBX: 000000000078bf00 RCX: 000000000045c429 [ 1116.009565][T30634] RDX: 00000000200004d8 RSI: 0000000000000000 RDI: 00000000004c1591 [ 1116.009572][T30634] RBP: 00007fc4d6832ca0 R08: fe03f80fe03f80ff R09: 0000000002000001 [ 1116.009580][T30634] R10: 00000000003fa6d0 R11: 0000000000000246 R12: 0000000000000003 [ 1116.009586][T30634] R13: 00007fff184ac23f R14: 00007fc4d68339c0 R15: 000000000078bf0c [ 1116.038424][T30631] FAULT_INJECTION: forcing a failure. [ 1116.038424][T30631] name failslab, interval 1, probability 0, space 0, times 0 [ 1116.563857][T30631] CPU: 1 PID: 30631 Comm: syz-executor.2 Not tainted 5.8.0-rc7-syzkaller #0 [ 1116.572554][T30631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1116.582615][T30631] Call Trace: [ 1116.585905][T30631] dump_stack+0x1f0/0x31e [ 1116.590241][T30631] should_fail+0x38a/0x4e0 [ 1116.594665][T30631] ? __alloc_file+0x26/0x390 [ 1116.599257][T30631] should_failslab+0x5/0x20 [ 1116.603862][T30631] kmem_cache_alloc+0x53/0x2d0 [ 1116.608644][T30631] __alloc_file+0x26/0x390 [ 1116.613113][T30631] ? alloc_empty_file+0x49/0x1b0 [ 1116.618079][T30631] alloc_empty_file+0xa9/0x1b0 [ 1116.622870][T30631] path_openat+0xa8/0x37f0 [ 1116.627319][T30631] ? __lock_acquire+0x116c/0x2c30 [ 1116.632355][T30631] ? kvm_sched_clock_read+0x15/0x40 [ 1116.637559][T30631] ? sched_clock+0x36/0x40 [ 1116.641994][T30631] ? kvm_sched_clock_read+0x15/0x40 [ 1116.647191][T30631] ? sched_clock+0x36/0x40 [ 1116.651603][T30631] ? sched_clock_cpu+0x18/0x3b0 [ 1116.656552][T30631] ? irqtime_account_irq+0xb4/0x1f0 [ 1116.661791][T30631] ? lockdep_hardirqs_on_prepare+0x425/0x6e0 [ 1116.668746][T30631] do_filp_open+0x191/0x3a0 [ 1116.673280][T30631] ? do_raw_spin_unlock+0x134/0x8d0 [ 1116.678493][T30631] ? _raw_spin_unlock+0x24/0x40 [ 1116.683353][T30631] ? __alloc_fd+0x55c/0x600 [ 1116.687882][T30631] do_sys_openat2+0x463/0x770 [ 1116.692597][T30631] __x64_sys_open+0x1af/0x1e0 [ 1116.697303][T30631] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1116.703420][T30631] do_syscall_64+0x73/0xe0 [ 1116.707865][T30631] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1116.714032][T30631] RIP: 0033:0x4161a1 [ 1116.717956][T30631] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 12:14:55 executing program 5: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:14:55 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b3b, &(0x7f0000000000)) 12:14:55 executing program 1 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) [ 1116.737772][T30631] RSP: 002b:00007f0fbaaf5a90 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1116.746208][T30631] RAX: ffffffffffffffda RBX: 00007f0fbaaf66d4 RCX: 00000000004161a1 [ 1116.754788][T30631] RDX: 00007f0fbaaf5afa RSI: 0000000000000002 RDI: 00007f0fbaaf5af0 [ 1116.762761][T30631] RBP: 0000000000000007 R08: 0000000000000000 R09: 000000000000000a [ 1116.770737][T30631] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000007 [ 1116.778728][T30631] R13: 00007ffe69553daf R14: 00007f0fbaaf69c0 R15: 000000000078bf0c 12:14:55 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0x2000008c) 12:14:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x4888}, 0x0) [ 1116.863482][T30647] FAULT_INJECTION: forcing a failure. [ 1116.863482][T30647] name failslab, interval 1, probability 0, space 0, times 0 12:14:55 executing program 5: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:14:55 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b3c, &(0x7f0000000000)) [ 1116.945911][T30647] CPU: 0 PID: 30647 Comm: syz-executor.1 Not tainted 5.8.0-rc7-syzkaller #0 [ 1116.954657][T30647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1116.964759][T30647] Call Trace: [ 1116.968062][T30647] dump_stack+0x1f0/0x31e [ 1116.972502][T30647] should_fail+0x38a/0x4e0 [ 1116.976925][T30647] ? __alloc_file+0x26/0x390 [ 1116.981574][T30647] should_failslab+0x5/0x20 [ 1116.986111][T30647] kmem_cache_alloc+0x53/0x2d0 [ 1116.990911][T30647] __alloc_file+0x26/0x390 [ 1116.995358][T30647] ? alloc_empty_file+0x49/0x1b0 [ 1117.000321][T30647] alloc_empty_file+0xa9/0x1b0 [ 1117.005457][T30647] alloc_file+0x5d/0x4f0 [ 1117.009709][T30647] alloc_file_pseudo+0x1b0/0x240 [ 1117.014674][T30647] __shmem_file_setup+0x194/0x270 [ 1117.019805][T30647] __se_sys_memfd_create+0x25e/0x490 [ 1117.025121][T30647] ? do_syscall_64+0x22/0xe0 [ 1117.029719][T30647] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1117.035857][T30647] do_syscall_64+0x73/0xe0 [ 1117.040291][T30647] entry_SYSCALL_64_after_hwframe+0x44/0xa9 12:14:55 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:14:55 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b3d, &(0x7f0000000000)) 12:14:55 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b40, &(0x7f0000000000)) [ 1117.046190][T30647] RIP: 0033:0x45c429 [ 1117.050085][T30647] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1117.069712][T30647] RSP: 002b:00007fc4d6832a98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1117.078424][T30647] RAX: ffffffffffffffda RBX: 000000000078bf00 RCX: 000000000045c429 12:14:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x5865}, 0x0) [ 1117.078433][T30647] RDX: 00000000200004d8 RSI: 0000000000000000 RDI: 00000000004c1591 [ 1117.078441][T30647] RBP: 00007fc4d6832ca0 R08: fe03f80fe03f80ff R09: 0000000002000001 12:14:55 executing program 5: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:14:56 executing program 5: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) [ 1117.078448][T30647] R10: 00000000003fa6d0 R11: 0000000000000246 R12: 0000000000000004 [ 1117.078456][T30647] R13: 00007fff184ac23f R14: 00007fc4d68339c0 R15: 000000000078bf0c 12:14:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x6000}, 0x0) 12:14:56 executing program 1 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) [ 1117.527806][T30689] FAULT_INJECTION: forcing a failure. [ 1117.527806][T30689] name failslab, interval 1, probability 0, space 0, times 0 [ 1117.527824][T30689] CPU: 0 PID: 30689 Comm: syz-executor.1 Not tainted 5.8.0-rc7-syzkaller #0 [ 1117.527830][T30689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1117.527835][T30689] Call Trace: [ 1117.527852][T30689] dump_stack+0x1f0/0x31e [ 1117.527866][T30689] should_fail+0x38a/0x4e0 [ 1117.527883][T30689] ? security_file_alloc+0x32/0x200 [ 1117.527894][T30689] should_failslab+0x5/0x20 [ 1117.527906][T30689] kmem_cache_alloc+0x53/0x2d0 [ 1117.527920][T30689] security_file_alloc+0x32/0x200 [ 1117.527933][T30689] __alloc_file+0xd7/0x390 [ 1117.527947][T30689] alloc_empty_file+0xa9/0x1b0 [ 1117.527959][T30689] alloc_file+0x5d/0x4f0 [ 1117.527981][T30689] alloc_file_pseudo+0x1b0/0x240 [ 1117.528000][T30689] __shmem_file_setup+0x194/0x270 [ 1117.528017][T30689] __se_sys_memfd_create+0x25e/0x490 [ 1117.528029][T30689] ? do_syscall_64+0x22/0xe0 [ 1117.528043][T30689] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1117.528055][T30689] do_syscall_64+0x73/0xe0 [ 1117.528068][T30689] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1117.528079][T30689] RIP: 0033:0x45c429 [ 1117.528090][T30689] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1117.528096][T30689] RSP: 002b:00007fc4d6832a98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 12:14:56 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0x7ffff000) 12:14:56 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:14:56 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b41, &(0x7f0000000000)) 12:14:56 executing program 5: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:14:56 executing program 1 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:14:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x6558}, 0x0) [ 1117.528109][T30689] RAX: ffffffffffffffda RBX: 000000000078bf00 RCX: 000000000045c429 [ 1117.528117][T30689] RDX: 00000000200004d8 RSI: 0000000000000000 RDI: 00000000004c1591 [ 1117.528124][T30689] RBP: 00007fc4d6832ca0 R08: fe03f80fe03f80ff R09: 0000000002000001 [ 1117.528131][T30689] R10: 00000000003fa6d0 R11: 0000000000000246 R12: 0000000000000005 [ 1117.528138][T30689] R13: 00007fff184ac23f R14: 00007fc4d68339c0 R15: 000000000078bf0c [ 1117.827778][T30702] FAULT_INJECTION: forcing a failure. [ 1117.827778][T30702] name failslab, interval 1, probability 0, space 0, times 0 [ 1117.855535][T30702] CPU: 1 PID: 30702 Comm: syz-executor.1 Not tainted 5.8.0-rc7-syzkaller #0 [ 1117.866847][T30702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1117.866855][T30702] Call Trace: 12:14:56 executing program 5: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) [ 1117.866876][T30702] dump_stack+0x1f0/0x31e 12:14:56 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) [ 1117.866892][T30702] should_fail+0x38a/0x4e0 [ 1117.866911][T30702] ? tomoyo_realpath_from_path+0xd8/0x630 [ 1117.866921][T30702] should_failslab+0x5/0x20 [ 1117.866933][T30702] __kmalloc+0x74/0x330 [ 1117.866945][T30702] ? tomoyo_realpath_from_path+0xcb/0x630 12:14:56 executing program 1 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:14:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x8100}, 0x0) [ 1117.866961][T30702] tomoyo_realpath_from_path+0xd8/0x630 [ 1117.866986][T30702] tomoyo_path_perm+0x17d/0x740 [ 1117.867003][T30702] ? trace_lock_release+0x137/0x1a0 [ 1117.867051][T30702] security_path_truncate+0xc0/0x140 [ 1117.867074][T30702] do_sys_ftruncate+0x443/0x690 12:14:56 executing program 1 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) [ 1117.867106][T30702] ? lock_is_held_type+0x87/0xe0 12:14:56 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) [ 1117.867128][T30702] ? do_syscall_64+0x22/0xe0 [ 1117.867148][T30702] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1117.867160][T30702] do_syscall_64+0x73/0xe0 [ 1117.867172][T30702] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1117.867184][T30702] RIP: 0033:0x45c3f7 [ 1117.867196][T30702] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 3c e5 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1117.867204][T30702] RSP: 002b:00007fc4d6832a98 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 1117.867215][T30702] RAX: ffffffffffffffda RBX: 000000000078bf00 RCX: 000000000045c3f7 [ 1117.867223][T30702] RDX: 00000000200004d8 RSI: 00000000007f4da0 RDI: 0000000000000004 [ 1117.867230][T30702] RBP: 0000000000000004 R08: fe03f80fe03f80ff R09: 0000000002000001 [ 1117.867238][T30702] R10: 00000000003fa6d0 R11: 0000000000000217 R12: 0000000000000004 [ 1117.867245][T30702] R13: 00007fff184ac23f R14: 00007fc4d68339c0 R15: 000000000078bf0c [ 1117.928199][T30702] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1118.121666][T30722] FAULT_INJECTION: forcing a failure. [ 1118.121666][T30722] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1118.121683][T30722] CPU: 0 PID: 30722 Comm: syz-executor.1 Not tainted 5.8.0-rc7-syzkaller #0 [ 1118.121692][T30722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1118.121696][T30722] Call Trace: [ 1118.121721][T30722] dump_stack+0x1f0/0x31e [ 1118.121738][T30722] should_fail+0x38a/0x4e0 [ 1118.121763][T30722] prepare_alloc_pages+0x28c/0x4a0 [ 1118.121781][T30722] __alloc_pages_nodemask+0xbc/0x5e0 [ 1118.121801][T30722] ? __lock_acquire+0x116c/0x2c30 [ 1118.121831][T30722] kmem_getpages+0x49/0x900 [ 1118.121849][T30722] cache_grow_begin+0x7b/0x2e0 [ 1118.121867][T30722] cache_alloc_refill+0x359/0x3f0 [ 1118.121884][T30722] ? check_preemption_disabled+0x51/0x140 [ 1118.121897][T30722] __kmalloc+0x30c/0x330 [ 1118.121910][T30722] ? tomoyo_realpath_from_path+0xd8/0x630 [ 1118.121925][T30722] tomoyo_realpath_from_path+0xd8/0x630 [ 1118.121948][T30722] tomoyo_path_perm+0x17d/0x740 [ 1118.121965][T30722] ? trace_lock_release+0x137/0x1a0 [ 1118.122004][T30722] security_path_truncate+0xc0/0x140 [ 1118.122019][T30722] do_sys_ftruncate+0x443/0x690 [ 1118.122038][T30722] ? lock_is_held_type+0x87/0xe0 [ 1118.122052][T30722] ? do_syscall_64+0x22/0xe0 [ 1118.122066][T30722] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1118.122079][T30722] do_syscall_64+0x73/0xe0 [ 1118.122101][T30722] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1118.122114][T30722] RIP: 0033:0x45c3f7 [ 1118.122128][T30722] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 3c e5 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1118.122135][T30722] RSP: 002b:00007fc4d6832a98 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 1118.122148][T30722] RAX: ffffffffffffffda RBX: 000000000078bf00 RCX: 000000000045c3f7 [ 1118.122157][T30722] RDX: 00000000200004d8 RSI: 00000000007f4da0 RDI: 0000000000000004 [ 1118.122165][T30722] RBP: 0000000000000004 R08: fe03f80fe03f80ff R09: 0000000002000001 [ 1118.122172][T30722] R10: 00000000003fa6d0 R11: 0000000000000217 R12: 0000000000000004 [ 1118.122182][T30722] R13: 00007fff184ac23f R14: 00007fc4d68339c0 R15: 000000000078bf0c [ 1118.282309][T30734] FAULT_INJECTION: forcing a failure. [ 1118.282309][T30734] name failslab, interval 1, probability 0, space 0, times 0 [ 1118.600685][T30734] CPU: 0 PID: 30734 Comm: syz-executor.1 Not tainted 5.8.0-rc7-syzkaller #0 [ 1118.600693][T30734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1118.600697][T30734] Call Trace: [ 1118.600715][T30734] dump_stack+0x1f0/0x31e [ 1118.600729][T30734] should_fail+0x38a/0x4e0 [ 1118.600746][T30734] ? getname_flags+0xb8/0x610 [ 1118.600756][T30734] should_failslab+0x5/0x20 [ 1118.600768][T30734] kmem_cache_alloc+0x53/0x2d0 [ 1118.600782][T30734] getname_flags+0xb8/0x610 [ 1118.600799][T30734] do_sys_openat2+0x40d/0x770 [ 1118.600816][T30734] __x64_sys_open+0x1af/0x1e0 [ 1118.600838][T30734] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1118.600850][T30734] do_syscall_64+0x73/0xe0 [ 1118.600861][T30734] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1118.600872][T30734] RIP: 0033:0x4161a1 [ 1118.600883][T30734] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 12:14:57 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b44, &(0x7f0000000000)) 12:14:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x8847}, 0x0) 12:14:57 executing program 1 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) [ 1118.600890][T30734] RSP: 002b:00007fc4d6832a90 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1118.600904][T30734] RAX: ffffffffffffffda RBX: 00007fc4d68336d4 RCX: 00000000004161a1 [ 1118.600911][T30734] RDX: 00007fc4d6832afa RSI: 0000000000000002 RDI: 00007fc4d6832af0 [ 1118.600918][T30734] RBP: 0000000000000004 R08: 0000000000000000 R09: 000000000000000a [ 1118.600924][T30734] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1118.600932][T30734] R13: 00007fc4d68336d4 R14: 00007fc4d68339c0 R15: 000000000078bf0c 12:14:57 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:14:57 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@phonet={0x23, 0x6, 0x81, 0x6}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9, 0x1, 'cake\x00'}, {0xc, 0x2, [@TCA_CAKE_DIFFSERV_MODE={0x8, 0x3, 0xc201}]}}]}, 0x3c}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl2\x00', r3, 0x4, 0x28, 0xca, 0x3, 0x22, @private0={0xfc, 0x0, [], 0x1}, @private0, 0x8000, 0x7f00, 0x400, 0x1}}) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) 12:14:57 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:14:57 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b45, &(0x7f0000000000)) [ 1118.886460][T30753] FAULT_INJECTION: forcing a failure. [ 1118.886460][T30753] name failslab, interval 1, probability 0, space 0, times 0 [ 1118.991637][T30753] CPU: 0 PID: 30753 Comm: syz-executor.1 Not tainted 5.8.0-rc7-syzkaller #0 [ 1119.000441][T30753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1119.010504][T30753] Call Trace: [ 1119.013812][T30753] dump_stack+0x1f0/0x31e [ 1119.018164][T30753] should_fail+0x38a/0x4e0 [ 1119.022597][T30753] ? getname_flags+0xb8/0x610 [ 1119.027680][T30753] should_failslab+0x5/0x20 [ 1119.032200][T30753] kmem_cache_alloc+0x53/0x2d0 [ 1119.037016][T30753] getname_flags+0xb8/0x610 12:14:57 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_DEL_STATION(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB, @ANYRES16=r3, @ANYBLOB="000829bd7000fbdb0600b500f90200000000000000008dc987a7f38e6a52403dad67182fa145a68d35c6452096426d226cfb4116c980"], 0x1c}, 0x1, 0x0, 0x0, 0x4040800}, 0x40) r4 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r4, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r4, 0x8008f513, &(0x7f0000000180)) 12:14:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x8848}, 0x0) [ 1119.041569][T30753] do_sys_openat2+0x40d/0x770 [ 1119.047406][T30753] __x64_sys_open+0x1af/0x1e0 [ 1119.052124][T30753] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1119.058247][T30753] do_syscall_64+0x73/0xe0 [ 1119.062712][T30753] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1119.068734][T30753] RIP: 0033:0x4161a1 [ 1119.072642][T30753] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 12:14:57 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b46, &(0x7f0000000000)) [ 1119.092260][T30753] RSP: 002b:00007fc4d6832a90 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1119.100717][T30753] RAX: ffffffffffffffda RBX: 00007fc4d68336d4 RCX: 00000000004161a1 [ 1119.108790][T30753] RDX: 00007fc4d6832afa RSI: 0000000000000002 RDI: 00007fc4d6832af0 [ 1119.116888][T30753] RBP: 0000000000000004 R08: 0000000000000000 R09: 000000000000000a [ 1119.125054][T30753] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1119.125063][T30753] R13: 00007fc4d68336d4 R14: 00007fc4d68339c0 R15: 000000000078bf0c 12:14:58 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b47, &(0x7f0000000000)) 12:14:58 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x1f) ioctl$TIOCSCTTY(r1, 0x540e, 0x7fff) 12:14:58 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x5, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:14:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0xcd0f}, 0x0) 12:14:58 executing program 1 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:14:58 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f00000000c0)={{0x8, 0x36}, 'port1\x00', 0x2, 0x800, 0x5, 0x1f, 0x4, 0x4, 0x46fa, 0x0, 0x6, 0x7f}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$cgroup_freezer_state(r3, &(0x7f00000001c0)='FROZEN\x00', 0x7) r4 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000200)) r5 = openat$md(0xffffffffffffff9c, &(0x7f0000000180)='/dev/md0\x00', 0x48001, 0x0) ioctl$BLKPBSZGET(r5, 0x127b, &(0x7f0000000040)) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r6, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) 12:14:58 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b48, &(0x7f0000000000)) [ 1119.553191][T30801] FAULT_INJECTION: forcing a failure. [ 1119.553191][T30801] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1119.555604][T30800] Unknown ioctl 1084773153 [ 1119.567490][T30801] CPU: 0 PID: 30801 Comm: syz-executor.1 Not tainted 5.8.0-rc7-syzkaller #0 [ 1119.567501][T30801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1119.567505][T30801] Call Trace: [ 1119.567527][T30801] dump_stack+0x1f0/0x31e [ 1119.567542][T30801] should_fail+0x38a/0x4e0 [ 1119.567559][T30801] prepare_alloc_pages+0x28c/0x4a0 [ 1119.567573][T30801] __alloc_pages_nodemask+0xbc/0x5e0 [ 1119.567596][T30801] kmem_getpages+0x49/0x900 [ 1119.567610][T30801] cache_grow_begin+0x7b/0x2e0 [ 1119.567626][T30801] cache_alloc_refill+0x359/0x3f0 [ 1119.567643][T30801] ? check_preemption_disabled+0x51/0x140 [ 1119.567658][T30801] ? getname_flags+0xb8/0x610 [ 1119.567670][T30801] kmem_cache_alloc+0x2b5/0x2d0 [ 1119.567691][T30801] getname_flags+0xb8/0x610 [ 1119.567708][T30801] do_sys_openat2+0x40d/0x770 [ 1119.567726][T30801] __x64_sys_open+0x1af/0x1e0 [ 1119.567741][T30801] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1119.567752][T30801] do_syscall_64+0x73/0xe0 [ 1119.567769][T30801] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1119.675053][T30801] RIP: 0033:0x4161a1 [ 1119.675068][T30801] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1119.675073][T30801] RSP: 002b:00007fc4d6832a90 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1119.675084][T30801] RAX: ffffffffffffffda RBX: 00007fc4d68336d4 RCX: 00000000004161a1 [ 1119.675090][T30801] RDX: 00007fc4d6832afa RSI: 0000000000000002 RDI: 00007fc4d6832af0 [ 1119.675096][T30801] RBP: 0000000000000004 R08: 0000000000000000 R09: 000000000000000a [ 1119.675102][T30801] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1119.675108][T30801] R13: 00007fc4d68336d4 R14: 00007fc4d68339c0 R15: 000000000078bf0c [ 1119.837983][T30800] Unknown ioctl 1084773153 12:14:58 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:14:58 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b49, &(0x7f0000000000)) 12:14:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0xe803}, 0x0) 12:14:58 executing program 1 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:14:58 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:14:58 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000000)={'#! ', './file0', [], 0xa, "3ca88d8db2bb1b4dd90a9adc6c4adac5b5dadeda9adc287bcd163dc3a303b51a351b52d8d308e8bb79a39fc3c345db286fec7cec43d077536178c76d4e8bdfb44674eda2a744e618"}, 0x53) [ 1120.012548][T30815] FAULT_INJECTION: forcing a failure. [ 1120.012548][T30815] name failslab, interval 1, probability 0, space 0, times 0 [ 1120.057171][T30815] CPU: 1 PID: 30815 Comm: syz-executor.1 Not tainted 5.8.0-rc7-syzkaller #0 [ 1120.065945][T30815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1120.076335][T30815] Call Trace: [ 1120.079681][T30815] dump_stack+0x1f0/0x31e [ 1120.084086][T30815] should_fail+0x38a/0x4e0 [ 1120.088751][T30815] ? __d_alloc+0x2a/0x6d0 [ 1120.093173][T30815] should_failslab+0x5/0x20 [ 1120.097722][T30815] kmem_cache_alloc+0x53/0x2d0 [ 1120.102543][T30815] ? trace_lock_release+0x137/0x1a0 [ 1120.107810][T30815] __d_alloc+0x2a/0x6d0 [ 1120.112174][T30815] d_alloc_parallel+0x81/0x13b0 [ 1120.117310][T30815] ? __d_lookup+0x64b/0x6e0 [ 1120.121880][T30815] ? read_seqbegin+0x122/0x1c0 [ 1120.126699][T30815] ? lockdep_hardirqs_on+0x38/0xe0 [ 1120.131892][T30815] path_openat+0x92c/0x37f0 [ 1120.136493][T30815] do_filp_open+0x191/0x3a0 [ 1120.141100][T30815] ? _raw_spin_unlock+0x24/0x40 [ 1120.145994][T30815] ? __alloc_fd+0x55c/0x600 [ 1120.150576][T30815] do_sys_openat2+0x463/0x770 [ 1120.155286][T30815] __x64_sys_open+0x1af/0x1e0 [ 1120.160687][T30815] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1120.166788][T30815] do_syscall_64+0x73/0xe0 [ 1120.171230][T30815] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1120.177402][T30815] RIP: 0033:0x4161a1 [ 1120.181857][T30815] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 12:14:58 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b4a, &(0x7f0000000000)) 12:14:59 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_freezer_state(r2, &(0x7f0000000000)='THAWED\x00', 0x7) r3 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r3, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) fsetxattr$smack_xattr_label(r3, &(0x7f0000000040)='security.SMACK64IPIN\x00', &(0x7f0000000100)={'#! '}, 0x4, 0x2) [ 1120.201476][T30815] RSP: 002b:00007fc4d6832a90 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1120.211151][T30815] RAX: ffffffffffffffda RBX: 00007fc4d68336d4 RCX: 00000000004161a1 [ 1120.219152][T30815] RDX: 00007fc4d6832afa RSI: 0000000000000002 RDI: 00007fc4d6832af0 [ 1120.227261][T30815] RBP: 0000000000000004 R08: 0000000000000000 R09: 000000000000000a [ 1120.235576][T30815] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1120.243865][T30815] R13: 00007fc4d68336d4 R14: 00007fc4d68339c0 R15: 000000000078bf0c 12:14:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x34000}, 0x0) 12:14:59 executing program 1 (fault-call:0 fault-nth:12): syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:14:59 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0xbce) ioctl$TIOCSISO7816(r1, 0xc0285443, &(0x7f0000000000)={0x2, 0x2, 0xf3, 0x4000000, 0xfffffff7}) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) 12:14:59 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b4b, &(0x7f0000000000)) [ 1120.402039][T30838] FAULT_INJECTION: forcing a failure. [ 1120.402039][T30838] name failslab, interval 1, probability 0, space 0, times 0 [ 1120.414878][T30838] CPU: 1 PID: 30838 Comm: syz-executor.1 Not tainted 5.8.0-rc7-syzkaller #0 [ 1120.423594][T30838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1120.433669][T30838] Call Trace: [ 1120.436976][T30838] dump_stack+0x1f0/0x31e [ 1120.441352][T30838] should_fail+0x38a/0x4e0 [ 1120.445814][T30838] ? security_file_alloc+0x32/0x200 [ 1120.451016][T30838] should_failslab+0x5/0x20 [ 1120.455572][T30838] kmem_cache_alloc+0x53/0x2d0 [ 1120.460377][T30838] security_file_alloc+0x32/0x200 [ 1120.465417][T30838] __alloc_file+0xd7/0x390 [ 1120.469831][T30838] alloc_empty_file+0xa9/0x1b0 [ 1120.474628][T30838] path_openat+0xa8/0x37f0 [ 1120.479087][T30838] ? __lock_acquire+0x116c/0x2c30 [ 1120.484170][T30838] ? trace_mm_page_alloc+0x195/0x1f0 [ 1120.489593][T30838] do_filp_open+0x191/0x3a0 [ 1120.494126][T30838] ? do_raw_spin_unlock+0x134/0x8d0 [ 1120.499357][T30838] ? _raw_spin_unlock+0x24/0x40 [ 1120.504231][T30838] ? __alloc_fd+0x55c/0x600 [ 1120.508776][T30838] do_sys_openat2+0x463/0x770 [ 1120.513492][T30838] __x64_sys_open+0x1af/0x1e0 [ 1120.518196][T30838] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1120.524283][T30838] do_syscall_64+0x73/0xe0 [ 1120.528724][T30838] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1120.534660][T30838] RIP: 0033:0x4161a1 [ 1120.538574][T30838] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1120.558194][T30838] RSP: 002b:00007fc4d6832a90 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1120.566887][T30838] RAX: ffffffffffffffda RBX: 00007fc4d68336d4 RCX: 00000000004161a1 [ 1120.574904][T30838] RDX: 00007fc4d6832afa RSI: 0000000000000002 RDI: 00007fc4d6832af0 [ 1120.582892][T30838] RBP: 0000000000000004 R08: 0000000000000000 R09: 000000000000000a [ 1120.590879][T30838] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1120.598904][T30838] R13: 00007fc4d68336d4 R14: 00007fc4d68339c0 R15: 000000000078bf0c 12:14:59 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:14:59 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x7, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:14:59 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b4c, &(0x7f0000000000)) 12:14:59 executing program 1 (fault-call:0 fault-nth:13): syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:14:59 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) r1 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r1, &(0x7f0000000140), 0x4924b68, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000040)=0x1, 0x4) 12:14:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x400300}, 0x0) 12:14:59 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:14:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x1000000}, 0x0) 12:14:59 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b4d, &(0x7f0000000000)) 12:14:59 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x2, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:14:59 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b4e, &(0x7f0000000000)) 12:15:00 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) shmget(0x1, 0x1000, 0x200, &(0x7f0000ffe000/0x1000)=nil) r1 = shmget(0x0, 0x2000, 0x400, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_INFO(r1, 0xe, &(0x7f00000000c0)=""/235) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e2f66696c65300a2e6781a3e91a38f5d1dec2fe3113e5629ee8bb1b30279f1e8e"], 0xc) 12:15:00 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:00 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x3, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:00 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:00 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x2000000}, 0x0) 12:15:00 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b52, &(0x7f0000000000)) 12:15:00 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[], 0xc) ioctl$USBDEVFS_DROP_PRIVILEGES(0xffffffffffffffff, 0x4004551e, &(0x7f0000000000)=0x8) 12:15:00 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b60, &(0x7f0000000000)) 12:15:00 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x4, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:00 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x88300, 0x0) ioctl$DRM_IOCTL_MODE_GETFB(r1, 0xc01c64ad, &(0x7f0000000040)={0x2, 0xbcf6, 0x7ff, 0x3, 0x0, 0x800, 0x135}) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) 12:15:00 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x3000000}, 0x0) 12:15:00 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x5, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:00 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:01 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:01 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b61, &(0x7f0000000000)) 12:15:01 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x800, 0x0) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) 12:15:01 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x9, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:01 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x7, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x4000000}, 0x0) 12:15:01 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b62, &(0x7f0000000000)) 12:15:01 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:01 executing program 4: r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '\x00'}, 0xc) 12:15:01 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x9, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x5000000}, 0x0) 12:15:01 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xa, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:02 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:02 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b63, &(0x7f0000000000)) 12:15:02 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r1, 0x4b72, &(0x7f0000000280)={0x0, 0x0, 0x2, 0x0, 0x0, &(0x7f0000000440)="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"}) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r2, 0x4b72, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="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"}) ioctl$TCSETAF(r2, 0x5408, &(0x7f00000000c0)={0x2, 0x7, 0x7fff, 0x7, 0x12, "0aa60f37898b0727"}) ioctl$TCSETX(r1, 0x5433, &(0x7f0000000080)={0x1, 0x1000, [0x1e68, 0xcf4b, 0xf0, 0x2, 0x9], 0x8}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="2321202f21667f000000252e34ae96ef136cc645a69323b0b40e33a70c0d6c017f0e3dffc3c8cecf1e212d0ca8e8b296b1e35fad5c418de686"], 0xc) socket$alg(0x26, 0x5, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r3, 0x4b72, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="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"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_G_EXT_CTRLS(r5, 0xc0205647, &(0x7f00000001c0)={0x9b0000, 0xffff, 0x5, 0xffffffffffffffff, 0x0, &(0x7f0000000180)={0x990a91, 0x0, [], @string=&(0x7f0000000140)=0x5}}) ioctl$VHOST_GET_VRING_ENDIAN(r6, 0x4008af14, &(0x7f0000000200)={0x0, 0xc8}) ioctl$KDGKBMODE(r3, 0x4b44, &(0x7f0000000100)) r7 = openat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x123000, 0x10, 0x4}, 0x18) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000300)={0x0, 0x7}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r7, 0x84, 0x7c, &(0x7f0000000380)={r8, 0xffff, 0x2}, 0x8) 12:15:02 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xa, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:02 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x6000000}, 0x0) 12:15:02 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xb, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:02 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b64, &(0x7f0000000000)) 12:15:02 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xb, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:02 executing program 4: syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x6, 0x400080) setsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000040)=0x92, 0x4) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) 12:15:02 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) 12:15:02 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x8000000}, 0x0) 12:15:02 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b65, &(0x7f0000000000)) 12:15:03 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:03 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xc, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:03 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r0, &(0x7f0000005440)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000200)="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", 0x1000}, {&(0x7f0000001200)="2cc974841a0287cab525a4fb781af86884d1084c6de269bf689f0f743ac44b615158d9415ee7c60274f8ff0021f6d3e9e497dd168217478ed2b26394791765126fc46657e3db7ac71406e9f38d04d6246927d40f7c1ca8db587bfbdf9963f3d71a83db8feaf35e49", 0x68}, {&(0x7f0000001280)="2b24b65f4201c3baf5862813a6fef18dd3e4cce4e22299a81328a681b9551b8422c6f02029b665c14ea3a22d1b92583b27b8744a3ada037689f2beb76c491b47787bce14f3ec4ec8c405b119c3a861b29df5101c1e7296b16e385295813fd1352e6237230719f4a22e611b4596e44416b1d054238cd9fd215de97a62d2e3002712a8a7f1e0197eb1817a62726ee6989f6db529b0a79eafd87296f0f787f8b5f3218b113f79634a4a5f7b380541", 0xad}, {&(0x7f0000001340)="a78b41f56ecee2f854e9837a8ef040de095721645b478bfe2854bffe9d8591e1e284a0780f4695cf5ea8a97c4c5923cd103d6f0338bad925043697c6259fe8912eedd893a9fe95c8be84c4ee9f5daeae", 0x50}, {&(0x7f00000013c0)="8a0dbe899634c6ef8366e4df8c9ab0a5df13db4a2f2ef424c4cc8f15e0bc5ea9ef65f92897572528a91a46d1ded92c56976f0f992245f1ecb83ab9c781b077f0e7dcd2b19ef633f291392fa7dd35cf41a36bf59294759e5d2b42b34d5820be503901882c4b52ada23c45cd097ec363079e02093e5ed646878375b122b29d", 0x7e}, {&(0x7f0000001440)}], 0x6}, {0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000001500)="0a252c1db8e6fdd80796af6e3d4dc428e055ff71175f82ea6abfe28b7948fb9eeaaa82f5231fbd0e380a6c7c61d5e07bf24e1753ff6ba60f444dc2f576328e48c4e8199aff26624695ea9c291434cfecb0e15900a960a1bb4c77919ed91f193b9ced70d513e2d82f022f5e4007be627b4a43e30a49e641187b07e236a1ee83573f6d22e9e3d1e0", 0x87}, {&(0x7f00000015c0)="caf41b8cf1f85fe4e0ad90838fc3aab960b2453bb3967ff3aa59d3c4bb5e2960807a33a0f0bd202fc56bdd027a0096e4a89e6199c810b5b5a61a136bc8025fad4188ea913cff99ddd301eb2f83a42faf871a9db2032a3340203ceda3325b9a313f74f82e5c9161512c44b384315567ca8c027873a216ceed4a6b119276ff1528341aaac90e65a2529da8ebcddae927d05ab42057116d8a92", 0x98}], 0x2, &(0x7f00000016c0)=[@assoc={0x18, 0x117, 0x4, 0x66b}, @iv={0x50, 0x117, 0x2, 0x3b, "701fd9e52c4726d603db38cd97a76cc5bf09ffe7a823f87f0d65aaab70d8047249ebfbc241f1077bc4476c178c87a3b6844f4f0f2a5907406a25ea"}, @op={0x18}, @op={0x18}], 0x98, 0x24}, {0x0, 0x0, &(0x7f00000028c0), 0x0, 0x0, 0x0, 0x890}, {0x0, 0x0, &(0x7f0000002980)=[{&(0x7f0000002900)="a1ae9643f258f05734270c17dc229c7e6a343098ca9a6cf1331c44198019675a5406a371d8c8f64393bb6078a91f8d1207e91d4d477cd0eaa16f69441327291fcbb20c7434aafb1439e220bcd084e3eb", 0x50}], 0x1, &(0x7f00000029c0)=[@iv={0x28, 0x117, 0x2, 0xd, "4ce2f5c1efc8f48d4e6b6f8ab9"}], 0x28, 0xc000}, {0x0, 0x0, &(0x7f0000003e40)=[{&(0x7f0000002a00)="f71faa2046c7d6ac30baee169f8d1993ed9c5f14c54d9070d2ed3e08563198da8f948b8478af99773dad21aaeb3e3e53e1c923793e90b55b36f5dfb74d8a9c1b8727c68d75606d05c683f82b1731049973b077", 0x53}, {&(0x7f0000002a80)="f7a5c6d8910fd801e84337f8a026d813549ada47fee6a24c9fa52cf56b1975576c44948886dff627cb2a89e2104a0dab62db332f11ebff27f94461d87364d0b9acef25e7871709b73c7a8d4dc6bdfa18101e43928a1f886bcfc4aacac7cdf14d6f870f1896334ea525e4de8849e7958e8c9159d7960e7b9db22e9028a0591f2d8f8ae16060534737520c5d2a6ef59dd442cf1dc744aa420f2d81a5837c7e3d724e541d88a940014c8f97adfa9a9e787c8ed57e", 0xb3}, {&(0x7f0000002b40)="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", 0x1000}, {&(0x7f0000003b40)}, {&(0x7f0000003b80)="1a8e7f2454895409283558bbf0a31fd5c5d1adf330a777c93b858f351789350928cebb670e52783d631173e6c7e1df1aac75c2f8645a645dc1f26a02fa663dd6142ada39f8cb62eb26566d5cfa7ac7", 0x4f}, {&(0x7f0000003c00)="bd811144dc8c699b6b6a864cb10bd73c0039ebfaf6e5cc52b4bc27f3f85ca35845a65a9a1b534059dc26d3e5776f57bc39d5dde4fb10c7cc0bd40db680de6c588e30ebe080a9db3144b059aab58059b0c2b037fa23405954ae39cafe577979e564f0b4692bdc15409dc731670ffb11c5e896568b45bdd68f8efe123e098670b00b02fa219865468b65e425d9ab56cdc2420b3ff251968f4114fcb4598a230880591f319f42a52e4570d13dfc4d26b3ce818c17fa00f296e3ab8e984857c9ac7b09a94b289cc702bdf7551cb6e6d5a3bea046b48d1aa72ce1f9b7570968e32c", 0xdf}, {&(0x7f0000003d00)="6335732a5772306c2673251ea8879b219fee55c1c67c47bdf8ed3fd47ebc2ea785083af9bd09066278e73fb167ac518fc16724c92211c5d57e3dfe3a06d1d937335c161ba1d9a1be452e0af7c6c05017", 0x50}, {&(0x7f0000003d80)="6d1d446de41d4a631c7814a200d90f6d6ebf4164c9bf39920554e5306a416139248f543e39d1c7eb248978c6b38853cce8036c33c223c05157dc0ba34b4e5c14dfee40d329b4ff970ee127535c6c0bb69098a91b11495ece08003ab15c77bc638421c7baa0d9c8cce4c3232fc7deb9dfab8da37b0644e6ecc3b59fb7c7730741f9484f8e15a171576eb15eac8b24edb20fe232343c6c17f89a3499d2bec1daf288128d4968b77377bbe089cf781784", 0xaf}], 0x8, &(0x7f0000003ec0)=[@iv={0x68, 0x117, 0x2, 0x4d, "da9db9e073b16b068596ac5685a4a46e98f7f3b1cfdfc3e3b96b74e67079ca474c113c5962fee08231da11632e15c5f70598bd048315a0813739305f4fb246dd5eb3462708c238e88aac9a7a2c"}, @op={0x18}, @iv={0x88, 0x117, 0x2, 0x6d, "88b9b5721f8c71608746674a5b217847524d9bcb3cfb93c52c9e5e4486f87be5126742ae1deea3c0fabec48683d2c36189b2b2ae7f39983ab8285bb51b1df5af21b1fde66aaf5439cb66a60f2b6feecb1afd3140671b7e5da37e29c8ca3c3a618e6a9c3df7663eb66577134a8f"}, @iv={0x1018, 0x117, 0x2, 0x1000, "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"}, @iv={0xf8, 0x117, 0x2, 0xe4, "19baba8a68b4184f0e45d48bacde9951ee0f59c388dc7194678458f6e236ed1b9090e94cfb19c036ab84f2792566dc948a22ceb805fd3a4319553457716ad1eaa48c3b85cf30b6dcd8eda0c6a6b846af9dca0d57814b4093b21eab5f6c35ee339adbf6a2c217fda72a903850995a44d03f62042cad3575a31eb16bacd1d975c7a09d9e9627ebcb86c0f64f101c2159709bd03d938dc9c5ea910d03908a52ff1e39765ea4b62179c6b7fd24162d288aef43f477c7948509db892aabba0f434989f1814a57d83ece92b618f123456a00341888429fc8070218172b80670a896491590cd9ef"}, @assoc={0x18, 0x117, 0x4, 0xfe000000}, @iv={0x100, 0x117, 0x2, 0xeb, "da90a4d3a6b54b63007c5ac0d31e2c3fd4ef215c1d4da5dfe52fa0007109dcdcb7238aa5ba9fef2d6a01c11b051e42c50fa6eea9229ba678cb52e584a570cb05c2e2480e2d2d87aee21ebbbd90cc2e3374c5b6394337d9c54c5642f3da61f712e1bf8cabc5965c7589c4b874ccc06dde4fe4bd2b855f3e0878add5bb8b59ec0bdcbcbb61751c7918653ce53fed9e981e68c41d2688be2a8c34af151fc91a3ac092ed1d6018e52f71b9b96354f575da235f706a86bde7ffd0f20763b28352999c8444feeb5514371822ae9b445ed0900804cf2c3cde1bab91be40f9d8ec0bbef4187ad4978da8f245c888a7"}, @op={0x18, 0x117, 0x3, 0x1}], 0x1348, 0x810}, {0x0, 0x0, &(0x7f00000053c0)=[{&(0x7f0000005240)="4a6c26b4d3ff235daa8587f0adcb6f868ec11ab81043f78d4d17d62a8bd1dfa82b026774d3a5e9bd92c53b40c83cb75a255b43c2932b066ce982c0af56f6658e8407af2ee00a5ba41fc00404eb2c6be1400c017b2ed8c64031fa741abc4611cc9b4af45fdee56aba5e4f655265125beea8a74607f7f3a68cd1", 0x79}, {&(0x7f00000052c0)="79757d9cc608b77b3653249d57b50aa6c9322341367c2223c20244e1690786899b04de4dce73ec90cec2085f59800a0d3b2577ed6dc8ebd1fe7bb2ef9e66cfe8718634777ae6c00352bb62a95aff349fa3a0cf6a09fbd97253beca4229edcab261d35e92b610fb82592fb33c1898c41492f5f53e2ee10e6f255d87f1d78678dfdd8a67835204a084c45b1d483e04670f5454803bf01201abbeaf894d096595cb3936bdf0d1e6995986a3f9107f705d402bc0e967ebcbcb6f77ebbd153df9cfc4a45a96c433151021e41f466539631b079141d0f53257ad6579440ad7fedf9422312a015b039d294e200dbdf5e0316b7ef699", 0xf2}], 0x2, &(0x7f0000005400), 0x0, 0x80c0}], 0x6, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000000)={r3}, &(0x7f0000000040)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000000c0)={r3, 0x7fff, 0xfe, "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"}, 0x106) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r4, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) 12:15:03 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xc, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:03 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b66, &(0x7f0000000000)) 12:15:03 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x9000000}, 0x0) 12:15:03 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='\x00'/12], 0xc) syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x2) 12:15:03 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xd, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:03 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b67, &(0x7f0000000000)) 12:15:03 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xd, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:03 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0xa000000}, 0x0) 12:15:03 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_DIRECT_IO(r2, 0x4c08, 0x3f) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0x5) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r3, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) 12:15:04 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:04 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xe, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:04 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b68, &(0x7f0000000000)) 12:15:04 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r1, 0x4b72, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="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"}) ioctl$TIOCL_UNBLANKSCREEN(r1, 0x541c, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="2321202e2f66696c65300a2e6f43203633a12c2be0b50591ed3214235d4dce27564f66579124b4d1c6f5d8081be7394004fefaa84972406c335320fd16c91747c9c88b2610eb5d0bd34009f4a524c890243999660cb56678122b0b5c0bc12d9507ceddfad57dcbd7daa52b0085214b2fa1dd1904746bfc557f517d8171a12440f56dd9a7c0c4826909aa428e"], 0xc) 12:15:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0xb000000}, 0x0) 12:15:04 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xe, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:04 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b69, &(0x7f0000000000)) 12:15:04 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x10, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:04 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b6a, &(0x7f0000000000)) 12:15:04 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r0, 0x800442d3, &(0x7f0000000040)={0xfffffffc, 0x0, 0x0, @random="ed464cf686bf", 'veth0_macvtap\x00'}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='#! &/file0\n.'], 0xc) 12:15:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0xc000000}, 0x0) 12:15:04 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x11, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:04 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b6b, &(0x7f0000000000)) 12:15:04 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x12, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:04 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) 12:15:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0xf000000}, 0x0) 12:15:04 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:04 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x10, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x25, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:05 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b6c, &(0x7f0000000000)) 12:15:05 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) r1 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r1, &(0x7f0000000140), 0x4924b68, 0x0) getsockopt$CAN_RAW_RECV_OWN_MSGS(r1, 0x65, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) 12:15:05 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x10000000}, 0x0) 12:15:05 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x11, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x5c, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:05 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b6d, &(0x7f0000000000)) 12:15:05 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x11000000}, 0x0) 12:15:05 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b70, &(0x7f0000000000)) 12:15:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x300, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:05 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x500, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:05 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b71, &(0x7f0000000000)) 12:15:05 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = semget$private(0x0, 0x20000000102, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x2, 0xfe00}], 0x1, 0x0) semop(r1, &(0x7f0000000000)=[{0x2, 0x7fff}], 0x1) semctl$IPC_RMID(r1, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) 12:15:05 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x12000000}, 0x0) 12:15:05 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x12, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:05 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b72, &(0x7f0000000000)) 12:15:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x600, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x700, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:06 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) 12:15:06 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4bfa, &(0x7f0000000000)) 12:15:06 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x13000000}, 0x0) 12:15:06 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:06 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x25, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:06 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4bfb, &(0x7f0000000000)) 12:15:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x900, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:06 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x3f000000}, 0x0) 12:15:06 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000001700)=ANY=[@ANYBLOB="2321202e2f66696c65300a2edc85f1a72dbb3dc1aa01de4bc9a444c36528752a86548d742422def056750ca9c9a01b6df614f1f131418b9c976b652924a603d87804e2468e6abf7db9ac1070c36ae06bf0e831f71301044313b2fb00"/103], 0xc) r1 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r1, &(0x7f0000000140), 0x4924b68, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vcsu\x00', 0x300, 0x0) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000000)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="08e385c8f9edf59744", 0x9}], 0x1, &(0x7f0000000140)=[{0xb0, 0xff, 0x800, "dee30167fdb73060e1629bea149fd164da0a824dd4368178304a035c8ef5070c679dc31d337e50018a065d3015a4eb6b8f29bae5930643e082ff658c243d6053d17652ba26a07c0bac71d3efab67bf0f7380fbe7db15b0ced7d2ce5634233e8cfee1f29502773786a532c835e3bf81d455c147e9e09042f9893e2670b09795e080f9fbbe2c7fdca415f622c7f887b6da4198b71aa6085b483d2899"}, {0xc0, 0x100, 0x0, "eb844325a48fbf43534d72c53581766abe3319ea3198029e7c3cb47cdc3e96627dc17cde6cc686f052e2a58d34aa60cffabdc0d9086394d8136d268a0b74bff9ce7d3be46d8a0bf826369a22e5d9198a14c46a4908b8f2c9aa029d2d904442ef5a9672e280eace8851d3c0a73641e735878144b02d93a0db6eced812dc65ae6b4f1ba84cb9439c27f254c4c9c9c64ad135dce2c0bf18c0eb3bb79bb0fe9b66fa710a10a754f11b25c599dfe1"}, {0x38, 0x117, 0x2, "c107703d004000005b7b0b29773f1ff326f1041ce35b42732d67a8e5ff1705f50f6304849d1aa3"}, {0xb8, 0x110, 0x80000001, "0c20f22dc6562c771d1f3ee170c5ec30b4ca4fbe917a11623c5c44b06b38ca3bb548d7a406d200077295b26dba38f298bc63313eb14222ca15b8f674553bbf660e6ca3fb7def4f4595d46bc4ce54906c126b58e7eea56c47b1975ab4e35aba499a915b673940bd3890a87cfdb1f0ac174e0f19055e35dfe37411c347f0e378354d8614c7b424f44ea267fb45f3336eacea2adeafc8fac9703bd704d245887aeb87cd329f5849"}, {0xa0, 0x116, 0xffffffff, "99bab8a0ffb93fe4c6468712aee0d3fb69aa1a0ca0b19c52b39593e09a746078c2e39a9cbcb6c1dd5e15603b60d8d418259e7a6591fd835ad2437c811cf91084817e6b0bb5b8a96f0575350bb44f6f13c6d5886e74e7cce5b9d04e3a6549f9dd9744e8edf6a883ca9011d11b2cab40284b4aa66d90c130142f12069f5c08c7b329ca390949378e17c77ba39df7"}, {0xd8, 0x110, 0x7, "9ef61de505d254468e659eb9aa6e2beaabca8d8cc7dc47465304100194aec78fefbff31acdbc299c7b0cb1cee62b427cb54c0bbdf444fa8a14459b7cc9f413fd5e435c4a8e60b4eac963535d16a1b5ca80d4c1cbe4855152775e891098f4863115df67661d9ce81211d8a65f51172b3df191b55d54e96523f27273d342b5c32388ed7e3850bdb07e008caeed096637247ed29e631c316e3507af04cad0233efb720bf1b53ba92fb0e6f58b4ce6b5ada6d01315dfa37471beda4e48c93d41919a6a2e1e35"}], 0x3d8}, 0x80) lsetxattr$trusted_overlay_opaque(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.opaque\x00', &(0x7f0000000640)='y\x00', 0x2, 0x1) r3 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r3, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) recvfrom(r3, &(0x7f0000000680)=""/4096, 0x1000, 0x10000, &(0x7f0000001680)=@rc={0x1f, @any, 0x4}, 0x80) 12:15:06 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4c01, &(0x7f0000000000)) 12:15:06 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x40000000}, 0x0) 12:15:06 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x5409, &(0x7f0000000000)) 12:15:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xa00, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xb00, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:07 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x540b, &(0x7f0000000000)) 12:15:07 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:07 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x60000000}, 0x0) 12:15:07 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x48, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xc00, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:07 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x540c, &(0x7f0000000000)) 12:15:07 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) r1 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4) 12:15:07 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x540d, &(0x7f0000000000)) 12:15:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xd00, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:07 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:07 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x65580000}, 0x0) 12:15:07 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioctl$USBDEVFS_SETINTERFACE(0xffffffffffffffff, 0x80085504, &(0x7f0000000000)={0x6, 0x7}) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0', [], 0xa, '.'}, 0xc) 12:15:07 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x540e, &(0x7f0000000000)) 12:15:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xe00, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:07 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x4c, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:07 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x81000000}, 0x0) 12:15:07 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:08 executing program 4: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(0xffffffffffffffff, 0x4018f50b, &(0x7f0000000000)={0x1, 0x7, 0x4}) 12:15:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x1100, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:08 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x540f, &(0x7f0000000000)) 12:15:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x1200, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:08 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:08 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x88470000}, 0x0) 12:15:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x1f00, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:08 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r1, &(0x7f0000000140), 0x4924b68, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000000)={0x3, 0x8204, 0x1, 0x8, 0x0}, &(0x7f0000000040)=0x10) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) setsockopt$bt_BT_SECURITY(r7, 0x112, 0x4, &(0x7f0000000080)={0xb, 0x9}, 0x2) r8 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r5, 0x84, 0x0, &(0x7f0000000000)={r9}, &(0x7f0000000040)=0x10) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f00000000c0)={r4, 0x7ffffffe, 0x1, 0x100, 0x3, 0x4, 0x8, 0x200, {r9, @in6={{0xa, 0x4e23, 0x1, @private0={0xfc, 0x0, [], 0x1}}}, 0x564a, 0x0, 0x2, 0x0, 0x6}}, &(0x7f0000000180)=0xb0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB='.'], 0xc) 12:15:08 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x5c, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:08 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x5410, &(0x7f0000000000)) 12:15:08 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x2500, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x88480000}, 0x0) 12:15:08 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:08 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x5412, &(0x7f0000000000)) 12:15:08 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x5413, &(0x7f0000000000)) 12:15:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x5c00, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:08 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f00000010c0)=ANY=[@ANYBLOB="03217429ad2e0f000000002c91002c90ad2f29ef01227c4bf87501bfce98c71cbcc7e8cb0b023d1f0f22723ae7b68d4c7a186ccf481be9fad8e3965b8c92c082ff5da435f71456f90f9802f5839ad8df9cfdde3559444d158adf66b3df6a22b8f666c80f868561d7fa599460ea129014c865d313c13a509917efd9299e7e342950d4dff452086141e2a719fd6ca579387ab18aa7399300f703553285b63db36c1ae249706c65dbcd52024dadbb9747c6db2c76654932789c74c52eb2af8b48c2e8ba55f280996202819ee3ca383a35b6d8369213f9eb37c7689503438195e552704b95b118359cf6e368a3a843cce95c774da10c288ee14634f0fdbee01b4c"], 0xc) r1 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r1, &(0x7f0000000140), 0x4924b68, 0x0) sendto$rose(r1, &(0x7f00000011c0)="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", 0x1000, 0x4000000, &(0x7f0000000000)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, 0x4, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @null]}, 0x40) 12:15:08 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:08 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x5414, &(0x7f0000000000)) 12:15:08 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x68, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x88a8ffff}, 0x0) 12:15:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xeffd, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:08 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:08 executing program 4: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0', [], 0xa, '.'}, 0xc) 12:15:08 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x5415, &(0x7f0000000000)) 12:15:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xfdef, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x9effffff}, 0x0) 12:15:09 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:09 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x6, 0x20000) ioctl$SG_GET_PACK_ID(r1, 0x227c, &(0x7f0000000100)) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x101000, 0x0) write$smack_current(r2, &(0x7f0000000040)={'#! '}, 0x4) r3 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r3, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) writev(r3, &(0x7f0000003600)=[{&(0x7f0000000140)="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", 0x1000}, {&(0x7f0000001140)="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", 0x1000}, {&(0x7f0000002140)="acc14aecce6ce071cf1bc70745c8174a98429aa6665f55896922b5e511f36e9088e6bbaaa7a0bdb0648f3b15f386ae720ba6f43dac647e9050ea7076a372dd316f042068fca5893f6cf85b1c5693b9eea196e3e4b27c7daf5e6dc2aaf240bb3beab36df02eb5e0b1961f81d15a4581aff1f209ff1b95e9471e633db102be72aee4655dd389699de7d439334058ea5e6cc16cc67db4ef51ff552d0685e763fea672d7c314a898c5140ac2db9664c0b520f793dac049b2c5bda0df48fc7e194d6c2151cda5138232066e9424a498cf864d0ceead0c4661c3fb809f4baf", 0xdc}, {&(0x7f0000002240)="d3b44e684ff124424770096f7070c684a9930d5077acaeb968dcc83b47a0e08a16b8abf16ae617c5a3", 0x29}, {&(0x7f0000002280)="85e4968c0967c064147ad6584b65722e8ea8b974cd1c4bb204d02a9c1c049fe0461406b65b7bf2afae301cc963c34ed9a15abd4129171bae23bca6f5095dde06e02d8c795746f8ff4c25b92731b3bf37a5654fe72babf135dcaed3d1323bafb68db69041007d6dd377b45601ddbf5cfaa6f8b1ce7bc70986841d1f81e78e3adc344d167c97e378a2c86abc7392a3ead254e388e4f761f5ba856f46a626f598feed9f61fd655b1f1542f41e1fe33d7fb9", 0xb0}, {&(0x7f0000002340)="05cbdfa99c2bb5aa8531c98b5a3855adb3470f47173e50005a22e5577ab97ca4d93b1fca6d1c9b4fad9b6ba47e301dfbe8eecde03bac17b60b25a417072e27041aeb06812d1773632e0ad37259a9d5d91f73726394eb381b2e5db4086f9ab35ba51addac9e39a624aa7bf7d7b1a59d0390a4248da960adf227c4e06a3113da0e3bf384a54ad88bc5a71b804f6798f51cab2b3a33fe1d1ad50e94fd558819abda69251990e4cdb8052bf74c7ac77d6d7d9a7f6e46979b3b035d3a55f094c7802520cae638177b177107666dfb71ee2da623d921bb4632e89cb0d2d1ffb07fa72b47eb9b04e19e6df3fce08afe0729e79d77858d45d96c01edf50493b842f12e5a9de818c90f44f8d5d0b502be50134e8088f6bde8a9b7c19ff2a494063c5cf7c85b97ad6d1ba1a8eee72f5c1897d3a3da109aa8e547210ced4f02c8712965941ba25bc691f4e344ddcb15e780ae6befdd24127fe14276c93820cfe91c6ed7c2234640c53f09a86d6b219cf2d8ad086939a8b2088ab8e59a6a1f2b1b43866a5bc6d744f28cdc9a84ef3997cd50dba2d95eb7ce00d51cf787442e83e4bc970779803263d72b9de435e078d520aedb6caf37e3d0e57da55fa4105190697b097036e14ab6cb214a68c6d81f62da3636a9ce37819bbc95e74798e0d5cbb4479cccac6ed03af4d0df02d9dea50eb0d8dfde0c20828de49b5006579525af9fc2a36c78cfc82277c3218840d21f31b44946f9816f5b1a55ec40c49bf9b39012fc6549c51cfb50ff446dc6d7438780df703b8a72735f3e104f35855d1b808a1a2f6d7a5c87d2728f626ab767b213459ac75fc9c79181fe7adcd4e90264c00895a188ad44f5a904bb1b0df8214f6ae95a4455c484756a5588dd7e5aa8c88e06f36c9229ac4375c87c75a7543548058bcf9973a46543b5a5252d38f3519014deafd47f02a6f44abe502eec8f5ab54f02f63d656de198f3a5c76c17d6ff633d2dde90488ec75552c17d84b64c834e8c49681a20a673c7866e447481f85bee9c00cd0c4a11b80a2a0541076e730d3ffc561b1bdf92e857990b6ef3eefad7e772a36438f28bb976459c1ec868080c838c712a673f10ea134e37690f5e5c8b9d0d75224911c61ea23a42536c675835a25f208b84eb92efe9f61d0c45765662881559808ff0e2b5ba5ffb43f1eea37959fb0a8921585417d30d5fb769ce6ba45db7a6fdddb88d24647999c78a20ccbed31ac2c7e6b5d72dcdeb67ec64d3ce9813f4fff096a14c8de00c18c3a37e264890f7ea1f8b403504bdde1daec397b441844acefdf9ff07c0089f7c361a117dd01da5fc5e5d406ee0cb07c9a093a4b6c87a85391e6515279027d8b9e5d114844121002f068c98b2c870075a4b356951b6a37aa78cee857b6d4a0c78fb200f06e794856950a8ae24706fd92bda5dfef5b73bc2e012b32259121bbb71370bd723db50bd92513fa5a2c29d462b19c4280d195d13f6ed33d776f234c91a59b3782534ab00e8ac59f2dffd9f3ef6d83ab4ff390a6d146827509701c024ebeeeb4850340896c6325f6efc023848439693f746389e099bcd2c8dd123e0f68422d8f10f3ec48e6cf043d63afd807ecf86084ebcc572632cbf2d2f7af4291debab5a2baa111f94d36f2b2113c0ed1f1c68f829dc42c91b121a8c069cbdd72f6e7f187afe6754c9e5955cc3c699410619580b0314e191253b9ee70b85648acfc3e5ae8cc5063264df7d74299a9cfb7d6196632bbd4dcf28f49c98b544f53e3884d0f3899e99bb2e4a400093eabf22ef32a533146196fc72353ecfab5519ba2e2a59c7ed59ab073eb81e772004f105c183dd4ee2d787187d9c2299ce6df8145ec4afd010ab5ca6a67b100ed94a3e78a30d8edaabd313d0abcdf4f66aaaea28a57ffe46aec13e3560892f48b939ee9bcb92dedce62037a7abfafe24ea287248d4670cff9c03c9c51033020c3d77e472185f9381357dad4b39b1b5010af5dc37c2d13bed60835e2592efb0abc01f64ea47293122b08d3227791462600ed6ce1fe9620e579ba2363dd4a43372e11e70ca36e7d74e841e5b1ffbc7c34eeae72a13dbcea379d7c2e8fb54ed2153be39524ff1bc28b87d25d9fa3154761ec0b77aa9134004158a744d45ba487fdccdba02d35be64767a7cb23e4892b44400753f35f9e264cb7b0e57e3cf9d0937f3e8b202084cfbdfe7eb5d430405d1d339fb12bcabfa654f1d323f988488428bb4c97dd006faafa1921c64ed64d336a958a46954af09e2e9ee19367993afb75a31ada1ac35380dcfd3c65fd0116733c52a1cb55aa0c039db600c170f539fd3aa4c7adc5b973ed2b340db661ddbbfe66d9832facae8c71130ca76a29ad33e50aa7e108951a2e9a0befed9a8ecc3afb160142c1df88d535157972e595c9edab74d15c110e166380f5069dd4413fd9a1d0c04405ff664e59bfc95ec3e3ea8beb0b9989e767a8e261d6f1359d344c28131a50ceb263703b9c1653638f446dcda180973281a499c67c392df1cc3d6857d4d585788b913241dbffc2660e1fedc91f880706a194fa78f6314fcb9276a47897b79e04a216efe4697d4ac485e83810bdd147ce3caca82b550a80af20f3217ce41cdeff41d51684409d84b8bb827d218e33fd804a69857c96d243ff7890dace79cb20f8339548edad48c956e76c3bb935eb5c5692d1162de951808e87daee915c970811bfc2237d23be3be0695c0859cc0c4024c1a850bb1b4cbedfbb3bd47a28dc7452cc313b992ce0bab12cd0ef566a43d03a315cab1ab412fb99aa8c41c4ecd05ff9cf59e27e707f920a67995172dbad0e38287717c6e2dbf5460b0e1c9c40ed168f651f2a791d4f377594c3c73bd9beda70329caa996cbec7e096b6be8130028f6d01a18dfcd4d3d5d0270a110c8a47b6a3e955c819192a84e1c22d1ab58d6e72ef31b470c81c6f0912b38eca9199eb76d757f207ab0c22fa6f9d7f1a8c86dc92fe48e5c0e9306a95f4fd65ad69fcc1ea98021530fccca7454fdb9f0ca965ce3a5174a908abc84e83287eb489ab61f809ac18541918ababc77f2a18ac98d7698a0d825d90bd81db25a387102272b917e39feebf32cd783cdf022f40a93bc3629686ba0b99efeab92e52465475d0f0cbf64f6c8f84bb762a1c1fae2de66292bde49c8fdb69aeb86b12bd099fc63efe90970cbe89ccd0a9a58d486b445550d8b5313de5d60389d9ee835f70b94202a6e8cf1e24804dc4850d3cd10361fdc252da019c4fba72e0afe531ac765fa469f5025fa07b18050df2db71a91166e3b2dd4b8bbba34fa422d9e28847c4acb906c126f75957d996d19e0ea5a647ffb6deaceab9283bc72da4c15f8589b40a4dbc0d1e0f13a2e2ab3d225e5b623165bc823e823a752a34560cfc8e0e546ec8692c316cd5dbe66e21fedd1819159f222d216200fcacc207388395f66f4c6862286a6a1e37c6ba2b89e6c7028b4597a88d078f971724750443726bfcf49b84ac61376ec1e2e0f03f8830c12db9a6e22123ef9b10c32ae4b57d32034080048ceae71b4dee14776da609530038f99a97f83022d507a156cfe206ef8ee585f6a4739d215c18daf2e636921fd697cd3e9a44336bde1b3a9b4f5f1a7aa53fbe68a1f3b76706221533f9fad527f2ab7edb38b723903a54fb2ef95e96758d84e5d84363d8bf60eb83b433ba1587fece299456e149f9f4d7b65d798153b321d68339690e3b909d875aebc5e561996289401c40728b7dbe9c8b10b430de8010f72e836c437246caf52623cbf24d7036806fd081897df69ba35c068f56363d6ee62bcda369b4c60dd9d8549ec9b345a590650dcc82efaf47fc1d7fac7b14b9505cf688ab451289c87a301939a5010f1ab04bcf3a9156c606a9125789f8eb517e4456385b6ccc85e7a5bddc7efecd28decabfab1d3983be84d8fc96d4fe638a2f25dc80aaba6bea3ab8a7901501b07f2c6ee7b4364eaf6183f29f94fe7f257dd904ea149210152436d56aa72bd41b90a4c25f6d9588554924eabea40e62a98d920568887afef62221d161bab7c62e3f1a1acc511d98b3b1759129698b3644ee75812e994d99e3efe2c3f6dbddc645d8c15ea7879a67d18d6b9f24aaa638c6107f9335b77be5dc81801d3d0728b93ed05b81a140ea50f6509155b1c9726f152653bfc8347d3b8f3e1d93fdb3df2628d54b148d72cd5a4861b1c601131bcb6d75a52b1a1a17193efdcd560fc06158b83717acbe28ee67c7510b02f05a4d90b2fd9e2804ba98a4bd8732db84f8c5abf6c96a985af55b888e2f85e4517fe4b781631e4e17270e46a4edddbb9fb7c15ee42a8cba6b732937c1fa8252dd1c9459741c7b20096c6197851d2266d38fd386afe7aa93aacc36b6ffb135faff4e5da8071fd025c6ec577da3a23838622c4a17b6aac68b9f0080ab21cb29c327309dbeb6bd249f1171c5baba10ca4f840f9f1e561a8643bfc9de8104c20a1c5f463bf741eb187fc6497a52ced7b080d21da57b5fb9bbfd6f6d6f9f7516d57b4c3765bf2fcb544159e5a4c310573c150ae48388f613f57d531f15c6348316d4f0763532da49abcf4df68008eae6e90cb2c7f87d65d0fee6475a8da397fd9a5967c4f040d9c82e452f2b6b61ae91463225bb4d9b01e87e0ef88643169a582a8ee1144ffce865af9566fd5f104f9b085d38f04997fd27f3845be3aafef5ebe9fa3b4b32d6173487834216b83cc18a75b26b17c296688eccc6f044fdb75d8cc635bd5d87bed82e2c00cb0639023be756f2d67e4c2bd0e5e990d1e425da3b287b35cf372bada2e5d0a20c49baeb955b84d0533d324e3de22b0c5447bf741c3e0369e3828fc59b2f1e715852d9f4a53b9775c48a1a5688e6ad77ec5cd1cf9bf3c26e25e0804f09f2be2486e96c65c197e8373604fe94fe49e62192777d577485e9667e961bc8776c952317a0b8f9b616470cafce3d7b0b9ba75356e85e529656850db659ffbf8de464339dc3406a24171ad760907e2e10354ad086197c62b240e7f7fb982b63c254a8464275c1d355b8eb2742c13b77d1347a3d083358a77100620a7054bcb70da2530d9e72fce8fbc342f9bb9da4ea0d2ee146ab317e808dcd8d660db9a8749306b7d18088e8bb3e90674b2e83087e8742c686f6268ec732c0cba872bb36ce8eef3300b7df2acac719e41aec91950fd82f9f3c1536817ce618ad61ece896a76ab9033579b6df45913fa4d6f8b7093fac46c2c93d8e08d9a5da3597c322322275580c746344d97572d42c249b6ff836f9cf7e5d2406958d31eb5a0f68d3c2b45123e9f793573238683ed56d761eb571e2feb055edf521bdbbc033a652eac67e66231a6e9cd13b2d2946d6572b5cd45f7849e2d3a10d62b680fa93670ec64fadfa6576a4b52add8cb9ee55f2db7f212277b7d1fb65583cf6566b8cdc9e77f415c17d04c834893c438d5b0d14d169d121870b889a682b1694e6951caabeabdd7db23c74117217922d11d4ffb3225b54a95c1214b058c49f8313691f49607d7ff1e437d82d835536de623a1d0498bb5333f681738ee462dd1fb6b1131f651e67ac445fb3e253ce7242065ccb1979af7eff35377ff379766d3dd1577462338075e16dd8478dcf769143c1fccd0c15104d03075fe8dd58891e159dee09fc5cc61d9b1cc9718aa7dff22be9b5bbae4c9a2200977d303e3f52cc4e766ba8b9ef05e350a0006f08a7c6e9c7f85336f8316d414e65139b07cb6da1d620ecb5fb38acabdd51376d68bd0d73244d6931c96b0c5a4ef7e087091b33825112a254d488f747988e", 0x1000}, {&(0x7f0000003340)="9c1e51f20d9e783caadbf2ffb068d05ab092dbd2991368c36ed1285f06ec3f265ea8953aab016d7c3a3cdaeeb2fc0cfa2bee7a446df9ccfa4b4dbf17fd055857251a97f43cff91610b9bf451255e75e060dcfda8dfc5448e58547360d6498f1201e04ad9e2f8aacfbc0a0975db25a65f13d14e001094c2d8d221231205ed09007c6231accd39a3a2e53bfefd23345f3db45e3ec3048ca43fc74cdfdbf23b60a0bd8253e62e8108f58df1d6f6cbbc0587c1295bd9439617a896e3418cb99bb2a9f41e985d8d1b41a070f945909763caad97b0a08fa12eeafa1a6490b7a77187fe4ba5e314ab4d10506b", 0xe9}, {&(0x7f0000003440)="accf95926f529ba40fa8789a9d2ec1ab72e0d81a604d6bea90e810cbf33d6829963e62c8debddb0db34045cb26705a5923cad76c2cecbf0418706a941f4230a1a8e8c0e033c15e16353e687c428aead45429a0c125087b3333c2eba8796d6f36cfcf00beaf6110ee60c8db2fd9ffb0b5ce2926a9699d1f8b03ecd916f72a76fb6b5ee3f83e1774316fffa3697a9a87bbb150361876a6fe60d50f47e43427ca80241a9d61", 0xa4}, {&(0x7f0000003500)="4515ed83031f652ce235fb61e392eb3da1fe22913dfb1a7fd55d66ca44029aa2099742a06e14f59e1a567f9e5955346c62350eb0905815e277c4398f2c20615c6ab5027d7520e5dab369def09a2329f4618b6f3a000a67679717904fdf8769ba8002b44a6d1788ccff6e1e5a3c71627d845acb56c534bf2f5928a21f176d2c9be25538a100d0d68e092a0647098fc885d361e939763868bfbf6cbed1a2dacdc2e0f1cd6ba240cb2082d916507eeea6e5ac7f6708d3889cd8e1b5db32bbf5a7598ed68796749fc105fe43aab89cdc01541e8dd804860accff601e9f84d73b446fb89e6cb047e7", 0xe6}, {0xffffffffffffffff}], 0xa) 12:15:09 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x5416, &(0x7f0000000000)) 12:15:09 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x6c, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x80000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:09 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:09 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r2, 0x800442d4, &(0x7f0000000000)=0x7) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) 12:15:09 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x5417, &(0x7f0000000000)) 12:15:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0xcd0f0000}, 0x0) 12:15:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f4da0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:09 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xf0ff7f, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x1000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:09 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) 12:15:09 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x5418, &(0x7f0000000000)) 12:15:09 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x74, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:09 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x2000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0xe8030000}, 0x0) 12:15:09 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541b, &(0x7f0000000000)) 12:15:09 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r1, 0x4b72, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="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"}) ioctl$TIOCL_SCROLLCONSOLE(r1, 0x541c, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) 12:15:09 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:09 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541d, &(0x7f0000000000)) 12:15:09 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) syncfs(r2) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$cgroup_ro(r3, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891b, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x4e22, @local}}) 12:15:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x3000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0xefffffff}, 0x0) 12:15:09 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x7a, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:09 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:09 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541e, &(0x7f0000000000)) 12:15:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x4000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:10 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) umount2(&(0x7f0000000000)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) 12:15:10 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:10 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xe0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x5000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0xf0ffffff}, 0x0) 12:15:10 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541e, &(0x7f0000000000)) 12:15:10 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x6000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:10 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000480)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x30, r1, 0x5, 0x0, 0x0, {0x1, 0x0, 0x5}, [@SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd93}]}, 0x30}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x54, r1, 0x300, 0x70bd2b, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRET={0x18, 0x4, [0x0, 0x8, 0x5, 0x1, 0x9]}, @SEG6_ATTR_DST={0x14, 0x1, @mcast2}, @SEG6_ATTR_DST={0x14, 0x1, @private1}]}, 0x54}, 0x1, 0x0, 0x0, 0x20008000}, 0x80) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0xffffffff, 0x6}, {0x1, 0x5}]}, 0x14, 0x2) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r2, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) 12:15:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x7000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0xf1ffffff}, 0x0) 12:15:10 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x5421, &(0x7f0000000000)) 12:15:10 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x300, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:10 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x8000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:10 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000000)='trusted.overlay.origin\x00', &(0x7f0000000040)='y\x00', 0x1, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) connect$tipc(r2, &(0x7f0000000180)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x3, 0x1}}, 0x10) r3 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x2, 0x40000) setsockopt$inet_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x304}, "83d4ae15a73c406f", "8904450611fdec2f7e8c60483e7a6a297ba000", '\x00', "5f34f18698d30710"}, 0x38) 12:15:10 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x9000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:10 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x5422, &(0x7f0000000000)) 12:15:10 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) prctl$PR_SET_FP_MODE(0x2d, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) 12:15:10 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x5423, &(0x7f0000000000)) 12:15:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0xfcffffff}, 0x0) 12:15:10 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x500, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:10 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) accept$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="232198de875f696c6519ed5045ef8bc674f7615370dd7d0bf5d11f476b574e423359db5d93ddc34d"], 0xc) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) pipe(&(0x7f0000000080)={0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000180)=0x2, 0x4) ioctl$KDFONTOP_SET(r3, 0x4b72, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="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"}) ioctl$TIOCL_UNBLANKSCREEN(r3, 0x541c, &(0x7f0000000100)) 12:15:10 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xa000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:10 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x5424, &(0x7f0000000000)) 12:15:10 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xb000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:10 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x12000, 0x0) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000000c0)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x130, r2, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0xd8, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x47b60a67}]}, {0x4c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x153f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x24c1b72f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1c93}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdcda}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfee}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb4fd}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1e68}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x70551c90}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf264}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x60d622d7}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x431e4912}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x28a8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x793a4b3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4de1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x16}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xed16}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6b73}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x493}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x96ec}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6a7f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfbe0}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x36014ce2}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x394c3a31}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5, 0x3, 0x6}, {0x5}, {0x5, 0x3, 0x7}, {0x5}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x1}, {0x5}]}]}, 0x130}, 0x1, 0x0, 0x0, 0x800}, 0x20000005) r3 = creat(&(0x7f0000000300)='./file0\x00', 0xc3) ioctl$KDGKBENT(r3, 0x4b46, &(0x7f0000000340)={0x4, 0x4, 0x5}) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f00000002c0)={0x2, 0x6}) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) 12:15:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0xffffa888}, 0x0) 12:15:10 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x5425, &(0x7f0000000000)) 12:15:11 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:11 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x600, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xc000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:11 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:11 executing program 4: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = socket$inet(0x2, 0x1, 0x8) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) r1 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) write$binfmt_script(r1, &(0x7f0000000000)={'#! ', './file0', [{0x20, '\x03! '}], 0xa, "bfb083d785d655118e254a414ec08199ee96fc71ace88f6011c1e289a2b672ef899c03000000202764adf5c00ba0000000000000060000575d000000000008000000000000000000000000000013450bb17c44095754872b72e5382c054578fc7fc2194418434836843923f5f80e3b0f99258621abfa6ce408e81f3ff86ef689528231e1b65346903e9ae81d031f3ba02934fe90338381e6"}, 0xa7) 12:15:11 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x5427, &(0x7f0000000000)) 12:15:11 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0xffffff7f}, 0x0) 12:15:11 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x700, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xd000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:11 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x5428, &(0x7f0000000000)) 12:15:11 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:11 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="3c00000022000b3b8f0035c985ec60af0f000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00002cd17e69db7a0fa6c1eea21b8e63c43900000900011e00000000"], 0x3c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl2\x00', r4, 0x29, 0x5, 0x4, 0x4, 0x41, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @dev={0xfe, 0x80, [], 0x21}, 0x40, 0x8, 0x20}}) r5 = syz_open_dev$vcsu(&(0x7f0000000140)='/dev/vcsu#\x00', 0x8, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r5, 0x400443c8, &(0x7f0000000180)={r1, 0x9}) syz_open_dev$tty1(0xc, 0x4, 0x1) 12:15:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xe000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:11 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0xffffff9e}, 0x0) 12:15:11 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x5429, &(0x7f0000000000)) 12:15:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x10000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:11 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, 0x0, 0x0, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:11 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x900, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:11 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x5437, &(0x7f0000000000)) 12:15:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x11000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:11 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, 0x0, 0x0, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:11 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0xffffffef}, 0x0) 12:15:11 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x5441, &(0x7f0000000000)) 12:15:11 executing program 4: bind$qrtr(0xffffffffffffffff, &(0x7f0000000000)={0x2a, 0xffffffffffffffff, 0x7ffe}, 0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) 12:15:11 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, 0x0, 0x0, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:11 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x5450, &(0x7f0000000000)) 12:15:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x12000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:11 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0xfffffff0}, 0x0) 12:15:11 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xa00, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x1f000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:12 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x5451, &(0x7f0000000000)) 12:15:12 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540), 0x0, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0xfffffff1}, 0x0) 12:15:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x25000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:12 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_WRITEI_FRAMES(r2, 0x40184150, &(0x7f0000000000)={0x0, &(0x7f00000000c0)="1029ad1a69e0ef32088453ec17c3d825aa46cbd7f9748f362488fb1ff6c43a5abd230f3a20bf4641ad38b87cfb5c586d26ddff290eae10a05abeda66137395a76d616d391d2e8d02c1a58151a731752686f73541a321d8033a2f15f092b2e3b9c629e15ad188d39cad7410fe6fe52fd6cbb33440651bb7f24582a1618b0d60ce5c4a580f199b6468e1cb5e650bbc090aae7b96f2998a5793005728cc18e6b59814666aad070e93b5aae52b53ef6e2ceaf70d2ba48883accaa3f6148fe38f7b7371bda17550eda1e9fe9e385f931091a9", 0xd0}) 12:15:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x5c000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x7ffff000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xa04d7f00, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:12 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x5452, &(0x7f0000000000)) 12:15:12 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540), 0x0, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:12 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xb00, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:12 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x480102, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)={'#! ', './file0', [{0x20, '#! '}, {0x20, '*-'}, {0x20, '*&)(/{^'}, {}], 0xa, '.'}, 0x1c) 12:15:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0xfffffffc}, 0x0) 12:15:12 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x545d, &(0x7f0000000000)) 12:15:12 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540), 0x0, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xebffffff, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SIOCGETNODEID(r1, 0x89e1, &(0x7f0000000000)={0x1}) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r2, 0x4b72, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="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"}) ioctl$TIOCSCTTY(r2, 0x540e, 0x100000000) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2321202e2ffe8b6c6530202321200aa18eb991a497f09bc1275992fa0e812e"], 0x1f) 12:15:12 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x5460, &(0x7f0000000000)) 12:15:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xeffdffff, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x10000d82c}, 0x0) 12:15:12 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:12 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xc00, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:12 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x5600, &(0x7f0000000000)) 12:15:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xfeffffff, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x1000000000000}, 0x0) 12:15:12 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:12 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) r1 = socket(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9, 0x1, 'cake\x00'}, {0xc, 0x2, [@TCA_CAKE_DIFFSERV_MODE={0x8, 0x3, 0xc201}]}}]}, 0x3c}}, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) r8 = socket$inet(0x2, 0x80001, 0x84) r9 = dup(0xffffffffffffffff) ioctl$VIDIOC_TRY_EXT_CTRLS(r9, 0xc0205649, &(0x7f00000001c0)={0x9f0000, 0x8, 0x5e, r4, 0x0, &(0x7f0000000140)={0x9a091e, 0x7fff, [], @value=0x1}}) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r7, 0x84, 0x0, &(0x7f0000000000)={r10}, &(0x7f0000000040)=0x10) getsockopt$inet_sctp6_SCTP_RTOINFO(r4, 0x84, 0x0, &(0x7f0000000180)={r10, 0x0, 0x4, 0x81}, &(0x7f0000000040)=0x10) setsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000100)=@assoc_id=r6, 0x4) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000000)={'ip6_vti0\x00', r3, 0x29, 0x7, 0x7b, 0x40, 0x1, @private2, @rand_addr=' \x01\x00', 0x10, 0x8000, 0x9, 0x8}}) 12:15:12 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x5601, &(0x7f0000000000)) 12:15:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffdef, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:12 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xd00, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:13 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) prctl$PR_CAPBSET_READ(0x17, 0x1c) 12:15:13 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x40030000000000}, 0x0) 12:15:13 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:13 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x5602, &(0x7f0000000000)) 12:15:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xffffffeb, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:13 executing program 4: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0xc00, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000180)=ANY=[@ANYBLOB="3c0d000000000000000100c910fc0100000000000000000000000000000748000000011081118402000000000000000800000000000000ff03000000000000280800000000000001040000000000002000000000000000ff07000000000000e1ffffffffffffff000100692bc60843868ae339a40001000502000cc2040000040000dc101c8c354de3d992b2326f"], 0x78) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$DRM_IOCTL_GET_MAGIC(r0, 0x80046402, &(0x7f0000000040)=0xfffffffe) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) 12:15:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffe, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:13 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x100000000000000}, 0x0) 12:15:13 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xe00, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:13 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x5603, &(0x7f0000000000)) 12:15:13 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x0, &(0x7f0000000240), 0x0, 0x0, 0x0, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:13 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000000)={'#! ', './file0', [{0x20, '#! '}], 0xa, '.'}, 0x10) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000040)={0x2, {0x2, 0x8, 0xdd81, 0xc15, 0x7f}}) 12:15:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x10000000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:13 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x5605, &(0x7f0000000000)) 12:15:13 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x0, &(0x7f0000000240), 0x0, 0x0, 0x0, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:13 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x200000000000000}, 0x0) 12:15:13 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x5606, &(0x7f0000000000)) 12:15:13 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x1) ioctl$KVM_SET_PIT2(r0, 0x4070aea0, &(0x7f00000000c0)={[{0x3, 0x81, 0x9, 0x2, 0x48, 0x1f, 0x9, 0x19, 0x0, 0x80, 0x0, 0x19, 0x84}, {0x80, 0x5, 0x4, 0x2, 0x80, 0x78, 0x81, 0x20, 0x8, 0x5, 0x5, 0x3, 0x1}, {0xffffffc0, 0x7ff, 0x1, 0xb7, 0x4, 0x9, 0x80, 0xca, 0x8e, 0xdf, 0x5, 0x0, 0x1b}], 0x2623de2d}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000001c0)={0x0, 0x0}) perf_event_open(&(0x7f0000000140)={0x5, 0x70, 0x40, 0x20, 0xff, 0x5, 0x0, 0x8000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x80000000, 0x0, @perf_bp={&(0x7f0000000040)}, 0x4109, 0x0, 0x1f495c01, 0x7, 0x1000, 0x100, 0x2}, r4, 0xd, 0xffffffffffffffff, 0x8) 12:15:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x80000000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:13 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x1020, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x7ffffffff000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:13 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x0, &(0x7f0000000240), 0x0, 0x0, 0x0, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:13 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x300000000000000}, 0x0) 12:15:13 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x5607, &(0x7f0000000000)) 12:15:13 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000000)={'#! ', './file0', [{0x20, '#! '}, {0x20, '#! '}, {0x20, '#! '}, {}], 0xa, '.'}, 0x19) 12:15:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x1000000000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xf0ff7f00000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:13 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x5608, &(0x7f0000000000)) 12:15:13 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x0, &(0x7f0000000240)=[{0x0}], 0x1, 0x0, 0x0, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:13 executing program 4: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001280)='/dev/ubi_ctrl\x00', 0x18004, 0x0) bind$ax25(r0, &(0x7f00000012c0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x7}, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default]}, 0x48) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) bind$phonet(r2, &(0x7f0000000000)={0x23, 0x13, 0x9, 0x4}, 0x10) pipe(&(0x7f0000000040)={0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f00000013c0)=[{&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001380)=[{&(0x7f0000000140)="64b162aadd795b19396440cb123e60800746611d1c8fd3b7143d2653440a9f5db695729f00f9c83ed883136dcb04c39b4ca510d91bcb82ce8a904b813535bf2e8219581e1c84ef887819b49ff125a215d62dfbee3745086e9452a12c2b004aa6e98aba64f9958a0d44018ff81cbb77319ac657eb839afe", 0x77}, {&(0x7f00000001c0)="133029eb119a3238fec47f0e46c5b00c9bd0f26da45b8dde91a69400cd277f1362b48b4a3391e2c59bc770c6c72ec3c8aec7640668c89d54658ddf10f18da96d9f1daea4a8c8f07c8c98145c3ac7e2a7e2d10979b5b419417b914fcdfdd7e60092649a667084dfebafb34f097f5741faf90657b7877abce38c713b8cda08493187e8a42d9632069d66ed58297b3494b3", 0x90}, {&(0x7f0000000280)="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", 0x1000}, {&(0x7f0000001340)="044821b422695afdfae5fed5ac1f6d41b07360d2e08ddc845066706bae1cd09fcfdc78a53eb1d45530", 0x29}], 0x4, 0x0, 0x0, 0x800}], 0x1, 0x24004800) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2321202e2f66696cc65dfb37"], 0xc) 12:15:13 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x400000000000000}, 0x0) 12:15:13 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x1100, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:14 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x5609, &(0x7f0000000000)) 12:15:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xf0ffffff7f0000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:14 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$TIOCGRS485(r0, 0x542e, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket(0x10, 0x3, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r8, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9, 0x1, 'cake\x00'}, {0xc, 0x2, [@TCA_CAKE_DIFFSERV_MODE={0x8, 0x3, 0xc201}]}}]}, 0x3c}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@gettclass={0x24, 0x2a, 0x1, 0x70bd25, 0x25dfdbfb, {0x0, 0x0, 0x0, r8, {0x7, 0x9}, {0xfff2, 0x10}, {0xf, 0x9}}, ["", "", "", "", ""]}, 0x24}}, 0x4008000) ioctl$UI_BEGIN_FF_UPLOAD(r3, 0xc06855c8, &(0x7f0000000180)={0xd, 0xffffffe0, {0x55, 0x9, 0x7f08, {0xb091, 0x8001}, {0x9, 0x101}, @period={0x59, 0x1, 0x9cef, 0x0, 0x6945, {0x1, 0xfff, 0xfffd, 0x8001}, 0x3, &(0x7f0000000100)=[0x7, 0x2, 0x6]}}, {0x54, 0x9, 0x1fd7, {0x4, 0xfca}, {0x737e, 0x7fff}, @period={0x5b, 0x200, 0xfffb, 0x9, 0x0, {0x401, 0x3, 0x4, 0x3}, 0x6, &(0x7f0000000140)=[0x4, 0xfe0b, 0x1ff, 0x1, 0x9, 0x9]}}}) r9 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x8) ioctl$VHOST_GET_VRING_BASE(r9, 0xc008af12, &(0x7f0000000040)) 12:15:14 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x0, &(0x7f0000000240)=[{0x0}], 0x1, 0x0, 0x0, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x100000000000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:14 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x500000000000000}, 0x0) 12:15:14 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x560a, &(0x7f0000000000)) 12:15:14 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x1200, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x200000000000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:14 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x560b, &(0x7f0000000000)) 12:15:14 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_X86_SETUP_MCE(r2, 0x4008ae9c, &(0x7f0000000000)={0x10, 0x2}) 12:15:14 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x0, &(0x7f0000000240)=[{0x0}], 0x1, 0x0, 0x0, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:14 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x600000000000000}, 0x0) 12:15:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x300000000000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:14 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x560c, &(0x7f0000000000)) 12:15:14 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x2000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:14 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x6200, 0x0) ioctl$SIOCX25GDTEFACILITIES(r1, 0x89ea, &(0x7f0000000040)) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) 12:15:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x400000000000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:14 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x500000000000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:14 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x560d, &(0x7f0000000000)) 12:15:14 executing program 4: syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_GETPROPERTY(r1, 0xc04064aa, &(0x7f0000000040)={&(0x7f0000000000), &(0x7f00000000c0)=[{}, {}, {}, {}, {}], 0x4, 0x0, [], 0x0, 0x5}) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x800) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SIOCRSGL2CALL(r3, 0x89e5, &(0x7f00000001c0)=@bcast) 12:15:14 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x800000000000000}, 0x0) 12:15:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x600000000000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x700000000000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:14 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x560e, &(0x7f0000000000)) 12:15:14 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x2010, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:14 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:14 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="2321202e2f662b216edf0a2e"], 0xc) ioctl$TCGETX(r0, 0x5432, &(0x7f0000000000)) r1 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r1, &(0x7f0000000140), 0x4924b68, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="60010000100013070000000000000000000000000000000000000000000000007f00000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x160}}, 0x0) ioctl$TIOCGSERIAL(r0, 0x541e, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=""/47}) mmap$xdp(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000001, 0xa813, r1, 0x0) 12:15:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x800000000000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x900000000000000}, 0x0) 12:15:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x900000000000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:15 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:15 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x2500, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xa00000000000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xb00000000000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0xa00000000000000}, 0x0) 12:15:15 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x560f, &(0x7f0000000000)) 12:15:15 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) ioctl$TCSETX(r0, 0x5433, &(0x7f0000000000)={0x0, 0x0, [0x5, 0x3ff, 0x47, 0x645a, 0x7f]}) 12:15:15 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xc00000000000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:15 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x3f00, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0xb00000000000000}, 0x0) 12:15:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xd00000000000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xe00000000000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:15 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="2321202e2f66696c65300a4ee87c8f229d1a414fa0f0d69555b10200000029b6e9d39affc4cddbc0e86a5e5cbd4d1b0edb8070c95cfa9c109ea88bde90605194b6d790f07a0ba8b2483ae5c1de599d41a64166b6bf010fdd6d4f48ee03b1d7b3665356d9a5bba82e587a07f99f9a76f8542f55335a"], 0x6d) 12:15:15 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:15 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x6364, &(0x7f0000000000)) 12:15:16 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0xc00000000000000}, 0x0) 12:15:16 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x1000000000000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:16 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="2321202e0125300a2e9913"], 0xc) 12:15:16 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:16 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x1100000000000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:16 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x8912, &(0x7f0000000000)) 12:15:16 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0xf00000000000000}, 0x0) 12:15:16 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x4800, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:16 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r1, &(0x7f0000000140), 0x4924b68, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x18, 0x1406, 0x300, 0x70bd25, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x18}, 0x1, 0x0, 0x0, 0x1000}, 0x100) write$binfmt_script(r0, &(0x7f0000000000)={'#! ', './file0', [], 0xa, "2e4d785291084888fd17daa964824c67cd4150339a1d7dde24b87dfd91fd916c1a507639c95d91d7b909c8513e5aa4a803543662ae42425fbbe29221634e0f039e9b9e41792a636aa9"}, 0x54) 12:15:16 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x8914, &(0x7f0000000000)) 12:15:16 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x1200000000000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:16 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x1000000000000000}, 0x0) 12:15:16 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x8933, &(0x7f0000000000)) 12:15:16 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x1f00000000000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:17 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x4c00, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:17 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x1100000000000000}, 0x0) 12:15:17 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x8946, &(0x7f0000000000)) 12:15:17 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x2500000000000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:17 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x5c00, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:17 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = semget$private(0x0, 0x20000000102, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x2, 0xfe00}], 0x1, 0x0) semop(r1, &(0x7f0000000000)=[{0x2, 0x7fff}], 0x1) semctl$SETVAL(r1, 0x0, 0x10, &(0x7f0000000000)=0x20) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="2321202e2f66696cbb106530"], 0xc) r2 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) sendmsg$sock(r2, &(0x7f0000000940)={&(0x7f00000000c0)=@sco={0x1f, @fixed={[], 0x12}}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000140)="2419d2026d807c99e4c7013120dd62dd1985d71c5aa21a64f0db720a3db2db445ae6c2df25ef4fe957b8eaada70a0826771b1d856f3a7320a882ac8521c8ca78813d58aae01522e2afbfe01a68bf10c2bee36f9e545dc43ef75cf5e14f0a1c13a28d442adcb7294d8c8fd175e3452130e01d669fb360ea15ff1ef78b7b8975ff272db85b97080bb231a52581b26ed38a09ce8a110e003a3f6533af540c969e4bae99db30aac7867a127c38", 0xab}, {&(0x7f0000000240)="981cd0a337e5bc8016b4524776643a3699dbaa4923cf274225d8fe3ee5b9ff263cfc8c9f106db8864c499f5ae164d70bc171e465767c9099e541ce15b52f4651d9f0ccd71277bb43562c60b5c5be1c418e1833a18ba68c616578e7d0ffc23295669f04d706ef2e52f13047e9ec57b62365a656d3e65b9b4174c0faaebf13911bf7ddbcf53b6ce2f2ffe636a65b3dd73da943ec375445f876f364a10b69639a81d1ae405350ed9dc795e90faf72d39e5ba80b5e4af7f50b5a591c2bb5994a7b6432c7fd915eab69da7bab351b74e2d2097cb7a4e3c82d9927e83e80d78b463839961e591491", 0xe5}, {&(0x7f0000000340)="2ebeb7613923958dd15fb598397549462f1656945b49009a2e160ceb813eea5f1b7ba5b3c80563ae37f2eb6b67b94424a98bb13497c0c69df3d0e1e7c4f3388f99f023adc1e17eb438c4b44576dd38494bccf7ef9ae1963a5e3c02d921aba4ad08b333a30b406e12796cc35206da73b51b1074b9339d34f82ab29e23087b2abb01804d5ff64b02f6cffd8e3284dfb0559bae46424c04b65f6e6645799761b939d6ccb6eb16fa07809156ffac47f9bf9b8958101595a631b84506471302d4f50af2e56f5bf9736d4d2cf5c71255be6d19607ab010e092b00038c1903566519726bf49f79dbfd6fd56a88c", 0xea}, {&(0x7f0000000440)="839bb9c3d3631fc81cecda30f4d3c26938680d4791c12d5cac0e03b1185cb2be72187bccde7e977ca2e2a54f904225368dd20e8526724b75aa541daed0a350165ef514aca70b7629ac4a84df170f510b1b1a2f3aa8aaa9c0134a3b9d1bfd9a425cfc4342cb96482f744f523f42933f57", 0x70}, {&(0x7f00000004c0)="88b0ffa644a77734860cd5dd09cc722b271b2f6b8ca026072f4a0ffa38c25a8a696e58ea1d6ed4cdd3d4fbc1f330bd5093ffbf3218f6713ff25b9c9fa03d66fc9e3b0927a6240f77d053ccbbf628fa9e7ba4e26b1a5c4be0715d2e1123023c16c7e90ed5d3b2e8bfd179a8d2b98f365a83d9b6", 0x73}, {&(0x7f0000000040)="09d3ed30cdce0184105e4aa7639c6897b616a78e94769101930ce7b9f8b7b051f2f5346482ea2c53769aa0", 0x2b}, {&(0x7f0000000540)="5c9f59951d1c2b270761af5b71e99c2a90f72ee0b2f16bad9f5b39ae64dc8df16b1afd8ab0adda3a1a41e82b2ab0db0c96f00e86e5ac6102fc7f3871c0e1c37f59fbb5c73c83fbd87fa543026eba7f35f0f84de05af72f8f9d9b462b02f92cd06cc40120b1f4daccb5a0cc0d89df455bef4541a54b93f8561bf42b8ea7cdcff771f04e5df91ab577b47de703161ba3efabe30bc89db5bcc0b52cbf5740b7ad801497abaa03a7a1137cd886b2c8962aa4093d5f6db4d32cee679ad60352af", 0xbe}, {&(0x7f0000000600)="886ec54d34b034ec97b858263ba3417307aa1271709cb04ee44a37dbd038adba2022d8d17c6352adb2d9ac0c90eab0a01ef6257ced082cd74a3b69d89da40eb1b8d1834c3310c9e3eceefff3b10f0f658e589f9c652f2dfcfc6ca140e145969efd445bd57904c16c0c74992815ed6e831b1b364c40e3418cb268a775224e9be39346b712936cd2859739fc4423018b9c46d5e5bb0f466510e7b28b932fe8dbe1fefbfff9b7a9ee01b6171309", 0xac}, {&(0x7f00000006c0)="724f6951b0f419115a87ae5134fc2abb054362f076efe40eb41108d836b243f8a3bb752e75096cc192ceac21acc0c56303f51fa8e39b50fe1cb2700122d700dcf564e9eaec97e6f8995b4b0f63c83c6f4b8071e57a89b135badac5fe1e811bd48ed38f9e0f5c2ee9f7472122c77e26c0af47d47ee76d3290e00b34dd379a0351a32c5f15336e1b038f14ae77e716b891d4b096c77849a9fe55d2e9b70eba09be6afd9843e17a4534cc", 0xa9}, {&(0x7f0000000780)="e90187e3c14d4d2a184438e9bc3357f07bf75162c2a8d0328ca24705457c6abe418cb255053a31c3c5e0b675431fbf4f606dd9ffecd5887b1b957e9926fc31d9f6bde25e2bf6dcf301e6374dc6bf432474305a78d210deaef16465484a3a647bf09771fcc370da1afe8b2e345342b3d9021008c0ab14c9479dd8f1e08eed82c8baf9329df35983b2b271e1ec66d6d11bdc2bf5b55b50d679a0132aed9a63de72fb4fa76ca1f6859adec7649c986568d5eea8242cb48d", 0xb6}], 0xa, &(0x7f0000000900)=[@txtime={{0x18, 0x1, 0x3d, 0x15}}, @mark={{0x14, 0x1, 0x24, 0x5}}], 0x30}, 0x840) 12:15:17 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x5c00000000000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:17 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000000)={'#! ', './file0', [{0x20, '/'}, {0x20, '#! '}], 0xa, '.'}, 0x12) 12:15:17 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x400454ca, &(0x7f0000000000)) 12:15:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x1200000000000000}, 0x0) 12:15:17 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xa04d7f0000000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:17 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xebffffff00000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:18 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:18 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xeffdffffffffffff, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:18 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x6800, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:18 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="2321202e2f66696c65300a2e3c6656a8b647d9c2e57792af31cc847929f28c43faea6c60be9ab5f586cd076a33c0b4a40c83e480a2aeeff5f5b71e28774f2b3c5374fc5faeb0cd0d8ec07e8997ed057c8bb7be58d5ae2c5e618514fb258a06cc48ec839678593114344a33618406b9c7f875176bb428f526d155bfd48df518dea7265be2ccbae7bbea29fb50abeb54f2cbdcdb09aa7778c7e9c6ecbc85cee3c93f3ec1f8d6f1d41861654ac406d7b45750cf3049022ba4b176e8f38cf819bb0b47368ef8d9bf2447b69cd11963296f167d9dab5d8194de32bf9f1f0fe61d483a0ba792258767b11401f7f803cd72c7c364f40e84a2499b2da1854c95c2117cd239c4fba3cd1af327252a404a810542401997d44cdaf1ea5e29f4be822a378ad777d242a67ba779eea640a8184cf342bfea482bcd46d59202e5a2cdc4054839e2f9b410caf2840a6696108d08bd11030bc3d7f759"], 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000000)=0xffff, 0x4) 12:15:18 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x40049409, &(0x7f0000000000)) 12:15:18 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x1300000000000000}, 0x0) 12:15:18 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xfeffffff00000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:18 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x40186366, &(0x7f0000000000)) 12:15:18 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='#! ./file0J.'], 0xc) 12:15:18 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xffffffff00000000, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:18 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x2cd8000001000000}, 0x0) 12:15:18 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffffffffdef, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:19 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:19 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4020940d, &(0x7f0000000000)) 12:15:19 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x6c00, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:19 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) r1 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) fcntl$setpipe(r1, 0x407, 0x6) 12:15:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x3f00000000000000}, 0x0) 12:15:19 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x80045432, &(0x7f0000000000)) 12:15:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:19 executing program 4: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="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"}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x2) r1 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r1, &(0x7f0000000140), 0x4924b68, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) write$binfmt_script(r2, &(0x7f00000000c0)={'#! ', './file0', [], 0xa, "0728b5410575c841d0b445e26494e711db33102496aab69309a6e16c0cf942799a6a6d84e8f791b35ad970f273ca83a0eeb7866d0b285b4b577fbe4e40a0e4ba4a952b43d6774ce89d49af3619443ebb2e37a513e6eae376d40c8e0a987993d882c6b95413b7d517246abc41000000000000"}, 0x7d) 12:15:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x4000000000000000}, 0x0) 12:15:19 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x7400, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:19 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x80045440, &(0x7f0000000000)) 12:15:20 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:20 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x6000000000000000}, 0x0) 12:15:20 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:20 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="2321202e2f66696c7a92ec86"], 0xc) 12:15:20 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x80086301, &(0x7f0000000000)) 12:15:20 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x7a00, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:20 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x5, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:20 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, &(0x7f00000000c0), &(0x7f0000000140)=0x80) r1 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r1, &(0x7f0000000140), 0x4924b68, 0x0) recvfrom$llc(r1, &(0x7f0000000200)=""/122, 0x7a, 0x0, &(0x7f0000000000)={0x1a, 0x30b, 0x25, 0x9, 0x1, 0x0, @local}, 0x10) write$cgroup_freezer_state(r0, &(0x7f0000000180)='THAWED\x00', 0x7) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) openat$smackfs_load(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/smackfs/load\x00', 0x2, 0x0) write$binfmt_script(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="23152074916258fd7e429bcb143e030096a37b252a96621e8108e588a8ae85427308"], 0xc) 12:15:20 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0xc0045878, &(0x7f0000000000)) 12:15:20 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x6558000000000000}, 0x0) 12:15:20 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0xc0045878, &(0x7f0000000000)) 12:15:20 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xe0ff, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:21 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:21 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x6, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:21 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0xc0189436, &(0x7f0000000000)) 12:15:21 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x8000000000000000}, 0x0) 12:15:21 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xedc0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:21 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0xc020660b, &(0x7f0000000000)) 12:15:21 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x300, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:21 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getresgid(&(0x7f0000000000), &(0x7f0000000040)=0x0, &(0x7f00000000c0)) ioctl$TUNSETGROUP(r2, 0x400454ce, r3) 12:15:21 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x8100000000000000}, 0x0) 12:15:21 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xffe0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:21 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)=0x2) 12:15:21 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) setsockopt$inet_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000000), 0x4) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) 12:15:21 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:21 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0xffffff1f, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:21 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x8847000000000000}, 0x0) 12:15:21 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)=0x4) 12:15:21 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r1, &(0x7f0000000140), 0x4924b68, 0x0) accept$phonet_pipe(r1, 0x0, &(0x7f0000000000)) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) 12:15:21 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x11001, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:22 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)=0x5) 12:15:22 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x8848000000000000}, 0x0) 12:15:22 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x20000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:22 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)=0x6) 12:15:22 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x88a8ffff00000000}, 0x0) 12:15:22 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)=0x7) 12:15:22 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:22 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x2, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:22 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x80000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:22 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x9effffff00000000}, 0x0) 12:15:22 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)=0xa) 12:15:22 executing program 4: r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x800, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x3, 0x7) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyS3\x00', 0x64a01, 0x0) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, &(0x7f00000001c0)) setsockopt$ARPT_SO_SET_REPLACE(r3, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) poll(&(0x7f0000000040)=[{r0, 0x8000}, {r1, 0x6}, {0xffffffffffffffff, 0x8}, {r2, 0x2a}, {r3, 0x2090}], 0x5, 0x281) r4 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r4, &(0x7f0000000140), 0x4924b68, 0x0) ioctl$SIOCRSGL2CALL(r4, 0x89e5, &(0x7f0000000180)=@null) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r6, 0x4b72, &(0x7f0000000280)={0x0, 0x0, 0x20, 0x0, 0x0, &(0x7f0000000440)="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"}) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x800, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000001540)={0x2, 0x0, @ioapic={0x10000, 0x1, 0x2, 0x8001, 0x0, [{0x2b, 0x3, 0x7, [], 0x9}, {0x3f, 0x5, 0x6, [], 0x5}, {0x80, 0x5, 0x4, [], 0x6}, {0x3f, 0x7, 0x1, [], 0x7f}, {0x2, 0x80, 0xff, [], 0x5}, {0x1, 0x7, 0x81, [], 0x7c}, {0x7f, 0xfa, 0xff, [], 0x9}, {0x8, 0x4d, 0x7f, [], 0x5}, {0x8, 0x9}, {0x48, 0x1, 0x7f, [], 0x3f}, {0x2, 0x3, 0x5, [], 0x8}, {0x20, 0x81, 0x9, [], 0x20}, {0x84, 0x0, 0xc1, [], 0x20}, {0x65, 0x8, 0x3, [], 0x1}, {0x1, 0x7f, 0x8, [], 0x15}, {0xe1, 0x0, 0x0, [], 0xfe}, {0x2, 0x8, 0xab, [], 0x1}, {0x4b, 0x1, 0x5, [], 0x7}, {0x1, 0x81, 0x3f}, {0x41, 0x8, 0xe2, [], 0x2}, {0x20, 0x4, 0x81, [], 0x81}, {0xff, 0x5, 0x20, [], 0x6}, {0x0, 0x5b, 0x3, [], 0xfc}, {0x0, 0x2, 0x1f, [], 0xc2}]}}) ioctl$KDSKBENT(r7, 0x4b47, &(0x7f00000000c0)={0x64, 0x8, 0x4}) ioctl$GIO_SCRNMAP(r6, 0x4b40, &(0x7f0000000200)=""/4096) write$binfmt_script(r5, &(0x7f0000000140)=ANY=[], 0xc) 12:15:23 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)=0xb) 12:15:23 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x3, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:23 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0xcd0f000000000000}, 0x0) 12:15:23 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x214082, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:23 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x40000, 0x0) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000080)={0x6, 0x0, 0x8, 0x35, 0x5}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="2352202e2fc30e66696c65300a2e"], 0xc) 12:15:23 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)=0xc) 12:15:23 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:23 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x4, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:23 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) connect$llc(r0, &(0x7f0000000000)={0x1a, 0x22a, 0x9, 0x0, 0x8, 0x5, @multicast}, 0x10) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r1, 0x540a, 0x2) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) 12:15:23 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0xe803000000000000}, 0x0) 12:15:23 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)=0xd) 12:15:23 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:23 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)=0xe) 12:15:23 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x5, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:23 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0xefffffff00000000}, 0x0) 12:15:23 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x1100100, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:24 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)=0xf) 12:15:24 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x6, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:24 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:24 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)=0x11) 12:15:24 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0xf0ffffff00000000}, 0x0) 12:15:24 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="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"}) ioctl$KIOCSOUND(r0, 0x4b2f, 0x9) syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)={'#! ', './file0', [{0x20, '#! '}, {}, {0x20, '#! '}], 0xa, '.'}, 0x15) 12:15:24 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x7, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:24 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:24 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x8, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:24 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0100202e2766696e65300a2e"], 0xc) r1 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f0000000000)=0x80) 12:15:24 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0xf1ffffff00000000}, 0x0) 12:15:24 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x3000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:24 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS32(r0, 0xc0245720, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r2, 0x4b72, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="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"}) ioctl$KDDISABIO(r2, 0x4b37) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9, 0x1, 'cake\x00'}, {0xc, 0x2, [@TCA_CAKE_DIFFSERV_MODE={0x8, 0x3, 0xc201}]}}]}, 0x3c}}, 0x0) r3 = socket(0x10, 0x3, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9, 0x1, 'cake\x00'}, {0xc, 0x2, [@TCA_CAKE_DIFFSERV_MODE={0x8, 0x3, 0xc201}]}}]}, 0x3c}}, 0x0) r6 = socket(0x10, 0x3, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r8, {}, {0xd, 0xffff}, {0x6}}, [@qdisc_kind_options=@q_plug={{0x0, 0x1, 'plug\x00'}, {0x0, 0x2, {0x2, 0x3ff}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000180)={'syztnl2\x00', &(0x7f0000000100)={'ip6gre0\x00', r8, 0x2f, 0x9, 0x5, 0x80000001, 0xa, @mcast2, @ipv4={[], [], @multicast2}, 0x700, 0x8000, 0x7f, 0x7fff}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x50, 0x0, 0x100, 0x70bd25, 0x25dfdbfb, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x20}, 0x8000) ioctl$TIOCL_PASTESEL(r1, 0x541c, &(0x7f0000000000)) 12:15:25 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x9, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) [ 1146.313519][T32501] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1146.465487][T32506] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 12:15:25 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0xfcffffff00000000}, 0x0) 12:15:25 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0xa, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:25 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x4000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:25 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = semget$private(0x0, 0x20000000102, 0x0) semtimedop(r1, &(0x7f0000000200)=[{0x2, 0xfe00}], 0x1, 0x0) semop(r1, &(0x7f0000000000)=[{0x2, 0x7fff}], 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f00000000c0)={'ipvlan1\x00', {0x2, 0x4e20, @rand_addr=0x64010100}}) capset(&(0x7f0000000100)={0x20071026}, &(0x7f0000000140)={0x1, 0x6, 0x1, 0x10001, 0x2, 0x6}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsgid(r5) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r7) r8 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsgid(r9) semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f0000000000)={{0x3, r3, r5, r7, r9, 0xc8, 0x15}, 0x8001, 0x6, 0x0, 0x0, 0x0, 0x0, 0xd32}) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="010053696c65350a2e662008c6c52eebc9d0e31a30b08e2a1a3e6dc9dfa1b7d9077bed9b2b78d08f4a7520fdd823d1d9c60652284f3bd0c9991c1e7b9c2d6ca94852c1f92e91fad0f71c225f313619b2123baa7235466e0141f421e49a29dfed64c30c225476ae573f7556b0336c5285ef70e951c903c1dd6f0c32c8d0733fc124ccf58eb310848309df3338692b502b4f53b9607b09ad31008051b60b1f8e8789ba31cd9fa91d29e0e532b4924cba0101154a6b"], 0xc) 12:15:25 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x119000, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 12:15:25 executing program 3: r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000001c0)='trusted.overlay.opaque\x00', &(0x7f0000000200)='y\x00', 0x2, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_GET_BYNAME(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x68, 0xe, 0x6, 0x3, 0x0, 0x0, {0x3, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x68}, 0x1, 0x0, 0x0, 0x50}, 0x831) r3 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$TIOCL_PASTESEL(r3, 0x541c, &(0x7f0000000000)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x400, 0x0) 12:15:25 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0xb, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) [ 1147.013395][T32527] capability: warning: `syz-executor.4' uses deprecated v2 capabilities in a way that may be insecure 12:15:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0xffffff7f00000000}, 0x0) 12:15:25 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0xc, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:25 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x424940, 0x0) write$FUSE_DIRENT(r0, &(0x7f00000000c0)={0x50, 0x0, 0x5, [{0x0, 0x3, 0x3, 0x81, '#! '}, {0x4, 0x7, 0x3, 0x2, '#! '}]}, 0x50) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9, 0x1, 'cake\x00'}, {0xc, 0x2, [@TCA_CAKE_DIFFSERV_MODE={0x8, 0x3, 0xc201}]}}]}, 0x3c}}, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000140)={@empty, @private1={0xfc, 0x1, [], 0x1}, @empty, 0xfffffff8, 0xfff8, 0x2, 0x0, 0x3b, 0x1000001, r4}) 12:15:25 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x5000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:26 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, 0x0, 0x0, 0x1e, 0x0, 0x0) 12:15:26 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$smackfs_load(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="20c6bbb79b0e9f4e9be36ca8fa315cdc380d6210000000"], 0x7) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r2, 0x541c, &(0x7f0000000000)) 12:15:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0xd, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:26 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$bt_hci(r2, &(0x7f0000000000)={0x1f, 0x8}, 0x6) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0xc) 12:15:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0xffffffff00000000}, 0x0) 12:15:26 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x6000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0xe, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:26 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x7000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}}, 0x0) 12:15:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x10, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x11, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:27 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="000000fafffffffff9ffff00dfa700020000f0b0a7f406765c711083c8f219b453387704258146911043a87698464253257ed9356f2cb841210c8a9e6d140be8055fc84f17ba32d7fd8fedc2f65371f7c98a73502da31f67d64750b9212ed40293b102dc8f9c5d9513b8e577ac368ce5039db24389a5cd3e7771674d7bbb50e8e385b7dced4130"], 0xc) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r1, 0x4b72, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="a417a23e0d0cde24712c2723d5f93b50ecf7817c153e1c515164f4f115caf1078947ff05b4a273dd83356c7b71018084091bd4144355f29d615221f751fd634567ded8c19de2fc143b3f5b06e343567680bdf0280f1dbbcf8bbc3857a0d5b164c30d5ed515414922e9312e32645b37865e48396a7390636937822bd73dc6168b2a7b009840313161e892369c9aa26d2b1fb0c67164ff41e07048132d56ad98e37767d2ec77601f098e6f47bebaad62c15463b2232f84c271cfdb4b0a1d291ae9406ac0749a77e812593caa44e38fbda1bbeb59f6cbbca385b888427681ac6094bf779206478c6df06c28d133951d413c6d5dd937e92a7bd7940825da703bb3f540bbdc2dcee2240624a61246276fdf36732c2818d231e1660f0aa1eefa33d76fd87b3c5fa5d6b51bde049d81b2fe90e2a68b6f9ac9bc9c8afb34685743520d156931b35376c4bba81debab8f00eefb7aedf2068dc03dbebf7af3501a1916397dc3e3e9db54c10dbe0fd8ad46ff3e2f148bbada1b927b422c16bbd7c236aa25f4757b4b18572dca544553fcb15b6f90059fce45411186ece4e724f234b62d60017f1a586f183c9dc131bb5194b07096a7d7b58abd364fa891dd9bec9abf3ec9e18010a235d6ab16013764efe6bd4cbf8531e1e344985df4aa86a503a299bb6a7fbdde2473361dcd15be116e3e673f2d1e0226ac9a499acf7d12b8fadb43d031080cb1589948757149e900daf03a4a5960122f2a8330ffda81ca8741454929d8627a737af9e42c026bbfacef2436a06036d04497e12fe29e9498c4813fc50ae62ebebf267bc30f300694dc4bb0d55ab12442fb3a2abaaa71edf747dd0b34539b9f929031139a9e6230eba117261355662575455fff1971125e2303c9c310f145b95c8bbf8fbd0558c661823749c3b62f2e0f4a908f6e49cb2ba7664a4dafbeb5f7e4778fe2240e9a2724432bd5770da4e0bf7043688dd30b297e6912f16961d55ab4368a9ffe807292c30cce50f6f6c52829ba7a15c63a144d84623c2cadd3d8e90131792475c9bfdd3dbc419e4406e6892f8350887378fd3e5ed23fc5ecff22a586d51324fa69a35dec5a77b589a592866cbed5881d0be74025340bf81a543399cbd3a3c5fb181234be74cb24d406ca934dd36945b587b2bbf3022271d097351fad634bde6e9cd20abd69f7175c0747538c97f610a53fe6c40eb9b7bbeb8850f2e01f29080ddfb09693098d047b14890fccbaa903457b05713a8d901159ebc53ea1b2a405d5ce8cf063c1857cc2a0d4ec44cc25894b5a9053facada7a9bd0cc9860c39e075329f1e91652f54a3cab38a3eaea054f20e2cd151b745d44ebb18a68c3a84b97299a921b012bb0122f997660148f511d1a41ac884d9ace04fb1beb3ba475d2d243908f59a08114979c3ed977b846738bab61aea7022ff1f7cba50866"}) ioctl$TCGETX(r1, 0x5432, &(0x7f00000002c0)) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000480)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0500000000000000000001000500040004000500050000000000050006000000060008000300930d00005e5f32452843a578856a60eac1858fbaf608f8b9d3872b8deeb3a437e872cb09b2125c703b82d6eb5ee7f01ded8476a2627dac33627b07e4382577cdc69d0dcbf0092320a92177a64379"], 0x30}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x64, r3, 0x300, 0x70bd27, 0x25dfdbff, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x339, 0xaeee, 0x5]}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x5}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x8]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000048}, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x4000, 0x0) 12:15:27 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, 0x0, 0x0, 0x1e, 0x0, 0x0) 12:15:27 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x8000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:27 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x2}, 0x0) 12:15:27 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x12, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:27 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000001c0)) r3 = getpgid(0x0) r4 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f00000002c0)='X', 0x1, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000640)='user\x00', &(0x7f0000000540)={'syz', 0x0}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) r6 = add_key$user(&(0x7f0000000640)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f00000000c0), 0xc6, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r4, r5, r6}, &(0x7f00000001c0)=""/127, 0x7f, &(0x7f0000000300)={&(0x7f0000000280)={'blake2s-160-generic\x00'}}) r7 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f00000002c0)='X', 0x1, 0xfffffffffffffffe) r8 = add_key$user(&(0x7f0000000640)='user\x00', &(0x7f0000000540)={'syz', 0x0}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) r9 = add_key$user(&(0x7f0000000640)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f00000000c0), 0xc6, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r7, r8, r9}, &(0x7f00000001c0)=""/127, 0x7f, &(0x7f0000000300)={&(0x7f0000000280)={'blake2s-160-generic\x00'}}) keyctl$setperm(0x5, r8, 0x80000) keyctl$dh_compute(0x17, &(0x7f0000000080)={0x0, r4, r8}, &(0x7f0000000100), 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={'cmac-aes-neon\x00'}, &(0x7f0000000240)="c4d58517a9e73989a05ba02be7f111ef036316bcba9bfd658327b1d7a7df20100f67836b81988819bc4cd1bc986822656cf70e49194b1218e4a7d89eb07fd1465fbca1de2347e000937c242def3072f20ebebb09d632e122a53d35c5878a9a75b4e8ea951ec124201e01f515720dad381480bf6bca6e6d6017b66ae69668a060", 0x80}) sendmsg$nl_generic(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x21}, 0xc, &(0x7f0000000140)={&(0x7f0000001540)=ANY=[@ANYBLOB="f00000ed2b0002002abd7000fbdbdf250300000008002f00", @ANYRES32=r3, @ANYBLOB="040048807d4c18534e61fbfa374dd85e5d5c6a04bffeb5d814a688f34496a69ba12a7e07b4dfa6fbe2e7e382be2895d871350faf8f0a3a906c26b0513172b6b6da89f3b26f47bfa477f88b9ff074d27041be2682656f725a54c50df77d8eaaaec8fe600c676eae98ffc46335d74b56741d186657bdc3bf6422f2f3eedd6248560da6cca5c408319b4cf0429958c668df0ee387d26f4fedeb62495d096ccf492a5d57630891f48cf5e144e15055d0a24e71dddaec71850a994920a67245a1e46d0af72e51b381df57b50b15ce8382c2adf5756800"], 0xf0}, 0x1, 0x0, 0x0, 0x8040841}, 0x24000010) r10 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r10, 0x541c, &(0x7f0000000000)) 12:15:27 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r4, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x50, 0x1410, 0x200, 0x70bd29, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x3}, @RDMA_NLDEV_ATTR_STAT_COUNTER_ID={0x8, 0x4f, 0x1}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}, @RDMA_NLDEV_ATTR_STAT_MODE={0x8, 0x4a, 0x1}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x2}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) setuid(r2) ioprio_set$uid(0x3, r2, 0x2000) 12:15:27 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="dd8d0b13ec257732e0a931d2e12620cd9854595e438d3fdc9831bd1f2b77968af814d37e45e482da3afb95368564e9204ed269250dfdfb", 0x37, 0x894, &(0x7f00000000c0)={0xa, 0x4e20, 0xffff8000, @private1={0xfc, 0x1, [], 0x1}, 0x5}, 0x1c) r1 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) setsockopt$sock_timeval(r1, 0x1, 0x43, &(0x7f0000000040)={0x77359400}, 0x10) 12:15:27 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x25, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:27 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x9000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:27 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) r1 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x5, 0x1) ioctl$SCSI_IOCTL_GET_IDLUN(r1, 0x5382, &(0x7f0000000040)) 12:15:27 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x3}, 0x0) 12:15:27 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x5c, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:28 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, 0x0, 0x0, 0x1e, 0x0, 0x0) 12:15:28 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x83, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0)='nl80211\x00') r5 = socket$tipc(0x1e, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="ac780000", @ANYRES16=r4, @ANYBLOB="110000000000000000000200000008000300", @ANYRES32=r6, @ANYBLOB="08000c0100000000"], 0x24}}, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r4, 0x4, 0x70bd2d, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8040}, 0x10) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000080)={0x9c0000, 0x3, 0x1f, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x990965, 0x6, [], @value=0x81}}) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r7, 0x541c, &(0x7f0000000000)) 12:15:28 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x300, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:28 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) fcntl$addseals(r1, 0x409, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000000000)='net_prio.ifpriomap\x00', 0x2, 0x0) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDCTL_TMR_STOP(r5, 0x5403) recvfrom$ax25(r3, &(0x7f0000000100)=""/73, 0x49, 0x1, &(0x7f0000000180)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 12:15:28 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x0) 12:15:28 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xa000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:28 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = request_key(&(0x7f0000000300)='trusted\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)='#! ', 0xfffffffffffffffa) add_key$fscrypt_provisioning(&(0x7f0000000000)='fscrypt-provisioning\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f00000002c0)={0x7, 0x0, "4a608c8068392f96c6de698d70853908ceb01b4d1da05fefa8322c1a501b9095d20375917838fd0633763f924dee9604"}, 0x38, r2) r3 = dup(r1) recvmsg$can_bcm(r3, &(0x7f0000000200)={&(0x7f0000000240)=@generic, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/77, 0x4d}], 0x1, &(0x7f0000000180)=""/70, 0x46}, 0x100) 12:15:28 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x500, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:28 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x600, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:28 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x700, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:28 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x5}, 0x0) 12:15:28 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x900, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:29 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xb000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:29 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) accept$unix(0xffffffffffffffff, &(0x7f0000001640), &(0x7f0000001600)=0x6e) epoll_create(0x2) r2 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) openat$vcs(0xffffffffffffff9c, &(0x7f0000001540)='/dev/vcs\x00', 0x400000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x8) ioctl$SIOCX25SCUDMATCHLEN(r4, 0x89e7, &(0x7f00000015c0)={0x32}) r5 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001580)='/dev/snd/timer\x00', 0x80) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$EVIOCGKEYCODE_V2(r6, 0x80284504, &(0x7f0000000040)=""/4096) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r7, 0x541c, &(0x7f0000000000)) 12:15:29 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0xa00, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:29 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0), 0x0, 0x1e, 0x0, 0x0) 12:15:29 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x6}, 0x0) 12:15:29 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) r1 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r1, &(0x7f0000000140), 0x4924b68, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet6_icmp(0xa, 0x2, 0x3a) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000100)={0x0, 'bridge_slave_0\x00', 0x1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r3, r5}) 12:15:29 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r1, 0x4b72, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="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"}) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, &(0x7f0000000000)={0x6, 0x5}) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) 12:15:29 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x8}, 0x0) 12:15:29 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0xb00, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:29 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0xc00, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:29 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xc000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:29 executing program 4: syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000000)={r4}, &(0x7f0000000040)=0x10) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={r4, 0x8}, 0x8) 12:15:29 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xd000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:29 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0xd00, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:29 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x9}, 0x0) 12:15:30 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0), 0x0, 0x1e, 0x0, 0x0) 12:15:30 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='#! ./file\x00\x00.'], 0xc) 12:15:30 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0xe00, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:30 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0xa}, 0x0) 12:15:30 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xe000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:30 executing program 3: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x141000, 0x0) fchmodat(r0, &(0x7f0000000080)='./file0\x00', 0x184) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)={0x68, r5, 0x5, 0x0, 0x0, {{}, {}, {0x4c, 0x18, {0xfffffffd, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r3, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r5, 0x4, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x8000) ioctl$TIOCL_PASTESEL(r1, 0x541c, &(0x7f0000000000)) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f00000000c0)={0x0, @reserved}) 12:15:30 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x1100, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4000000000206f) io_uring_register$IORING_REGISTER_EVENTFD(r1, 0x4, &(0x7f0000000000)=r3, 0x1) r8 = syz_open_dev$tty1(0xc, 0x4, 0x1) rt_sigpending(&(0x7f0000000040), 0x8) write$binfmt_script(r8, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) 12:15:30 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0xb}, 0x0) 12:15:30 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 12:15:30 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x1200, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:30 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0xc}, 0x0) 12:15:31 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0), 0x0, 0x1e, 0x0, 0x0) 12:15:31 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x10000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:31 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2000, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VFIO_IOMMU_UNMAP_DMA(r3, 0x3b72, &(0x7f00000005c0)=ANY=[@ANYBLOB="1e00000008a1a0fffeffffffff09b5483d9b6723e5d172e2763e6d965f1c1fba1c31632627d640894548c60d5a605ec1023efdaebfd1f7e61210392a7a9b1044c02ec98a734309760d210d04c409b000000800000000000000008837ad703b8a659329ee7d0cef04003c90f060a15aaebe431fc3dc647966785e4f6cb700100000b182a3e14b0bb514b72ca0bc0cc12cc2a52473dbfdf2e760f58f1c493451079d610016d362d840f2a4d3bb9463c5b0a725771941b493203ca32a25a8e8cbce9227b934a0e13753534b990052c16e1f8b96df6c2d24773eb4a8bdc4545ba76618c24e9787ee0991e826be2fa4acaec2246b0f1c391077"]) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r4, 0x641e) r5 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x1a, r5) keyctl$search(0xa, r2, &(0x7f0000000140)='pkcs7_test\x00', &(0x7f0000000180)={'syz', 0x3}, r5) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000080)={'ip6erspan0\x00', 0x84}) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, &(0x7f0000000040)={0x2, 0x2}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f00000001c0)=0x3) r8 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x28800, 0x0) ioctl$SNDCTL_SYNTH_INFO(r8, 0xc08c5102, &(0x7f0000000400)={"7e2e13ef3f9cc267e6ec344aa0aabe8fe6bdc13c0e18736782d2c8dbbef8", 0x6, 0x2, 0x0, 0x81, 0x1000200, 0x80000000, 0x6000, 0x3, [0x4, 0x55, 0x1, 0x3, 0x8000, 0x8, 0xffffffff, 0x2, 0x1, 0xffff, 0x0, 0x6, 0x4003f, 0x1, 0x8, 0x4a, 0x8, 0xfff, 0x88]}) 12:15:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x1f00, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:31 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0xf}, 0x0) 12:15:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x2500, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:31 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000040)=""/251) 12:15:31 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x10}, 0x0) 12:15:31 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x11000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_type(r1, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) 12:15:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x5c00, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:31 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x11}, 0x0) 12:15:31 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b0", 0x27, 0x1e, 0x0, 0x0) 12:15:31 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x8001, 0x3, 0x400, 0x3f, 0x2, "6feebdc658113c5e39172a491793b8881c971a", 0x6, 0x5}) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 12:15:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0xeffd, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:31 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x12000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:31 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x12}, 0x0) 12:15:32 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0xfdef, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:32 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 12:15:32 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x13}, 0x0) 12:15:32 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(0xffffffffffffffff, 0x4b72, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="a417a23e0d0cde24712c2723d5f93b50ecf7817c153e1c515164f4f115caf1078947ff05b4a273dd83356c7b71018084091bd4144355f29d615221f751fd634567ded8c19de2fc143b3f5b06e343567680bdf0280f1dbbcf8bbc3857a0d5b164c30d5ed515414922e9312e32645b37865e48396a7390636937822bd73dc6168b2a7b009840313161e892369c9aa26d2b1fb0c67164ff41e07048132d56ad98e37767d2ec77601f098e6f47bebaad62c15463b2232f84c271cfdb4b0a1d291ae9406ac0749a77e812593caa44e38fbda1bbeb59f6cbbca385b888427681ac6094bf779206478c6df06c28d133951d413c6d5dd937e92a7bd7940825da703bb3f540bbdc2dcee2240624a61246276fdf36732c2818d231e1660f0aa1eefa33d76fd87b3c5fa5d6b51bde049d81b2fe90e2a68b6f9ac9bc9c8afb34685743520d156931b35376c4bba81debab8f00eefb7aedf2068dc03dbebf7af3501a1916397dc3e3e9db54c10dbe0fd8ad46ff3e2f148bbada1b927b422c16bbd7c236aa25f4757b4b18572dca544553fcb15b6f90059fce45411186ece4e724f234b62d60017f1a586f183c9dc131bb5194b07096a7d7b58abd364fa891dd9bec9abf3ec9e18010a235d6ab16013764efe6bd4cbf8531e1e344985df4aa86a503a299bb6a7fbdde2473361dcd15be116e3e673f2d1e0226ac9a499acf7d12b8fadb43d031080cb1589948757149e900daf03a4a5960122f2a8330ffda81ca8741454929d8627a737af9e42c026bbfacef2436a06036d04497e12fe29e9498c4813fc50ae62ebebf267bc30f300694dc4bb0d55ab12442fb3a2abaaa71edf747dd0b34539b9f929031139a9e6230eba117261355662575455fff1971125e2303c9c310f145b95c8bbf8fbd0558c661823749c3b62f2e0f4a908f6e49cb2ba7664a4dafbeb5f7e4778fe2240e9a2724432bd5770da4e0bf7043688dd30b297e6912f16961d55ab4368a9ffe807292c30cce50f6f6c52829ba7a15c63a144d84623c2cadd3d8e90131792475c9bfdd3dbc419e4406e6892f8350887378fd3e5ed23fc5ecff22a586d51324fa69a35dec5a77b589a592866cbed5881d0be74025340bf81a543399cbd3a3c5fb181234be74cb24d406ca934dd36945b587b2bbf3022271d097351fad634bde6e9cd20abd69f7175c0747538c97f610a53fe6c40eb9b7bbeb8850f2e01f29080ddfb09693098d047b14890fccbaa903457b05713a8d901159ebc53ea1b2a405d5ce8cf063c1857cc2a0d4ec44cc25894b5a9053facada7a9bd0cc9860c39e075329f1e91652f54a3cab38a3eaea054f20e2cd151b745d44ebb18a68c3a84b97299a921b012bb0122f997660148f511d1a41ac884d9ace04fb1beb3ba475d2d243908f59a08114979c3ed977b846738bab61aea7022ff1f7cba50866"}) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) 12:15:32 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x80000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:32 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x7f4da0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:32 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x20000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:32 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b0", 0x27, 0x1e, 0x0, 0x0) 12:15:32 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x60}, 0x0) 12:15:32 executing program 3: r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r0, 0x8983, &(0x7f00000000c0)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r1, 0x541c, &(0x7f0000000000)) r2 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) getsockopt$inet_int(r2, 0x0, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) 12:15:32 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0xf0ff7f, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:32 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x20100000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:32 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x1000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:33 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 12:15:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x300}, 0x0) 12:15:33 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x25000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:33 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x2000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:33 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x3000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x3e8}, 0x0) 12:15:33 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b0", 0x27, 0x1e, 0x0, 0x0) 12:15:33 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:33 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x4000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x500}, 0x0) 12:15:33 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x5000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:33 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x40000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x600}, 0x0) 12:15:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x6000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x7000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x900}, 0x0) 12:15:34 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x48000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x8000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:34 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab", 0x3a, 0x1e, 0x0, 0x0) 12:15:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x9000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0xa00}, 0x0) 12:15:34 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x4c000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0xa000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0xb00}, 0x0) 12:15:34 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x5c000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0xb000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:35 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0xc00}, 0x0) 12:15:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0xc000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:35 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x68000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0xd000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:35 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab", 0x3a, 0x1e, 0x0, 0x0) 12:15:35 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0xf00}, 0x0) 12:15:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0xe000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:35 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x6c000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x10000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x11000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:35 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0xfcd}, 0x0) 12:15:35 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x73c5b1fa, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x12000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:35 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x1100}, 0x0) 12:15:35 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x74000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x1f000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:36 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab", 0x3a, 0x1e, 0x0, 0x0) 12:15:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x1200}, 0x0) 12:15:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x25000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:36 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x7a000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x5c000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:36 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x82402100, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x1300}, 0x0) 12:15:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x7ffff000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0xa04d7f00, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x3f00}, 0x0) 12:15:36 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0xebffffff, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:37 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b", 0x44, 0x1e, 0x0, 0x0) 12:15:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 12:15:37 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0xeffdffff, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:37 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x97ffffff, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:37 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0xfeffffff, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x4788}, 0x0) 12:15:37 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0xfffffdef, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:37 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xc0ed0000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:37 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0xffffffeb, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x4888}, 0x0) 12:15:37 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0xfffffffe, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:37 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xe0ffffff, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:38 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b", 0x44, 0x1e, 0x0, 0x0) 12:15:38 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x10000000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x5865}, 0x0) 12:15:38 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xebffffff, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:38 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x80000000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x6000}, 0x0) 12:15:38 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x7ffffffff000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:38 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:38 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) dup(r1) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r2, 0x4b72, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="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"}) ioctl$PIO_UNISCRNMAP(r2, 0x4b6a, &(0x7f0000000000)="9ca20d8021694b41b67e5ee79e3cfcdb4fc6b185912551a7f46831318828a504692f4e90d19051e840ed82aa14678ff01b4f061d9fe6b337d192302f2d42a22140741e5614afbaf26f85ab3da93150d9330b4aff93a9398e9dbaf288a71ef0") write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='\n\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\x00'], 0xc) 12:15:38 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x1000000000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x6558}, 0x0) 12:15:38 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xf9fdffff, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:38 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b", 0x44, 0x1e, 0x0, 0x0) 12:15:38 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="250afc0b58b56983505af3e927d7dfe259133afdffffff344fde9ce6f8d425cb87edaa5549e2380583de7b4257e445b868dbf5a19d98bfd39c1c93c8dce15c4f76cda2534b481f6da5bf722ecb"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='afs\x00', 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) 12:15:38 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0xf0ff7f00000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x8100}, 0x0) 12:15:38 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xfab1c573, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) [ 1160.324498][ T765] kAFS: unable to lookup cell ' [ 1160.324498][ T765] ü XµiƒPZóé'×ßâY' 12:15:39 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0xf0ffffff7f0000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:39 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x100000000000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) [ 1160.365171][ T772] kAFS: unable to lookup cell ' [ 1160.365171][ T772] ü XµiƒPZóé'×ßâY' 12:15:39 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0', [], 0xa, "b785f8ef38b04c30d72c795bffffeae43fcb951d13e60ba26386eee6"}, 0x27) 12:15:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x8847}, 0x0) 12:15:39 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xfdfdffff, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:39 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) 12:15:39 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x200000000000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:39 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf74", 0x49, 0x1e, 0x0, 0x0) 12:15:39 executing program 4: removexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000280)=@random={'btrfs.', ',\x00'}) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='a5u#! 3/file'], 0xc) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x604002, 0x0) ioctl$TIOCSCTTY(r1, 0x540e, 0x101) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000940)={0x14, r5, 0xc46dfc707e1df77d}, 0x14}}, 0x0) sendmsg$TIPC_NL_BEARER_SET(r3, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000040)={&(0x7f00000001c0)={0xac, r5, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x4}, @TIPC_NLA_PUBL={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x2}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8001}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1f}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3ff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x965a}, @TIPC_NLA_PUBL_UPPER={0x8}]}, @TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}, @TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7744}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x6}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xffffeb7f}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xf397}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x4000010}, 0x4000044) 12:15:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x8848}, 0x0) 12:15:39 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x300000000000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:39 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xfdffffff, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:40 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x400000000000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:40 executing program 4: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="2321202e2f66696c65302020000020f905efb6220b057782e2a6311a90"], 0x1d) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r6) syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x5, 0x4, &(0x7f0000000440)=[{&(0x7f0000000100)="f72b15829982ba2097b87e07d69691ca05b05222fc326db420bc6185bf00430e476d67f0d032ce2b97d45836c316d40c75747bd7b2919af089dd5c9c689407a8cfc24dfd5747d16cb3bc26a36e62abdc6722942c529f70a0da161741192887204f032e50f284ffbd9d5ed513103bf8b9bd", 0x71, 0x5}, {&(0x7f0000000180)="96cc6363faf805381c4261bfcac875c81626374113ce037a8de6e9c1d30c15adc4606074161c761e410d54abb86a737af98a50a64494e134c86545a8fdd0ac6cc01d206026f2520b645cb0a42f20cec425cb819ca326b88500aa896e3d6a3bf7e12519e419a51004a3660e188d1166be6f3bd0bc0f4b37792561c788ec8f3a48be31ffb55074621f48597a5ba24030ae2dd16bfc2875803d3c263769126c4648954cb07e02d261a48119e39dd46ef8bf3530f2014108bf43c15b45e951d4972370fdad8b7031cce1bb420dadc148489d3475bdb34690f05ca712c4", 0xdb, 0xe9c5}, {&(0x7f00000005c0)="96bcdade5bbcc48061f540309ec8695cc0289db377021dc78b30217be25d0b0092c4fa727678d066d692f49f6d4628d6b342e5c47eb6388215c617459982ce6fe2169d9541af26bbe15c4fd03d62158d44b22fdbf71aa22ea1cbee5bfde3bb85a85c452790270fb4f05e62bd4a339e8e758c33c12e99cd874e95bf7fcbcad809c2aff7c0d6b0e9c8994b38bee1eab37a7a83bf84ad532eb3d94c97077f31f240dff1", 0xa2, 0xcdb}, {&(0x7f0000000340)="dfa2cdcfacfb02b93e1c992ca2ae56a3f66e278fd655931aca0a5d47ee2e3a1ca9cbe2301ffccd3c30f5eb20c560b1d541d97ca8432cd1ef576bb5326f6913c2fc4ebf7a0fd96318dc5e7ccf09b033c99e703701e887bd945db795e18d3195102b0e9a6c9b6c2c0157ee313482b1a2b65dc8ac6b089604a44735ecf223047ab1a673e00c0738764a29096b575f70513bd6db2f7e820433c1d6fe09efc8823de808e5794b4a3831c1944f965cbb736611568b9dad93b65e2bea9ea1eb3e29c46e0e1fb43e66f8ea7af26eab90872bc520442ca4c791cf9580f961434f65", 0xdd, 0x20}], 0x41000, &(0x7f0000000680)={[{@statfs_quantum={'statfs_quantum'}}], [{@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@smackfsdef={'smackfsdef', 0x3d, '#! '}}, {@dont_measure='dont_measure'}, {@uid_gt={'uid>', r6}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x65, 0x38, 0x5b, 0x32, 0x37, 0x30, 0x37], 0x2d, [0xfd, 0x39, 0x66, 0x35], 0x2d, [0x34, 0x36, 0x0, 0x39], 0x2d, [0x33, 0x62, 0x63, 0x31], 0x2d, [0x65, 0x37, 0x33, 0x65, 0x34, 0x62, 0x38, 0x64]}}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x36, 0x31, 0x33, 0x38, 0x34, 0x62, 0x38], 0x2d, [0x36, 0x32, 0x36, 0x35], 0x2d, [0x63, 0x33, 0x36, 0x31], 0x2d, [0x63, 0x0, 0x39, 0x61], 0x2d, [0x36, 0xa3cd270c7eff0a61, 0x39, 0x39, 0x65, 0x65, 0x31, 0x38]}}}, {@fowner_lt={'fowner<', r4}}]}) r7 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_KEYBIT(r7, 0x40045565, 0x1f9) 12:15:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0xcd0f}, 0x0) 12:15:40 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffdf9, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:40 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x500000000000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:40 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:40 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xffffff7f, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:40 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf74", 0x49, 0x1e, 0x0, 0x0) 12:15:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0xe803}, 0x0) 12:15:40 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x600000000000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:40 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet(0x2, 0x3, 0x7) r2 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) r3 = socket(0x25, 0x4, 0x5) setsockopt$ARPT_SO_SET_REPLACE(r3, 0x0, 0x60, &(0x7f0000000200)={'filter\x00', 0xb001, 0x4, 0x3f0, 0xe8, 0xe8, 0x1f8, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x1f8}}, {{@arp={@loopback, @remote, 0xff000000, 0xffffff00, 0x0, 0x9, {@mac}, {@mac=@dev={[], 0x1d}, {[0xff, 0xff, 0x0, 0x0, 0x0, 0xff]}}, 0x3, 0x5, 0x2b6c, 0xdf, 0x81, 0x8, 'veth1_to_batadv\x00', 'veth0_to_bond\x00', {}, {0x71ecfe8ecf96b556}, 0x0, 0x29}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@broadcast, @loopback, 0x0, 0x0, 0xe, 0xc, {@empty, {[0xff]}}, {@empty, {[0x0, 0xff, 0xff]}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @dev={0xac, 0x14, 0x14, 0x28}, @multicast2, 0x8, 0xfffffffe}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x4924b68, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000000c0)="5c2036a8c6b63f6f2ca2721af73c31d17f8fc0df67536d5c6781662da0a92d0827579c52918de1b926d972d367b0e4de9ad404324fd53a34ff7d34f81236eafcf82b26b5a1f7a6403af1b52ebdb0608a5ea04d919af16887a759f725261fdd45e777d01123bc9dec6d5d90bc99805594a8ff6670386594cf615da7c9d161ddf3bb8ee66704bfd1b491a6225551a65a37940f31eaa9c14c798ffeb166467f487ebe8b3fc87b7578097dee1039f9c34487b9368e8c6508d232752bae031472142b3d09ee7a681308d4928ad9e1aafc3e96f15ccf4fde2d4fb9cd72207da1a76c34664725afa249c77e8d61823a8ecff9f0d4b01d5227", 0xf5, 0x45040, &(0x7f00000001c0)={0xa, 0x4e20, 0xfffffff9, @remote, 0x44}, 0x1c) r4 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e20, @multicast2}], 0x20) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='\x00'/12], 0xc) 12:15:40 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:40 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x700000000000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:40 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x4c000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x34000}, 0x0) 12:15:41 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x800000000000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:41 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xffffff97, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x400300}, 0x0) 12:15:41 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x900000000000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:41 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf74", 0x49, 0x1e, 0x0, 0x0) 12:15:41 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:41 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0xa00000000000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) 12:15:41 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xffffffe0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:41 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0xb00000000000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:41 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x48000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:42 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xffffffeb, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0xc00000000000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) 12:15:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0xd00000000000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x3000000}, 0x0) 12:15:42 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec", 0x4b, 0x1e, 0x0, 0x0) 12:15:42 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x12000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0xe00000000000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:42 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:42 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r5, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) io_submit(0x0, 0x8, &(0x7f0000001980)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3, 0x0, r3, &(0x7f0000000240)="0fc5109a213dfb3aa6e8c33cf8023512f3163eb05b18f5cf7cfa624ef4380f0273f2ee333f416695c056477e8de0705d991bc0e9f5fefa4951a2e68cc68bdd239cbe2998eef8af4c6853e920c3958d64301724bb9b73a5688193c2683471d48c7c4a596a88c11738421ab89d7a18984da72e9ef27e856e56c0b4a4573e3266e4fb747b25b76d50d8244e75", 0x8b, 0x80000000, 0x0, 0x3}, &(0x7f0000001340)={0x0, 0x0, 0x0, 0x7, 0x9, 0xffffffffffffffff, &(0x7f0000000340)="fc3e10bda810da8974e6cbe1df78fe39ebae781d66ce402744235e0f7765229128b71ac0ef4435efa2e80aba78e63a4106bdef44d34c249922626a417564a9e119cf173505884ac435075e6f3e1abb0d3cf08718628dfedea799b69e45a70a2cd7463c8760ae079a8fc1d9688f65ec06186b27e47dc65d6be1c857ecde20818ae8c6340831db168ae6d961de992ec276d73a859177b64a4ec67a194e29f4dee55448b5aa6ab5ed6ac56174483ff396fc8a3dbad9732d751a4cb397e14b3c312521d6fcee5289e4065cb3f878a86c9f64b9db1a14aeab59d3044200cc4ca9f6ffa2f2d0b67680bfe20c8606e465cac44c5f8b445dc5dc1c4ec618429e2498c7603a72876127ff1292317cbb55b97c0eec1428e783052b43de984ad26d4805a3cc14c85a9887d6beb7d13bfbd8950a078b5d7a92a5df7f319517dd4f06f05137fc9856c67a89adbb1297844aa8336531032b8d25858a9ded8f1967778125e877ea552bf49fe77011e0b8e010bc80024b4d3fb614ab1de475c5ee62414cd3fe51b2ce86727c50e05612d4c87056f344eea76bb851f39e11a8c2ce0de7072d3d7e081a7e50b48ce4b12f6d486286ce77be9981e986ea4de7b5765ef30a434a1fa9f0cab3f9852389fd738564783355ad34312469299ccd204d7e18da06a95d39ad8e2823ea2240b8b310018571969561445a5fb3c31b616589e87c1d249e4d26feb28c2162dd0126b7d2bb14ba9f4cbefcba47a57eab1466d10765aba4d4089a121b98036009b42958a65c5d27f3730a94ed2aec57c233e47e4fbd5ea4dfcad89662757280f4b2df656d064a889f3b71cd96a781f5280da1f03bcbc79b6d2936b12d423b4ace9664276275e44857f923226298cd495a6d2898550416ef8722a29474055a7703ef53d318adf91cba330e405770bdca45c8757978743e09e6ba9d26077683ed577be8d6deca2c7d2522e84bbaf8a196b3418bc359c923e7a72dd8a395e0be71e79955814438375c9aa93726c15cf298764b81f4de3bdc505654d6371cf858715a78e3ab335779b89fd720af85c9adb561d98b07798a1ad49a8b734798a2145d2ed04ecf4e49f1656391e42389f047fad60b7741038652f505db7de41d914493d134f96d2eba5d244c41a8feccf6b2170fb40dfd5de85d29749c690a36dffba3cd42f3c68ad5c44209aa8e24f6eeb9cf45d1ce2d2b8648e8ad3802d208082fe31c27203422b8861d54ea3823c6552abe50f9d943c0ac4752915c9df0362af366d0312cdf6990ffee8492292ef1ef98ff578321e9ebf5fcff0d0b6a0ad8ae363754f3838710fcbfe73c4ceba151959c0877f46977ef4641aea20e99d2a0e6ed417e23526b7b39d9e067a97926e34cf46a8fcb0f1a70a77a843099faeaf448ce6ee956a293c8a7ac33449b427da3d4494b106c20a57a413f81e6dd5529ca04196242468bba74c2eda1a211490dc98229feab1585c52d425435b0833ad5ee3de9cc1e5f08eac667fe864bb30fae0887bae160f282778508c1068285ef3726f0e0d557c7671dfee259f4bfd6e0c369eaa3160532cbdb43a7fa629030a841b1175097d16c88a1e94040e7346c34bd1aae87daf783f82899cd5c5b25eefc53bbc9b633737a527f9f1dd43ac59cf08b1a2382b59ab5af7c9dc835dfb85d298ca3636f8cb136e98eef367e9c3b7ed900b25aa35e45f5e4bf52d8982c1073fe19e48de06a9edc1ccbedd48e98a7c630fb6a6e2f47aea6bca86f912861020a3dee2c3dc4f859e29f27c869c434b73ed9525ab21214365fcf1a0807b093eee2c14af426c1a0c7f842ff6fa6be65a3ce280f216c9acca3cd09e48397a994cf7bb5dfed87f310980097cafe659eefdee8a9fc31e0d66018a054e626a3b855da22ea2ba760f81559449db5cffec160dda3357400d4a542aee2cee1a819b6f37f321d79667d47d1e654021a25350d5df474533132f81227a249ae8c273b3646c2b250524f5e42590ff1f026e2f6f2a99dceecc9496de0c5e88177af68fd4748d72ea6276b15c64ff78d7b3952610a3e8947811f7b5d33b55d80641514381e2cd43e51e109e13dbf85652a0677d9f6ec164996c46e0e4c3064771fdc78352720f445b767265ed50079db8625396f80adf42c382fddc43c1b7b7bcb8b1dc569d1402148b10090ea6607bae6e017c7efeddfd98313df902f399530703245b05460733da1c9f60ead19f0f639851d5d77113e48a2982ce2f182dca71b087178e9ce88d8d29e44004ebfb6bb331d8ed3d7fdf01d9f8e00f0ac09817ae917f70f80a83e33cc00781936e7893a9d42a396ba5905c940e7fb907bf2e76b1a305c7a6abde12f4a416f1bc53186aa3374f425c281f9d26058d9093fa34b9169752fa4fd742f8c0513b92a43388d4f9e7592c1f1061fb8f20f110e2ccc82c369bfe14cc49b6f31893337cbf40522e6214d55551f539808fb6b8f91bc35427e8dc3d4d4351cda139c518d2541bfabb6f7bffa4d70ecbde5d0d18aa8136fb5295723ee6e4f390a1db8db924c51ee51640abbc19c61a4501922fb0ca3ef2f5ceb7939b9aff40060ddf367a0c0fbcd16b2fc5d07d449fc27a4390c3725565cc0ac9fa81646be7a1b7c36cfd5f0da4b647ccee37135aca00c622a2c505715851e86d53c253e66c5dfb26794b4c2917301c47959beb57424776642ee6d13e6d9b4931e21da4d2a89d5baa82d6fefa013f37e361895fb6949a68b2b7b21457cded1db915a18ad7b9ca3e4fe07b9d21e98e7e8473974f104da17650005e75e6df21b5c31478e49b570393d31588c59df122084de8ef4efaab810c263bb2b4af2964ed07249898b9ce205e85a4bc9d1eacb2632a570bac67ed3eac7dde6bf6eea294022665fbd4296471b630c3be751f80bfd3162a985f8add8808c3d3338c502ae6eb67a1ef3e0c835e2a1fb2bdc4a62759587f1f013af9c0b49f6a26175edf15f45368e74922ef53e41de0b5f6a0d26cf3746d2d81896f4b2a653ab1493120b56c63007eba8db06ecc255142bbd3bbe1c3f0567ed04142c469f63c64724e4fb27a471f7bf091316e761183039fd1a2cd7d0ed183c7e525f69d27753d40f60717dbb0f86a7907fcaf2217829707c6f05329905f81f2defaa6cb94372fef865dba012d0003e48f499430de466791f1d46f72cb89fd5de49a3bb3979242de8084bc67e3ab53b085fad8be85a03d3d7f17b79418145666e4b0d95b4664133540975355c90a7d515b73bae5fefda961102a77879df98f820ae48b5000d731e49131d7acf66f044f649941c0a09bf74ff2cca24949003cf741334613ede0c8bbd987fa5f4234bc5c448cb761ee5482f87b7ac9c153cf689c1021bb22312b095087d7cdbf88f69c04767cfffcf5f2f3d60e5005dbbd0ecc8880a7f5706e45020ceac6a1a07b83e209df8148c2492ca660720b112d9a0cffe9453103d8b9a24675f5377ec836f962e823dcc7ae5094729c4eaacd6f989f3f8dc3d1fd6544ca57ac791f423b96f421d5e94b58a1e21d727c18ad9dc658c29bff3bc1810a950d2d38c06f6fb8a4ada792308d27875e2a7931c891c3f45b4524a3672a8531613d6251853cf4d54d2dc5e14eae8b179b36efa0573a25c1ea3c91cc71992521360f5c1f57ef4c2d4ab272642d61e82f23266007729263effadf4e533a002a4de6ec5ebbff2c318f507d98d5b10f539499929d65ca863a6d79994068c421bb53efbcb089e71e1edbf7c9bb3cb574a3616304d98e70189790c5b39efb9f53f508b0d93670363936f1335efe0a9504062f801102d6a312200a2f9a951d039035d83c6f44054f97ff7486815612d8991521c97fa8f758523ae335647aec577ef73ce901dda3bd041730701759cd3e32ae22c687862b585ae3429205d46318ada54ede468fc0bbdb27d4e5c4c33d309a47929d989cfeeb9ddc6e9a28758cb8272a5f0c9b6b7f48e07d74ecc5ce3c90164cacb408352941d8669534df2094ebe56a2f4ecb26660e114b52d1fe11110605da0377ad914df3b76217b73800570e59158fb175f4f08c3f0a578b4e9fd45e12beaffe2419cdc3b6c049a3b6e48d869a6aaa08bcd7edfd2dec0377f6fa9bdc7f07ba51992dc0b46ea5acd5774bc61140d4a44894f97ac057b58e0fda02f384d114a5a4b829394cd8828ff170564f3ddb17f41058ccec5ead61624edbf6d9a9bb02243ccf67bf7019595333ef1d664493bb564cd2c020cf1601c3e9d168f169576bfd3fdce7ebf3c2efc44f3c9fda6533a30c67d89460f20a0b5ec6741fa3f4517ffe6b84b701dbdcf8b1d1d5be087e34730144e41e92365a661367fd1099598fd57ae37f27ba1a164016141c43921e9d7b81770ba4be489413fd8956a519e034974c3cc1373f139be794157dfd5ce297107f1094d661bd537006b56eda30e435d073ba3aa7cd92502355acbff206fee3442fed5075af0ac88c1d777998232c11a1f5e0e85d3f1812efd64009b36c3501a04db9adb875b0008be06f47eb6938096ff7dab89c6c0d3437b06d4e2d4d03bf2f0b81f36418658e67d30d8a46074e917fb186adbe9762991adafb8f34cb0b651ef1e0ed494edd8ee5511cff1bc2eaf8052e6b1651403956b6c78778cd08456e501cc6665d1e153ac413134d4734ee7b63332d7aaf477312042af95b9113443a39bc5daf89f699cb417f4327f8869193564c70eddb66e4614d9b77e2e9681850bcce8cb122d4ce2146b02d7dd981c4bcb04218fd370d092bd6a6035db9cdb795736592bc91f30a3b60cd58d8bb2de72a39ae17ad93c1ff89c20a2f2afb92680e84ed0f25a9f0ae1fd5102b6aec921d3b8008282289c777615db0eca81e74188630f0b1075e5b405365b1c4511ac9720f0517fb5afbac3d121843286faee9b25d99216dcfa9289b178bb30efd228b5fb26f1d3fabc137cf25d81b99e217dc91a94b886e5e9bbbb54eac82d1f62b113a132f708b0ebdfdbd733bcac868c52d13cfac4db354812197fee4b6a19a7c51e95a0404d4efafa9f697cab593698c750ff66f738bfa570de4d47442f6e0354ade465e667bb55efa1ff32e855e509e4d2a5cf9a31f411eaa8ce635276ce0d452cf744dfcab749d26a7adf595fccd484ec577c9281aad6e2907048aad2a2301be2f3783eeea49ce6dcff2fd42a306e129626a3b7e92364fca1c659d3a073fc455123d89685c26efc416ee25f93c7efcfb2f98cd0703dcd0c26b9b6ee70791b1feb8afd27dc1f83661f727f78b2fc1be0d60827e15bcc1bca90fad28cdb1f290931f92d1435c159d4b88ce7d2872f0f4216e93e24c6da54acbf04b434f85221533ee33af2c60cb9db3cea514ec8c85525012ea60d91e33847dfe39639b12a3d1fd3673b776f65fc09e55cfaf4204ded770010865860838f805286e7ac84fd970db168fb7e6214a81c9a6ffbf7fd22bab40bffd383f53c5042c88f5444b747a2389452f7b54b97081580143bdcca039e919b12f911452f892b2517bc118d333f236ba28bae692c9e4d13b1b3f7408cb4645e858f3d18e744058390162307aab9d72bcc8a6bc5c6dad243b69f1151ce0a7eca5df0c16297f0bade55dae436715f0c1b7efdae6044ad9e9ee42317234c15f79842c15653a53eb30ad67f54063eaffa5379a3095c34093bc32d1b747f8ad850891a47fd068f6163b5b5dee98835f93016cfeac0a6ee77cc23d5e0c2ff793a62dca2f346023cf26de073456e94da75ec46f28025c3419efc190068c8c0ab19d944acfa52546af786ba5d182be3f375a273260259531c970c73", 0x1000, 0x8, 0x0, 0x5}, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x3, 0x272, r0, &(0x7f0000001380)="273b5246603f2a2895a2c3164825fb9022d19ac36e0f9d7d9b5bf6e26643e06148c46bf6f96ed7e504b5796c09118e8b7dfa66bc60d7b082a1a70916df5e1436750f3cba78ac6a5b35beae39b00bf64c6397107f5836263e0ee68ef6b95367f8eb1180b0fbef8c1ab339aaa98574504620f6318c2cc031ab011d00bbe87ccf297462b1cdc0748ca2d1971571b07805ac29a2a05afe74fb9d86d9c3513c1a9925edd9c9cf6686a311e060ecf86bafbb4bf46ed4dbf2df0c2ef6eb8d43", 0xbc, 0x10001, 0x0, 0x2, r1}, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x1, 0x1, 0xffffffffffffffff, &(0x7f0000001480)="e5e7d8bd13ac0c946463b26a42aafc97ed7439f976a6b0b0724364c003d5f94aa076cb274a429fc5eb96faec0338f77410bc25c5bb54396b6074ed1ca5abd3898929e47c5a6e60907a6b6649bdc25a247e90f5b4acd38f7a2b5f2409ba0ffe8ee2b84cf90ebf4d7ac08cf6f4867388ea2807f2d22e21fdea8b132efca418c1e0464ac3983ce1c570b825b77db932f2bbd151957ac0838f4e3ce4d8b00ffae63d99269c182feaa5bc0eb38693a85e0a964d1146b1e0a56b05bbceeeb2a8172b0b0e7baabdfdb568b272c37ee00278677d52edffb0e03822133fb502e10de1b2b2797d391424a5", 0xe6, 0x3f, 0x0, 0x0, r1}, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x8, 0x0, 0xffffffffffffffff, &(0x7f00000015c0)="40d854d8c30f6d043a9ef43fb9cd74aa00347726dbc553f3b94343b91372ed39d1efd6597c5bdbb76cfeef638aedf0de6bfe6907c1669e1dde7b4ae3672d168c9b6c86e29a1fc7379d046e28ac9be796e08dabdcc8ca453cc0d5b04f67106aa029841aa7ce1646ec76800014e684edf26c963c592ce5cf3483051e6b2b596322cd25bf22ccaddea5fef0b0aeb4b1c2e044e17a38a2545e2f8c5e2cc8e2911b16791d2d904e2ecbfd20c356553e692612dfe60288f6b773857b9ea5b6b11e7226f4513e0f9db4fe0316babfe4a6c545daa6fc0daa39d135b259eed3117b46398c5cce478a51e216e811f655a16ac3f01b5b93ea", 0xf3, 0x1, 0x0, 0x1}, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x1, 0x2, 0xffffffffffffffff, &(0x7f0000001740)="b5e354bf9b83bbb737811634599a78a33552a9cd0c88ad3144d398e196d8d12cd6beddcc76335179", 0x28, 0x3ff, 0x0, 0x3, r1}, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x2, 0x3, 0xffffffffffffffff, &(0x7f00000017c0)="8abd4485b27ab9d4b71ca5be298adef57c3d62b14ff54d120df7b9c2ef6490457d854afa587cea9f41c4d2fc96f8c301771fb9bf73221c3b4c9a4d12411c2dd32ab502ddebe006ba9159a6d5724cf20ceee8027f188c8e0d20b1802eb6101d0c98c414fa1367af495f803147f400f1a42f3de994126b4fed29c2708bcee75a7ef652600628edbc0d9e81a8d3f847a8052c6bc9bb3007b936d0658c11791a04b582aff1a62666da3af799895615776afb487105f1811f454de6244a89b6fcd1b4a8407116554a8f94fc14f742f2e4292bb8706f43dad3e9d24c", 0xd9, 0x1, 0x0, 0x3, r4}, &(0x7f0000001940)={0x0, 0x0, 0x0, 0x2, 0x9, r5, &(0x7f0000001900)="e1d8be289632b446196d9294985b84ab0991f3654e8e5efe39132c1d1d54ae04", 0x20, 0x5, 0x0, 0x1, r7}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) getsockname$packet(r9, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r10, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9, 0x1, 'cake\x00'}, {0xc, 0x2, [@TCA_CAKE_DIFFSERV_MODE={0x8, 0x3, 0xc201}]}}]}, 0x3c}}, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev={0xfe, 0x80, [], 0x40}, 0x1, 0xc9b, 0x7fff, 0x900, 0x401, 0x2800200, r10}) 12:15:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 12:15:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x1000000000000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:42 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="dd8d0b13ec257732e0a931d2e12620cd9854595e438d3fdc9831bd1f2b77968af814d37e45e482da3afb95368564e9204ed269250dfdfb", 0x37, 0x894, &(0x7f00000000c0)={0xa, 0x4e20, 0xffff8000, @private1={0xfc, 0x1, [], 0x1}, 0x5}, 0x1c) r1 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) setsockopt$sock_timeval(r1, 0x1, 0x43, &(0x7f0000000040)={0x77359400}, 0x10) 12:15:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x5000000}, 0x0) 12:15:43 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000100)={0x0, 0x81, 0xb5, &(0x7f0000000040)="f373dc6056a684329ab5ec300596424252d46ce1723c43742e5f047ef56805d60dff460750ab49a2aa037967e6837af6a6fdc919ba493f59d83140417b29aa978c740b7261baf402a2908274131d591e95b89cea36fb263f0f3dc01c51d587b9f7bc7bc6655a7d8ba6514629bf1a1d906570bb17e0479c9f60eb36e7f6c6790342ce4ba3127f3d9f085b7023df76371c4b8c16f28a71c265a78aabb8a3719474968ac90c5e642a6112ff91dcff7b8d1158df9d1c81"}) 12:15:43 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x1100000000000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:43 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="dd8d0b13ec257732e0a931d2e12620cd9854595e438d3fdc9831bd1f2b77968af814d37e45e482da3afb95368564e9204ed269250dfdfb", 0x37, 0x894, &(0x7f00000000c0)={0xa, 0x4e20, 0xffff8000, @private1={0xfc, 0x1, [], 0x1}, 0x5}, 0x1c) r1 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) setsockopt$sock_timeval(r1, 0x1, 0x43, &(0x7f0000000040)={0x77359400}, 0x10) 12:15:43 executing program 3: syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x9, 0x800) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x101280, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000180)=@usbdevfs_driver={0x3, 0x7, &(0x7f00000000c0)="8f54774146cdcc63afeff01edcc41a1200f38b3c2b23efeadaca4a047f30010ceb8a69d6780a8d8b4d50189ff914e3f7db77cc70bfbbc23b3719c52a67bcc837e6b57a2063f1d4975c9561d2229d619de912398cae5f160c0b6d96403e79818205345cf4cc8dd3d8e215700a752236f4a6105b9957943ca05de4d884a5752b01666a832c35f34b546779ed1a01bf224949104b272b4d3e3404541210c34b905197192a2c5aae6cf3b454c4fb38eab4"}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r1, 0x541c, &(0x7f0000000000)) 12:15:43 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffd, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:43 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec", 0x4b, 0x1e, 0x0, 0x0) 12:15:43 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x1200000000000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:43 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x6000000}, 0x0) 12:15:43 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="dd8d0b13ec257732e0a931d2e12620cd9854595e438d3fdc9831bd1f2b77968af814d37e45e482da3afb95368564e9204ed269250dfdfb", 0x37, 0x894, &(0x7f00000000c0)={0xa, 0x4e20, 0xffff8000, @private1={0xfc, 0x1, [], 0x1}, 0x5}, 0x1c) r1 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) setsockopt$sock_timeval(r1, 0x1, 0x43, &(0x7f0000000040)={0x77359400}, 0x10) 12:15:43 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x1f00000000000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:43 executing program 3: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x2000, 0x0) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000080)=ANY=[@ANYBLOB="0200000000000000070000000060f304010000000300000000000000000000000a03000000ffffffff070000000000000000008600000000"]) ioctl$SNDCTL_SEQ_PANIC(r0, 0x5111) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) 12:15:43 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="dd8d0b13ec257732e0a931d2e12620cd9854595e438d3fdc9831bd1f2b77968af814d37e45e482da3afb95368564e9204ed269250dfdfb", 0x37, 0x894, &(0x7f00000000c0)={0xa, 0x4e20, 0xffff8000, @private1={0xfc, 0x1, [], 0x1}, 0x5}, 0x1c) r1 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) 12:15:43 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x8000000}, 0x0) 12:15:43 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x1000000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:43 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="dd8d0b13ec257732e0a931d2e12620cd9854595e438d3fdc9831bd1f2b77968af814d37e45e482da3afb95368564e9204ed269250dfdfb", 0x37, 0x894, &(0x7f00000000c0)={0xa, 0x4e20, 0xffff8000, @private1={0xfc, 0x1, [], 0x1}, 0x5}, 0x1c) socket$inet(0x2, 0x3, 0x7) 12:15:43 executing program 3: r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) getsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r1, 0x4b72, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="a417a23e0d0cde24712c2723d5f93b50ecf7817c153e1c515164f4f115caf1078947ff05b4a273dd83356c7b71018084091bd4144355f29d615221f751fd634567ded8c19de2fc143b3f5b06e343567680bdf0280f1dbbcf8bbc3857a0d5b164c30d5ed515414922e9312e32645b37865e48396a7390636937822bd73dc6168b2a7b009840313161e892369c9aa26d2b1fb0c67164ff41e07048132d56ad98e37767d2ec77601f098e6f47bebaad62c15463b2232f84c271cfdb4b0a1d291ae9406ac0749a77e812593caa44e38fbda1bbeb59f6cbbca385b888427681ac6094bf779206478c6df06c28d133951d413c6d5dd937e92a7bd7940825da703bb3f540bbdc2dcee2240624a61246276fdf36732c2818d231e1660f0aa1eefa33d76fd87b3c5fa5d6b51bde049d81b2fe90e2a68b6f9ac9bc9c8afb34685743520d156931b35376c4bba81debab8f00eefb7aedf2068dc03dbebf7af3501a1916397dc3e3e9db54c10dbe0fd8ad46ff3e2f148bbada1b927b422c16bbd7c236aa25f4757b4b18572dca544553fcb15b6f90059fce45411186ece4e724f234b62d60017f1a586f183c9dc131bb5194b07096a7d7b58abd364fa891dd9bec9abf3ec9e18010a235d6ab16013764efe6bd4cbf8531e1e344985df4aa86a503a299bb6a7fbdde2473361dcd15be116e3e673f2d1e0226ac9a499acf7d12b8fadb43d031080cb1589948757149e900daf03a4a5960122f2a8330ffda81ca8741454929d8627a737af9e42c026bbfacef2436a06036d04497e12fe29e9498c4813fc50ae62ebebf267bc30f300694dc4bb0d55ab12442fb3a2abaaa71edf747dd0b34539b9f929031139a9e6230eba117261355662575455fff1971125e2303c9c310f145b95c8bbf8fbd0558c661823749c3b62f2e0f4a908f6e49cb2ba7664a4dafbeb5f7e4778fe2240e9a2724432bd5770da4e0bf7043688dd30b297e6912f16961d55ab4368a9ffe807292c30cce50f6f6c52829ba7a15c63a144d84623c2cadd3d8e90131792475c9bfdd3dbc419e4406e6892f8350887378fd3e5ed23fc5ecff22a586d51324fa69a35dec5a77b589a592866cbed5881d0be74025340bf81a543399cbd3a3c5fb181234be74cb24d406ca934dd36945b587b2bbf3022271d097351fad634bde6e9cd20abd69f7175c0747538c97f610a53fe6c40eb9b7bbeb8850f2e01f29080ddfb09693098d047b14890fccbaa903457b05713a8d901159ebc53ea1b2a405d5ce8cf063c1857cc2a0d4ec44cc25894b5a9053facada7a9bd0cc9860c39e075329f1e91652f54a3cab38a3eaea054f20e2cd151b745d44ebb18a68c3a84b97299a921b012bb0122f997660148f511d1a41ac884d9ace04fb1beb3ba475d2d243908f59a08114979c3ed977b846738bab61aea7022ff1f7cba50866"}) ioctl$TIOCL_PASTESEL(r1, 0x541c, &(0x7f0000000000)) syz_open_dev$usbfs(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x8, 0x0) 12:15:43 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x2500000000000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:44 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x9000000}, 0x0) 12:15:44 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec", 0x4b, 0x1e, 0x0, 0x0) 12:15:44 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x80000000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:44 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="dd8d0b13ec257732e0a931d2e12620cd9854595e438d3fdc9831bd1f2b77968af814d37e45e482da3afb95368564e9204ed269250dfdfb", 0x37, 0x894, &(0x7f00000000c0)={0xa, 0x4e20, 0xffff8000, @private1={0xfc, 0x1, [], 0x1}, 0x5}, 0x1c) 12:15:44 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x5c00000000000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:44 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, &(0x7f00000000c0)={{0x0, 0x0, @identifier="ed80b3630cce941ec2e4e0011f81de8b"}}) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qrtr-tun\x00', 0x10000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0)='nl80211\x00') r6 = socket$tipc(0x1e, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)={0x24, r5, 0x11, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r7}, @NL80211_ATTR_TXQ_QUANTUM={0x8}]}, 0x24}}, 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r9) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@private1={0xfc, 0x1, [], 0x1}, @in=@local, 0x4e24, 0x1, 0x4e20, 0x0, 0xa, 0x0, 0x20, 0x16, 0x0, r9}, {0x71, 0x9, 0x3, 0xe678, 0x3ff, 0x82, 0xe7de, 0x8001}, {0x4, 0x3, 0x6, 0x8}, 0x8, 0x6e6bb2, 0x2, 0x1, 0x1, 0x2}, {{@in=@broadcast, 0x4d3, 0x32}, 0xa, @in6=@ipv4={[], [], @empty}, 0x3506, 0x0, 0xb3b858b65773a466, 0x7, 0x2, 0x0, 0x3f}}, 0xe8) sendmsg$NL80211_CMD_SET_KEY(r3, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r5, 0x2, 0x70bd29, 0x25dfdbfe, {}, [@NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_TYPE={0x8}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "ed10acf3310e4f41aab12f4e10"}]}, 0x34}, 0x1, 0x0, 0x0, 0xc020}, 0x800) 12:15:44 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) r1 = socket$inet6(0xa, 0x800, 0x6) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x4e23, 0x4, @mcast2, 0x401}, {0xa, 0x4e22, 0x5, @ipv4={[], [], @private=0xa010102}, 0x80000001}, 0x8001, [0x0, 0x8000, 0x8, 0x4, 0x1, 0x200, 0x5, 0x6ec1]}, 0x5c) 12:15:44 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 12:15:44 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0xa04d7f0000000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:44 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xedc000000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:44 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0xa000000}, 0x0) 12:15:44 executing program 4: ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) 12:15:44 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0xebffffff00000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:45 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66", 0x4c, 0x1e, 0x0, 0x0) 12:15:45 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0xeffdffffffffffff, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:45 executing program 4: ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) 12:15:45 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:45 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000040)=0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 12:15:45 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0xb000000}, 0x0) 12:15:45 executing program 4: ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) 12:15:45 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0xfeffffff00000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:45 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0xffffffff00000000, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:45 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x2000008d, &(0x7f0000000440)="a417a23e0d0cde24712c2723d5f93b50ecf7817c153e1c515164f4f115caf1078947ff05b4a273dd83356c7b71018084091bd4144355f29d615221f751fd634567ded8c19de2fc143b3f5b06e343567680bdf0280f1dbbcf8bbc3857a0d5b164c30d5ed515414922e9312e32645b37865e48396a7390636937822bd73dc6168b2a7b009840313161e892369c9aa26d2b1fb0c67164ff41e07048132d56ad98e37767d2ec77601f098e6f47bebaad62c15463b2232f84c271cfdb4b0a1d291ae9406ac0749a77e812593caa44e38fbda1bbeb59f6cbbca385b888427681ac6094bf779206478c6df06c28d133951d413c6d5dd937e92a7bd7940825da703bb3f540bbdc2dcee2240624a61246276fdf36732c2818d231e1660f0aa1eefa33d76fd87b3c5fa5d6b51bde049d81b2fe90e2a68b6f9ac9bc9c8afb34685743520d156931b35376c4bba81debab8f00eefb7aedf2068dc03dbebf7af3501a1916397dc3e3e9db54c10dbe0fd8ad46ff3e2f148bbada1b927b422c16bbd7c236aa25f4757b4b18572dca544553fcb15b6f90059fce45411186ece4e724f234b62d60017f1a586f183c9dc131bb5194b07096a7d7b58abd364fa891dd9bec9abf3ec9e18010a235d6ab16013764efe6bd4cbf8531e1e344985df4aa86a503a299bb6a7fbdde2473361dcd15be116e3e673f2d1e0226ac9a499acf7d12b8fadb43d031080cb1589948757149e900daf03a4a5960122f2a8330ffda81ca8741454929d8627a737af9e42c026bbfacef2436a06036d04497e12fe29e9498c4813fc50ae62ebebf267bc30f300694dc4bb0d55ab12442fb3a2abaaa71edf747dd0b34539b9f929031139a9e6230eba117261355662575455fff1971125e2303c9c310f145b95c8bbf8fbd0558c661823749c3b62f2e0f4a908f6e49cb2ba7664a4dafbeb5f7e4778fe2240e9a2724432bd5770da4e0bf7043688dd30b297e6912f16961d55ab4368a9ffe807292c30cce50f6f6c52829ba7a15c63a144d84623c2cadd3d8e90131792475c9bfdd3dbc419e4406e6892f8350887378fd3e5ed23fc5ecff22a586d51324fa69a35dec5a77b589a592866cbed5881d0be74025340bf81a543399cbd3a3c5fb181234be74cb24d406ca934dd36945b587b2bbf3022271d097351fad634bde6e9cd20abd69f7175c0747538c97f610a53fe6c40eb9b7bbeb8850f2e01f29080ddfb09693098d047b14890fccbaa903457b05713a8d901159ebc53ea1b2a405d5ce8cf063c1857cc2a0d4ec44cc25894b5a9053facada7a9bd0cc9860c39e075329f1e91652f54a3cab38a3eaea054f20e2cd151b745d44ebb18a68c3a84b97299a921b012bb0122f997660148f511d1a41ac884d9ace04fb1beb3ba475d2d243908f59a08114979c3ed977b846738bab61aea7022ff1f7cba50866"}) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000040)) r1 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) r2 = fcntl$dupfd(r1, 0x406, r0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x105002, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r3, 0xc0182101, &(0x7f0000000140)={r4, 0xfffffffffffffff9, 0x8}) ioctl$mixer_OSS_GETVERSION(r2, 0x80044d76, &(0x7f0000000000)) 12:15:45 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0xc000000}, 0x0) 12:15:45 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 12:15:46 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66", 0x4c, 0x1e, 0x0, 0x0) 12:15:46 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x400100, 0x0) 12:15:46 executing program 4: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) 12:15:46 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0xfffffffffffffdef, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:46 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x2000000000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:46 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0xf000000}, 0x0) 12:15:46 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0xffffffffffffffff, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:46 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000002, &(0x7f0000000400)) 12:15:46 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000003, &(0x7f0000000400)) 12:15:46 executing program 4: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) 12:15:46 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f00000005c0)='./file0\x00', 0x220c2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r5, 0x4b72, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="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"}) ioctl$KDGKBLED(r5, 0x4b64, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f0000000640)={0x14, 0x88, 0xfa00, {r6, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0x90) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r6}}, 0x18) 12:15:46 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x10000000}, 0x0) 12:15:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000005, &(0x7f0000000400)) 12:15:47 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:47 executing program 4: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) 12:15:47 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r2, 0xc0505510, &(0x7f00000000c0)={0x7fff, 0x2, 0x5, 0x400, &(0x7f0000000040)=[{}, {}]}) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 12:15:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x11000000}, 0x0) 12:15:47 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66", 0x4c, 0x1e, 0x0, 0x0) 12:15:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000006, &(0x7f0000000400)) 12:15:47 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) r1 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) accept4(r1, &(0x7f0000000040)=@x25, &(0x7f0000000100)=0x80, 0x0) 12:15:47 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, 0x0) 12:15:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000300, &(0x7f0000000400)) 12:15:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x12000000}, 0x0) 12:15:47 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x110010000000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:47 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCCONS(r0, 0x541d) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 12:15:47 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, 0x0) 12:15:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:47 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, 0x0) 12:15:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)={[], [], 0x2}) 12:15:48 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x4d, 0x0, 0x0, 0x0) 12:15:48 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r1, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000300)={&(0x7f00000000c0)={0x240, r2, 0x300, 0x70bd2d, 0x80000000, {}, [@TIPC_NLA_PUBL={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x3}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7f4}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x76ef}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xd7b}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x968}]}, @TIPC_NLA_NET={0x60, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4e0b}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7ff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4737}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x101}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3f}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x80}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}]}, @TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffffff01}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}]}, @TIPC_NLA_BEARER={0x144, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x52}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @empty}}, {0x14, 0x2, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x36}}}}}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @remote}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x6d, @local, 0xff}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'macvtap0\x00'}}]}, @TIPC_NLA_LINK={0x20, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf3ce}]}]}]}, 0x240}, 0x1, 0x0, 0x0, 0x4000005}, 0x4) ioctl$USBDEVFS_GET_SPEED(r1, 0x551f) r3 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$TIOCL_PASTESEL(r3, 0x541c, &(0x7f0000000000)) 12:15:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x13000000}, 0x0) 12:15:48 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x3000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:48 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:48 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)={[], [], 0x3}) 12:15:48 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)={[], [], 0x4}) 12:15:48 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x1100100, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:48 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x11) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$NS_GET_USERNS(r2, 0xb701, 0x0) 12:15:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x3f000000}, 0x0) 12:15:48 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:48 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)={[], [], 0x5}) 12:15:49 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x4d, 0x0, 0x0, 0x0) 12:15:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x40000000}, 0x0) 12:15:49 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)={[], [], 0x6}) 12:15:49 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xedc0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:49 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r1 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) r2 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$KVM_GET_SREGS(r7, 0x8138ae83, &(0x7f00000001c0)) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000040)) socket$inet6_udp(0xa, 0x2, 0x0) 12:15:49 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:49 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)={[], [], 0x7}) 12:15:49 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)={[], [], 0x8}) 12:15:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x60000000}, 0x0) 12:15:49 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockname$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0)='nl80211\x00') r5 = socket$tipc(0x1e, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)={0x24, r4, 0x11, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r6}, @NL80211_ATTR_TXQ_QUANTUM={0x8}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r4, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@NL80211_ATTR_IFNAME={0x14, 0x4, 'syz_tun\x00'}, @NL80211_ATTR_IFTYPE={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000805}, 0x80c4) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000040)) 12:15:49 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:49 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x4800, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:49 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x4d, 0x0, 0x0, 0x0) 12:15:49 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)={[], [], 0x9}) 12:15:49 executing program 3: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000000c0)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r1, 0x541c, &(0x7f0000000000)) 12:15:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x65580000}, 0x0) 12:15:49 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:49 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:50 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)={[], [], 0xa}) 12:15:50 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)={[], [], 0xb}) 12:15:50 executing program 4: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000000c0)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r1, 0x541c, &(0x7f0000000000)) 12:15:50 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)={[], [], 0xc}) 12:15:50 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="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"}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r1, 0x4b72, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="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"}) ioctl$TIOCL_PASTESEL(r1, 0x541c, &(0x7f0000000000)) 12:15:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x81000000}, 0x0) 12:15:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x88470000}, 0x0) 12:15:50 executing program 4: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000000c0)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r1, 0x541c, &(0x7f0000000000)) 12:15:50 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:50 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)={[], [], 0xd}) 12:15:50 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x2) r2 = syz_open_dev$ptys(0xc, 0x3, 0x0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x2) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ioctl$TIOCSBRK(r0, 0x5427) ptrace$cont(0x7, r3, 0x0, 0x0) ioctl$TIOCSPGRP(r2, 0x5410, &(0x7f0000000000)=r3) ioctl$KDFONTOP_SET(r1, 0x4b72, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="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"}) ioctl$TIOCL_PASTESEL(r1, 0x541c, &(0x7f0000000040)) 12:15:50 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x2500, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:50 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket(0x10, 0x3, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, &(0x7f0000000180)={0x9, 0x0, 0x1f, 0x1, 'syz1\x00', 0x4}) sendmmsg$alg(r1, &(0x7f0000000140), 0x4924b68, 0x0) ioctl$sock_ax25_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x5, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default]}) r2 = msgget(0x1, 0x484) msgrcv(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x10, 0x2, 0x1000) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="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"}) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = socket$alg(0x26, 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) bind(r3, &(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, r4, {0x2, 0x4e22, @rand_addr=0x64010101}, 0x1, 0x1, 0x2, 0x4}}, 0x80) 12:15:50 executing program 4: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000000c0)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r1, 0x541c, &(0x7f0000000000)) 12:15:50 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)={[], [], 0xe}) 12:15:51 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x88480000}, 0x0) 12:15:51 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)={[], [], 0x10}) 12:15:51 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:51 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xd00, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:51 executing program 4: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000000c0)) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) 12:15:51 executing program 4: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000000c0)) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) 12:15:51 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x900000000000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:51 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)={[], [], 0x11}) 12:15:51 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xc00, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:51 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x88a8ffff}, 0x0) 12:15:51 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="a417a23e0d0cde24712c2723d5f93b50ecf7817c153e1c515164f4f115caf1078947ff05b4a273dd83356c7b71018084091bd4144355f29d615221f751fd634567ded8c19de2fc143b3f5b06e343567680bdf0280f1dbbcf8bbc3857a0d5b164c30d5ed515414922e9312e32645b37865e48396a7390636937822bd73dc6168b2a7b009840313161e892369c9aa26d2b1fb0c67164ff41e07048132d56ad98e37767d2ec77601f098e6f47bebaad62c15463b2232f84c271cfdb4b0a1d291ae9406ac0749a77e812593caa44e38fbda1bbeb59f6cbbca385b888427681ac6094bf779206478c6df06c28d133951d413c6d5dd937e92a7bd7940825da703bb3f540bbdc2dcee2240624a61246276fdf36732c2818d231e1660f0aa1eefa33d76fd87b3c5fa5d6b51bde049d81b2fe90e2a68b6f9ac9bc9c8afb34685743520d156931b35376c4bba81debab8f00eefb7aedf2068dc03dbebf7af3501a1916397dc3e3e9db54c10dbe0fd8ad46ff3e2f148bbada1b927b422c16bbd7c236aa25f4757b4b18572dca544553fcb15b6f90059fce45411186ece4e724f234b62d60017f1a586f183c9dc131bb5194b07096a7d7b58abd364fa891dd9bec9abf3ec9e18010a235d6ab16013764efe6bd4cbf8531e1e344985df4aa86a503a299bb6a7fbdde2473361dcd15be116e3e673f2d1e0226ac9a499acf7d12b8fadb43d031080cb1589948757149e900daf03a4a5960122f2a8330ffda81ca8741454929d8627a737af9e42c026bbfacef2436a06036d04497e12fe29e9498c4813fc50ae62ebebf267bc30f300694dc4bb0d55ab12442fb3a2abaaa71edf747dd0b34539b9f929031139a9e6230eba117261355662575455fff1971125e2303c9c310f145b95c8bbf8fbd0558c661823749c3b62f2e0f4a908f6e49cb2ba7664a4dafbeb5f7e4778fe2240e9a2724432bd5770da4e0bf7043688dd30b297e6912f16961d55ab4368a9ffe807292c30cce50f6f6c52829ba7a15c63a144d84623c2cadd3d8e90131792475c9bfdd3dbc419e4406e6892f8350887378fd3e5ed23fc5ecff22a586d51324fa69a35dec5a77b589a592866cbed5881d0be74025340bf81a543399cbd3a3c5fb181234be74cb24d406ca934dd36945b587b2bbf3022271d097351fad634bde6e9cd20abd69f7175c0747538c97f610a53fe6c40eb9b7bbeb8850f2e01f29080ddfb09693098d047b14890fccbaa903457b05713a8d901159ebc53ea1b2a405d5ce8cf063c1857cc2a0d4ec44cc25894b5a9053facada7a9bd0cc9860c39e075329f1e91652f54a3cab38a3eaea054f20e2cd151b745d44ebb18a68c3a84b97299a921b012bb0122f997660148f511d1a41ac884d9ace04fb1beb3ba475d2d243908f59a08114979c3ed977b846738bab61aea7022ff1f7cba50866"}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r1, 0x4b72, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="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"}) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r2, 0x4b72, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="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"}) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r3, 0x4b72, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="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"}) ioctl$TIOCL_PASTESEL(r3, 0x541c, &(0x7f0000000040)) 12:15:51 executing program 4: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000000c0)) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) 12:15:51 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)={[], [], 0x12}) 12:15:51 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x9effffff}, 0x0) 12:15:51 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r1, 0x330f, 0x2) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r2, 0x541c, &(0x7f0000000000)) r3 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x400000, 0x0) r4 = shmget$private(0x0, 0x1000, 0x2, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r4, 0xd, &(0x7f00000001c0)=""/253) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r5, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x4000004) socket$isdn(0x22, 0x3, 0x25) 12:15:51 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)={[], [], 0x25}) 12:15:51 executing program 4: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 12:15:51 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r4, 0x4b72, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="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"}) ioctl$VT_GETMODE(r4, 0x5601, &(0x7f0000000080)) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)=""/214, 0xd6}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000840)=""/231, 0xe7}], 0x3) ioctl$KVM_IRQ_LINE_STATUS(r3, 0xc008ae67, &(0x7f0000000040)={0x2, 0x3f}) 12:15:51 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0xcd0f0000}, 0x0) 12:15:51 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xa00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:51 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)={[], [], 0x5c}) 12:15:51 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x12000, 0x0) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000000c0)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x130, r2, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0xd8, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x47b60a67}]}, {0x4c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x153f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x24c1b72f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1c93}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdcda}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfee}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb4fd}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1e68}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x70551c90}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf264}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x60d622d7}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x431e4912}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x28a8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x793a4b3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4de1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x16}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xed16}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6b73}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x493}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x96ec}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6a7f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfbe0}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x36014ce2}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x394c3a31}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5, 0x3, 0x6}, {0x5}, {0x5, 0x3, 0x7}, {0x5}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x1}, {0x5}]}]}, 0x130}, 0x1, 0x0, 0x0, 0x800}, 0x20000005) r3 = creat(&(0x7f0000000300)='./file0\x00', 0xc3) ioctl$KDGKBENT(r3, 0x4b46, &(0x7f0000000340)={0x4, 0x4, 0x5}) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f00000002c0)={0x2, 0x6}) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, '.'}, 0xc) 12:15:51 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 12:15:51 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r3, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0205648, &(0x7f0000000200)={0x9b0000, 0x1f, 0x2, r3, 0x0, &(0x7f00000001c0)={0x9b090f, 0xe3, [], @value64=0x7ba5}}) ioctl$vim2m_VIDIOC_STREAMON(r4, 0x40045612, &(0x7f0000000240)=0x384a8fc1ace55a78) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsu\x00', 0x242800, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r5, 0x84, 0x4, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f0000000280)={0x3, 0x4, 0x1, 0xa5d3, 0x3, 0x8}) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r6, 0xc06c4124, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 12:15:51 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x7a, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:51 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)={[], [], 0xff}) 12:15:51 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 12:15:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0xe8030000}, 0x0) 12:15:52 executing program 4: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) 12:15:52 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)=ANY=[@ANYBLOB]) 12:15:52 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x25, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:52 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xb00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:52 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDCTL_SEQ_TESTMIDI(r1, 0x40045108, &(0x7f00000000c0)=0x7) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = socket$inet(0x2, 0x3, 0x7) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x1, 0x8, 0x0, 'queue1\x00', 0x6}) setsockopt$ARPT_SO_SET_REPLACE(r3, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) ioctl$sock_ifreq(r3, 0x8933, &(0x7f0000000080)={'sit0\x00', @ifru_data=&(0x7f0000000040)="c91d3efd02faddb57df418895d31204e1012f95b2d5feccd52e6f65268659954"}) ioctl$TIOCL_PASTESEL(r2, 0x541c, &(0x7f0000000000)) 12:15:52 executing program 4: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) 12:15:52 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000080)) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x1a1803, 0x0) ioctl$SIOCAX25DELFWD(r0, 0x89eb, &(0x7f0000000040)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}}) 12:15:52 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x11, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:52 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) r1 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r1, &(0x7f0000000140), 0x4924b68, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000000)={r4}, &(0x7f0000000040)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000040)={r4, 0x7ff, 0x2}, 0x8) 12:15:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0xefffffff}, 0x0) 12:15:52 executing program 4: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) 12:15:52 executing program 1: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x428180, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fsync(r0) r2 = dup(r1) r3 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r3, &(0x7f0000000140), 0x4924b68, 0x0) setsockopt$inet6_int(r3, 0x29, 0x16, &(0x7f0000000000)=0x6, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000000c0)={0xffffffffffffffff, r2}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r5, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000001c0)=[@in6={0xa, 0x4e22, 0x8008, @mcast1, 0x1ff}, @in={0x2, 0x4e23, @private=0xa010100}, @in6={0xa, 0x4e22, 0xfffffffb, @mcast1, 0x4}, @in={0x2, 0x4e21, @multicast2}, @in={0x2, 0x4e21, @empty}, @in={0x2, 0x4e21, @multicast1}, @in={0x2, 0x4e24, @private=0xa010100}], 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r7, 0xc0305616, &(0x7f0000000040)={0x0, {0x7ff, 0x80}}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r8) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x14000, &(0x7f0000000280)=ANY=[@ANYBLOB="617564696b2c7375626a5f757365723dd32c6673636f6e746570743d73797374656d5f752c737562625f757365723d7375626a5f757365722c7063723d30303030303030303030303030303030303035342c00fa0a4dfabd72966d46c81ef6828ba7203f4275549f96852563f83d1be9a25629521eb1b1279d35769e93d510d3b88891b94190f033618f6fbb68ec5d88a4b8b879926534f64c73"]) 12:15:52 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, 0x0) 12:15:52 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r1, 0x4b72, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="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"}) ioctl$KDGETLED(r1, 0x4b31, &(0x7f0000000040)) 12:15:52 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xc00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) 12:15:52 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xe, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:52 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, 0x0) 12:15:52 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0)='nl80211\x00') r3 = socket$tipc(0x1e, 0x5, 0x0) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x2, 0x0) r5 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r5, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f00000001c0)='wg2\x00') ioctl$SNAPSHOT_PLATFORM_SUPPORT(r4, 0x330f, 0x7) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)={0x24, r2, 0x11, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r6}, @NL80211_ATTR_TXQ_QUANTUM={0x8}]}, 0x24}}, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendmsg$NL80211_CMD_SET_BSS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x48, r2, 0x10, 0x70bd29, 0x25dfdbfd, {}, [@NL80211_ATTR_BSS_SHORT_SLOT_TIME={0x5, 0x1e, 0xce}, @NL80211_ATTR_P2P_OPPPS={0x5, 0xa3, 0x1}, @NL80211_ATTR_BSS_SHORT_PREAMBLE={0x5, 0x1d, 0xaf}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_BSS_SHORT_PREAMBLE={0x5, 0x1d, 0x5d}]}, 0x48}, 0x1, 0x0, 0x0, 0x4005}, 0x4000881) 12:15:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0xf1ffffff}, 0x0) 12:15:53 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, 0x0) 12:15:53 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xe, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:53 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) munlockall() ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 12:15:53 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000000)=ANY=[@ANYBLOB="000d2945ad200000d343dc1d7c"]) 12:15:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0xfcffffff}, 0x0) 12:15:53 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xd, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:53 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:53 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xd00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:53 executing program 3: r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) fcntl$setsig(r0, 0xa, 0x39) r1 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$TIOCL_PASTESEL(r1, 0x541c, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_RX(r3, 0x6, 0x2, &(0x7f0000000040)=@gcm_256={{0x304}, "5a63ced62afe4732", "f890de78a5da83e6aaaed9569aa8496e8706a04917c38994f609cc1d3afbe80d", "efc92dd5", "2250209a84f3d147"}, 0x38) 12:15:53 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x3) clone(0x6000, &(0x7f0000000040)="459cde990d89e9f1895b170c4edec5baa4544881bb642d8a5014442b87b331633fe83e1609c332fc7c652dc513547c7b2c22c4a067c4771493338bf415fb643fcd5b418692b75303137c9b600ff479409c5996626e917027aa468f0630252e4ccf0b3d0d8cb00e2eef1c4144bb8469fd3e3592cdbb4f925934ab3276f934b9f016e55bcfb5759e3adcdbc84ed3cb0ce07f368e60276af6cc5109bbc01b7d35d496a089e8b1a2b20d110da0f029e6fd877869b4970ca27b8ffc5b37699dd7726e376568b8", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="0d8720731d80710b4adf0b116d810d7673f9aef48c4426a0711982f258f70052988302d6310628bbbcd9c3b3af7f2aa6e9241f0484c7f34510df7ffd530176fb3781cc1a") ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) r1 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r1, &(0x7f0000000140), 0x4924b68, 0x0) ioctl$SIOCAX25GETINFO(r1, 0x89ed, &(0x7f0000000240)) 12:15:53 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SIOCAX25DELUID(r3, 0x89e2, &(0x7f0000000100)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0xee00}) write$smackfs_ipv6host(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0xb4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$LOOP_GET_STATUS(r5, 0x4c03, &(0x7f00000001c0)) 12:15:53 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x7, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0xffffa888}, 0x0) 12:15:53 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:53 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xe00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:53 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x0, 0x80) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000000)={r3}, &(0x7f0000000040)=0x10) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={r3}, &(0x7f0000000040)=0x8) 12:15:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 12:15:53 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:53 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket(0x10, 0x3, 0x7) sendmmsg$alg(r1, &(0x7f0000000140), 0x4924b68, 0x0) ioctl(r1, 0xea, &(0x7f0000000180)="4c2e4f677b72a0c1a8bab74dd8b1940bcfc0de9e60") getsockname$netlink(r1, &(0x7f0000000100), &(0x7f0000000140)=0xc) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) write$midi(0xffffffffffffffff, &(0x7f0000000040)="cc323637eff4d0c0a25081cd7b0d7e255555818901d368cf83e09e2f37f0bdd862b7c288f83436099206e0f667e54021c1795c24d67122be5158646f10f281a15fe90199a5fdf8a04499efc621142dec59167338a9c26679f39c1f7facdab406c306442949015cac7d2974f1b6b854c34c1f14156c2074f5598a394a10782dbb88e1b3c49f2ed4f5de6a52407436c47d20089f641046248216819e53", 0x9c) 12:15:53 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:53 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) r3 = dup3(0xffffffffffffffff, r2, 0x80000) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0xd000, &(0x7f0000000000), 0x4, r3}) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) shmget$private(0x0, 0x4000, 0x80, &(0x7f0000ffb000/0x4000)=nil) 12:15:54 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) futex(&(0x7f0000000040)=0x2, 0x8d, 0x2, &(0x7f0000000080)={0x0, 0x3938700}, &(0x7f00000000c0)=0x1, 0x2) r1 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) close(r1) 12:15:54 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)=ANY=[@ANYBLOB=' ']) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() write$FUSE_LK(r1, &(0x7f0000000000)={0x28, 0xfffffffffffffff5, 0x3, {{0x1, 0x4, 0x0, r2}}}, 0x28) 12:15:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) 12:15:54 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r1, 0x4b72, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="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"}) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000040)={0xb3, "bf06aa607fa7fc6693852250a58fda449c10f2a25bcf5740871d70aaf074112a5cf86f4a94ecdf411baf85a0b0e75ff7d1990189711f1dbfbed3b76673fd589c27890dafc9f5b8908ad5bbc30309112cc76b1b16f124490edbac9848aeb4678ba00ae3ca314a1e5aab9ee20ec6a8afb9f650cf5f8b41d47aa7fc9d1b30ec16f246d48edcacaa2989b97ac7f21349a5b3761a131e0fda0df93aa620efdb86025a13dbc553a275a1406d4cb916a6a086f645a4a8ebf66ee0888f97d272cc53c537ae59b850840e9b49253ae8f7c43aecfac814d64c887eb20803cefd7bcef7014aeff54afec3eb8f6d5c83a44347e6d938ea5a602f685b1fdd15ad94d04cff38064857a7c19e5441e69b4e82dd6031331e91ab92e047c1685031a708e2e1d34188b6fc7fe050b4360e0360120f2ca39f35f72ad264bba3818794002620f7555f78ec49537152f822ecb7d2d4bafa758537b1396ecd96fdc4401a3595c6356dd06c6af3f5b7931286497f344fa24a4f41b8c495e1f538de5071d2e83ca89e2e316fabd15d23a4b15d7275fcb9b1f5228c89ed2fcef8c43c0e1220e14ed4ea05208bdbb655e022943b2991682845705a18ea21513982522ffb93188f03588611ac088579a38db94f6b8254e5235114e4b7352a51ee1112fd1a24926b2a1b11f55c74620c46476ac31df4bea5aea38f48a538db306c2cec43167ae7469a58f4a28bad"}) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 12:15:54 executing program 5 (fault-call:1 fault-nth:0): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 12:15:54 executing program 1: r0 = semget(0x0, 0x2, 0x200) semctl$IPC_RMID(r0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:15:54 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="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"}) ioctl$TIOCSIG(r0, 0x40045436, 0xb) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)=ANY=[@ANYBLOB="10"]) 12:15:54 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x1100000000000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0xffffffef}, 0x0) [ 1175.585980][ T1735] FAULT_INJECTION: forcing a failure. [ 1175.585980][ T1735] name failslab, interval 1, probability 0, space 0, times 0 [ 1175.644547][ T1735] CPU: 1 PID: 1735 Comm: syz-executor.5 Not tainted 5.8.0-rc7-syzkaller #0 [ 1175.653176][ T1735] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1175.663250][ T1735] Call Trace: [ 1175.666611][ T1735] dump_stack+0x1f0/0x31e [ 1175.670970][ T1735] should_fail+0x38a/0x4e0 [ 1175.675548][ T1735] ? tomoyo_realpath_from_path+0xd8/0x630 [ 1175.681288][ T1735] should_failslab+0x5/0x20 [ 1175.685868][ T1735] __kmalloc+0x74/0x330 [ 1175.690229][ T1735] ? tomoyo_realpath_from_path+0xcb/0x630 [ 1175.695980][ T1735] tomoyo_realpath_from_path+0xd8/0x630 [ 1175.701644][ T1735] tomoyo_path_number_perm+0x18f/0x690 [ 1175.707162][ T1735] security_file_ioctl+0x55/0xb0 [ 1175.712118][ T1735] __se_sys_ioctl+0x48/0x160 [ 1175.716720][ T1735] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1175.722796][ T1735] do_syscall_64+0x73/0xe0 [ 1175.727221][ T1735] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1175.733096][ T1735] RIP: 0033:0x45c429 [ 1175.737005][ T1735] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1175.756635][ T1735] RSP: 002b:00007fd892ca6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1175.765074][ T1735] RAX: ffffffffffffffda RBX: 00000000000184c0 RCX: 000000000045c429 [ 1175.773063][ T1735] RDX: 0000000020000000 RSI: 000000000000541c RDI: 0000000000000003 [ 1175.781051][ T1735] RBP: 00007fd892ca6ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1175.789036][ T1735] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1175.797039][ T1735] R13: 00007ffcfb2cb98f R14: 00007fd892ca79c0 R15: 000000000078bf0c [ 1175.833882][ T1735] ERROR: Out of memory at tomoyo_realpath_from_path. 12:15:54 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x1100000000000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:54 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) ioctl$TIOCL_UNBLANKSCREEN(r0, 0x541c, &(0x7f00000000c0)) ioctl$VIDIOC_G_TUNER(r0, 0xc054561d, &(0x7f0000000040)={0x10000, "6630f0b7ff68fc6a7d7c7eb73339081de92d10afcbdcd999a8927d93f3e00df3", 0x3, 0x20, 0x8001, 0x7, 0x2, 0x0, 0x4, 0x80000001}) 12:15:54 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)=ANY=[@ANYBLOB='\b']) 12:15:54 executing program 5 (fault-call:1 fault-nth:1): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 12:15:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) 12:15:54 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x1200000000000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) [ 1176.087410][ T1764] FAULT_INJECTION: forcing a failure. [ 1176.087410][ T1764] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1176.087426][ T1764] CPU: 1 PID: 1764 Comm: syz-executor.5 Not tainted 5.8.0-rc7-syzkaller #0 [ 1176.087432][ T1764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1176.087437][ T1764] Call Trace: [ 1176.087453][ T1764] dump_stack+0x1f0/0x31e [ 1176.087469][ T1764] should_fail+0x38a/0x4e0 [ 1176.087486][ T1764] prepare_alloc_pages+0x28c/0x4a0 12:15:54 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x100, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000040), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r3, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000080)={r3}) [ 1176.087503][ T1764] __alloc_pages_nodemask+0xbc/0x5e0 [ 1176.087517][ T1764] ? __lock_acquire+0x116c/0x2c30 [ 1176.087536][ T1764] kmem_getpages+0x49/0x900 [ 1176.087552][ T1764] cache_grow_begin+0x7b/0x2e0 [ 1176.087567][ T1764] cache_alloc_refill+0x359/0x3f0 [ 1176.087582][ T1764] ? check_preemption_disabled+0x51/0x140 [ 1176.087595][ T1764] __kmalloc+0x30c/0x330 [ 1176.087608][ T1764] ? tomoyo_realpath_from_path+0xd8/0x630 [ 1176.087622][ T1764] tomoyo_realpath_from_path+0xd8/0x630 [ 1176.087643][ T1764] tomoyo_path_number_perm+0x18f/0x690 [ 1176.087686][ T1764] security_file_ioctl+0x55/0xb0 [ 1176.087700][ T1764] __se_sys_ioctl+0x48/0x160 [ 1176.087712][ T1764] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1176.087723][ T1764] do_syscall_64+0x73/0xe0 [ 1176.087734][ T1764] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1176.087744][ T1764] RIP: 0033:0x45c429 12:15:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0xfffffff1}, 0x0) [ 1176.087754][ T1764] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1176.087761][ T1764] RSP: 002b:00007fd892ca6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1176.087771][ T1764] RAX: ffffffffffffffda RBX: 00000000000184c0 RCX: 000000000045c429 [ 1176.087778][ T1764] RDX: 0000000020000000 RSI: 000000000000541c RDI: 0000000000000003 [ 1176.087784][ T1764] RBP: 00007fd892ca6ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1176.087790][ T1764] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1176.087797][ T1764] R13: 00007ffcfb2cb98f R14: 00007fd892ca79c0 R15: 000000000078bf0c 12:15:55 executing program 4 (fault-call:4 fault-nth:0): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:55 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x2000000000000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:55 executing program 5 (fault-call:1 fault-nth:2): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 12:15:55 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_GET_NESTED_STATE(r1, 0xc080aebe, &(0x7f00000000c0)={{0x0, 0x0, 0x80}}) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x10) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000080)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, 0x6) 12:15:55 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000002740)=ANY=[@ANYBLOB="a4576aed686d3f2b6e0ee37b8870faf077960712d9a9670fe9b60ca510d3c4b1be7d9f28dc8d6e9dcb8d559f1e382e15a3d3cefd05be68c997da028b4a5fb8c3493962455f0c06fa5754887b6566bdae7ec781a04ffe2958ba7871017741360436f234c12f19796ee694dabb2d76122bf7c9f0636bf9c6c9af23e2306d185223759232ba564fbcfbb02d10f13dc5e1b4b7c7af7c1c21a8eb6ecf486837c8930727b088b174b3411e6d602c9cf5fd4548625dec1e416d6553c0ef3b94996fce827309e23a64052995b242d80ac4bafcab87fa567e8b6d059ec48ac37a38730994a02ef956dbaf928c4aeb7bcd29eac500"/249]) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x800) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x80200, 0x0) ioctl$MON_IOCH_MFLUSH(r2, 0x9208, 0x5) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000340)=[{0x200, 0x0, 0xda, 0xe7}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setuid(0x0) ioprio_get$uid(0x3, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$EVIOCSKEYCODE_V2(r4, 0x40284504, &(0x7f0000002680)={0x0, 0xc, 0x5, 0xfff, "0d3003538f15341d6e0bfaf9257f6178c1649f7477be2bf369ea9b1aa20d4527"}) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0x1801, 0x4) sendmmsg(r1, &(0x7f0000001340)=[{{0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000d00)="f685a288c84ec47e44864a1a41cd668a587f75e8659cb07e2f26d6c9dd44104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283cc958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc349dabf717313af026ca16b9669abd0f8323058da774c0f518d77ca7a8672ce9cf82646c80b7f384da6a655db727c1c8569e4af9", 0x9e}, {&(0x7f0000000a00)="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", 0x12f}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8", 0x2b}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000000140)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d461fd8e6", 0x67}, {&(0x7f0000000200)="fb20cc7d2867ef261171295e86010817e06195393cdaee9cdf4049322041d0320b46e91c5fdec28ce589dfbf999f06dda6c4632a4aa933dadf1546936e4147be3a5cc599737345540124fad50a16092bb263bb7bd1342e771982917c84400b892aece1184bc671bf8825f943e307d1b2015b34164dd471f6ee65294e0605ca7d2811aae64b4a6f90a2f7d89a234fb68a61df7ea506d4a2596b8908fd06d7236d10fe34b69ea446ba69f91414224b75800a", 0xb1}, {&(0x7f0000000640)="3d11fd559740035eea1d4d72cbc38274a440c2b9770d9f1891b2d773102c30e18f1b583e14344971fa945a3e4effd4acaa7f1d07ba5caf970faee2d70eca48bd8c8a06a2156247bceeee16dfadac66062af9713e216cf0ca5ec0a34b3942fcda5ec03e3e68ae09384dc7834260211ec14ce346e78ceacbb4b248fecc979c63fd5209e052411ef0e3ad0d3648e585e4155926a1b22a08dead3f6c811b46846253fcb6ff4494ab3aff949329082df32575fecbc5df5e12d1b623eac6", 0xbb}, {&(0x7f0000000780)="9a0a41ed72a3597b5cb8356e88bcd0d68ea3958a772193889552026f4227801115a3bf1f8ad564552fc4ba51a062e15fcd679545e5e855c4ce65c49c948fcd8111626158d7097b9d760fff779488f54cbd3c220d811b6d423f9cd4ec03e47052c2af8e4c0a44", 0x66}], 0x8}}], 0x1, 0x0) sendto$inet(r1, &(0x7f0000002840)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x4d, 0x11, 0x0, 0x0) recvmmsg(r0, &(0x7f0000002580)=[{{&(0x7f0000000000)=@l2, 0x80, &(0x7f0000000080)=[{&(0x7f0000000500)=""/4086, 0xff6}], 0x1, &(0x7f0000000300)=""/46, 0x2e}, 0x6}, {{&(0x7f00000001c0)=@nfc_llcp, 0x80, &(0x7f00000028c0)=[{&(0x7f0000000100)=""/37, 0x25}, {&(0x7f0000000240)=""/39, 0x27}, {&(0x7f0000000280)=""/4, 0x4}, {&(0x7f00000002c0)}], 0x4, &(0x7f0000002900)=""/144, 0x90}, 0x4}, {{&(0x7f00000026c0)=@caif, 0x80, &(0x7f0000001540)=[{&(0x7f0000001500)=""/61, 0x3d}], 0x1, &(0x7f0000001580)=""/4096, 0x1000}, 0x2}], 0x3, 0x40012040, &(0x7f0000002640)) [ 1176.520632][ T1793] FAULT_INJECTION: forcing a failure. [ 1176.520632][ T1793] name failslab, interval 1, probability 0, space 0, times 0 [ 1176.614089][ T1793] CPU: 0 PID: 1793 Comm: syz-executor.5 Not tainted 5.8.0-rc7-syzkaller #0 [ 1176.623152][ T1793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1176.633215][ T1793] Call Trace: [ 1176.636518][ T1793] dump_stack+0x1f0/0x31e [ 1176.640866][ T1793] should_fail+0x38a/0x4e0 [ 1176.645307][ T1793] ? tomoyo_encode2+0x25a/0x560 [ 1176.650167][ T1793] should_failslab+0x5/0x20 [ 1176.654706][ T1793] __kmalloc+0x74/0x330 [ 1176.658885][ T1793] tomoyo_encode2+0x25a/0x560 12:15:55 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000000)=ANY=[@ANYBLOB="636f6d6d69743d3078303030303030303030303030303030382c6e6f617505000000667261672c000120a9a411ec26381b9479f88496f915261e90d546be0000000e69b49a013ca4cfdba533fa039da5723e72a9a166ba8b85c2156ee16e8b2ebf40436b243a7e2f"]) [ 1176.663625][ T1793] tomoyo_realpath_from_path+0x5d6/0x630 [ 1176.669295][ T1793] tomoyo_path_number_perm+0x18f/0x690 [ 1176.674808][ T1793] security_file_ioctl+0x55/0xb0 [ 1176.679768][ T1793] __se_sys_ioctl+0x48/0x160 [ 1176.684375][ T1793] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1176.690628][ T1793] do_syscall_64+0x73/0xe0 [ 1176.695057][ T1793] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1176.701236][ T1793] RIP: 0033:0x45c429 12:15:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VFIO_IOMMU_GET_INFO(r2, 0x3b70, &(0x7f00000000c0)={0x18}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f00000001c0)=0x0) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{0x0, 0x0, 0xffffffffffffa6d0}, {&(0x7f0000000000)="8a8dce04ee966434e0bee20468d134a82ba716d5a8158da3543745bc57d7614ef465101326a46e4b42e41e24d6a447faecd6cd0e576c6d17c18d2a0de9d90e97f41535f633cadb4f3b02cf82f1c8a7b4696742ed752b356cd425c107a4e69c7e9413492b7a74ba355a9c87e4556dc6628be61a555d711a", 0x77}], 0x2000001, &(0x7f0000000200)={[], [{@permit_directio='permit_directio'}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@permit_directio='permit_directio'}, {@obj_type={'obj_type', 0x3d, '{\xa1'}}, {@euid_eq={'euid', 0x3d, r3}}, {@uid_gt={'uid>', r4}}, {@smackfsdef={'smackfsdef'}}]}) [ 1176.705146][ T1793] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1176.724776][ T1793] RSP: 002b:00007fd892ca6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1176.733329][ T1793] RAX: ffffffffffffffda RBX: 00000000000184c0 RCX: 000000000045c429 [ 1176.741312][ T1793] RDX: 0000000020000000 RSI: 000000000000541c RDI: 0000000000000003 [ 1176.749304][ T1793] RBP: 00007fd892ca6ca0 R08: 0000000000000000 R09: 0000000000000000 12:15:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0xfffffffc}, 0x0) [ 1176.757330][ T1793] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1176.765327][ T1793] R13: 00007ffcfb2cb98f R14: 00007fd892ca79c0 R15: 000000000078bf0c [ 1176.797872][ T1793] ERROR: Out of memory at tomoyo_realpath_from_path. 12:15:55 executing program 5 (fault-call:1 fault-nth:3): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 12:15:55 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x2010000000000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:55 executing program 1: r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$USBDEVFS_CLAIM_PORT(r2, 0x80045518, &(0x7f0000000040)=0x7ff) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 12:15:55 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r1, &(0x7f0000000140), 0x4924b68, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000280)='mptcp_pm\x00') sendmsg$MPTCP_PM_CMD_SET_LIMITS(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x1c, r3, 0x1, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8}]}, 0x1c}}, 0x0) r4 = socket(0x10, 0x3, 0x0) r5 = socket(0x11, 0xa, 0x3) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9, 0x1, 'cake\x00'}, {0xc, 0x2, [@TCA_CAKE_DIFFSERV_MODE={0x8, 0x3, 0xc201}]}}]}, 0x3c}}, 0x0) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x88, r3, 0x300, 0x70bd28, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast1}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r6}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}]}, 0x88}, 0x1, 0x0, 0x0, 0x40000}, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000080)) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f0000000040)) [ 1177.315418][ T1795] FAULT_INJECTION: forcing a failure. [ 1177.315418][ T1795] name fail_futex, interval 1, probability 0, space 0, times 1 [ 1177.363899][ T1795] CPU: 0 PID: 1795 Comm: syz-executor.4 Not tainted 5.8.0-rc7-syzkaller #0 [ 1177.372519][ T1795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1177.382618][ T1795] Call Trace: [ 1177.385937][ T1795] dump_stack+0x1f0/0x31e [ 1177.390360][ T1795] should_fail+0x38a/0x4e0 [ 1177.394790][ T1795] get_futex_key+0x19d/0x1570 [ 1177.399505][ T1795] ? mark_lock+0x102/0x1b00 [ 1177.404288][ T1795] futex_wake+0xba/0x650 [ 1177.408574][ T1795] do_futex+0xe60/0x32b0 [ 1177.412857][ T1795] ? trace_lock_release+0x137/0x1a0 [ 1177.418095][ T1795] ? trace_lock_release+0x137/0x1a0 [ 1177.423335][ T1795] ? __might_fault+0xf5/0x150 [ 1177.428290][ T1795] mm_release+0x182/0x2b0 [ 1177.432637][ T1795] exit_mm+0x64/0x550 [ 1177.436634][ T1795] ? _raw_spin_unlock_irqrestore+0xb4/0xd0 [ 1177.442452][ T1795] ? taskstats_exit+0x466/0xc00 [ 1177.447353][ T1795] do_exit+0x584/0x1f80 [ 1177.451525][ T1795] ? trace_lock_release+0x137/0x1a0 [ 1177.456749][ T1795] do_group_exit+0x161/0x2d0 [ 1177.461385][ T1795] get_signal+0x139b/0x1d30 [ 1177.465919][ T1795] do_signal+0x33/0x610 [ 1177.470094][ T1795] ? __prepare_exit_to_usermode+0x81/0x1e0 [ 1177.475911][ T1795] __prepare_exit_to_usermode+0xd7/0x1e0 [ 1177.481584][ T1795] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1177.487694][ T1795] do_syscall_64+0x7f/0xe0 [ 1177.492118][ T1795] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1177.498192][ T1795] RIP: 0033:0x45c429 [ 1177.502180][ T1795] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1177.522239][ T1795] RSP: 002b:00007f094f716c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1177.530663][ T1795] RAX: fffffffffffffe00 RBX: 0000000000025d00 RCX: 000000000045c429 [ 1177.538669][ T1795] RDX: 0000000000000001 RSI: 0000000020005540 RDI: 0000000000000003 [ 1177.546648][ T1795] RBP: 00007f094f716ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1177.554656][ T1795] R10: 0000000000000100 R11: 0000000000000246 R12: 0000000000000000 [ 1177.562661][ T1795] R13: 00007ffe7337cd9f R14: 00007f094f7179c0 R15: 000000000078bf0c 12:15:56 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}}, 0x2) 12:15:56 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 12:15:56 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x2500000000000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x2010011, &(0x7f0000000040)={[{@max_inline={'max_inline', 0x3d, [0x35, 0x32, 0x74, 0x0, 0x32, 0x37, 0x35, 0x39, 0x39]}}, {@acl='acl'}, {@check_int='check_int'}, {@noenospc_debug='noenospc_debug'}, {@fragment_all='fragment=all'}, {@thread_pool={'thread_pool', 0x3d, 0xde1}}], [{@fowner_gt={'fowner>', r3}}]}) r4 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r4, &(0x7f0000000140), 0x4924b68, 0x0) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0)='l2tp\x00') r6 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x100, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x38, r5, 0x524fa4fac3ca530e, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_COOKIE={0xc}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r6}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6}]}, 0x38}, 0x1, 0x0, 0x0, 0x20044000}, 0x40000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r8, 0xc06c4124, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) syz_open_dev$tty1(0xc, 0x4, 0x1) 12:15:56 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) set_tid_address(&(0x7f0000000080)) 12:15:56 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x2, &(0x7f0000000000)) 12:15:56 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="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"}) syz_open_pts(0xffffffffffffffff, 0x2000) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r1, 0x4b72, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="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"}) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r2, 0x4b72, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="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"}) ioctl$TIOCL_PASTESEL(r2, 0x541c, &(0x7f0000000000)) 12:15:56 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x10, &(0x7f0000000000)) 12:15:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}}, 0x3) 12:15:56 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:56 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 12:15:57 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x40003663}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:57 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b2f, &(0x7f0000000000)) 12:15:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}}, 0x4) 12:15:57 executing program 3: r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000080)=0x7) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SCSI_IOCTL_GET_PCI(r3, 0x5387, &(0x7f0000000040)) ioctl$TIOCL_PASTESEL(r1, 0x541c, &(0x7f0000000000)) 12:15:57 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) msgget$private(0x0, 0x10) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000000)={r3}, &(0x7f0000000040)=0x10) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0)={r3, 0x3}, 0x8) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$phonet(0x23, 0x2, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet6_MCAST_MSFILTER(r5, 0x29, 0x30, &(0x7f00000001c0)={0x976, {{0xa, 0x4e21, 0xffffff31, @dev={0xfe, 0x80, [], 0x1c}, 0xe627}}, 0x0, 0x1, [{{0xa, 0x4e24, 0x6, @dev={0xfe, 0x80, [], 0x22}, 0x9}}]}, 0x110) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r0, 0x800442d3, &(0x7f0000000100)={0x0, 0xffff, 0x0, @dev={[], 0x42}, 'team_slave_1\x00'}) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000000)=ANY=[@ANYBLOB="00f03299cb9b41bc1784679d390302e8ad42c1a5879f23e09a227cd8bbf56d89c02e811047bf20dd4090a22761b3cbf2685eff257aa25507e48353d4a2326055f1eb850b948244a26f7668ed855f0dc882503870094b225e581cd55af3a836636455145d5b35b8726832c60000000000"]) 12:15:57 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:57 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r3, 0x4b72, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="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"}) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000140)={0x3, &(0x7f0000000100)=[{}, {}, {}]}) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, 0x0}], 0x1, 0x0, &(0x7f0000000340)=[@flags={0x3, 0x244252}], 0x1) openat$smackfs_access(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/smackfs/access\x00', 0x2, 0x0) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000400)={"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"}) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f0000000180)=0x7) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 12:15:57 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b30, &(0x7f0000000000)) 12:15:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}}, 0x5) 12:15:57 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x4800000000000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) [ 1178.860334][ T1903] kvm: vcpu 0: requested 128 ns lapic timer period limited to 200000 ns [ 1178.879868][ T1903] kvm: vcpu 0: requested lapic timer restore with starting count register 0x390=1812281087 (231971979136 ns) > initial count (200000 ns). Using initial count to start timer. 12:15:57 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b31, &(0x7f0000000000)) 12:15:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}}, 0x6) 12:15:58 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x7ffff000}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:58 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b32, &(0x7f0000000000)) 12:15:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}}, 0x8) 12:15:58 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x308e491, &(0x7f0000000000)) 12:15:58 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x4c00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:58 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b33, &(0x7f0000000000)) 12:15:58 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000080)={[], [{@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@appraise='appraise'}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) 12:15:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}}, 0x9) 12:15:58 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x5c00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:58 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) r1 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) r2 = dup3(r0, r1, 0x80000) ioctl$TIOCL_PASTESEL(r2, 0x541c, &(0x7f0000000000)) 12:15:58 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b34, &(0x7f0000000000)) 12:15:58 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b35, &(0x7f0000000000)) 12:15:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}}, 0xa) 12:15:59 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b36, &(0x7f0000000000)) 12:15:59 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x8, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:15:59 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x6800000000000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:59 executing program 1: prctl$PR_GET_FP_MODE(0x2e) 12:15:59 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f00000000c0)={0x0, 0xffffffff, 0x9df, r0, 0x0, &(0x7f0000000080)={0x990a6b, 0x3, [], @p_u8=&(0x7f0000000040)}}) ioctl$TIOCL_PASTESEL(r1, 0x541c, &(0x7f0000000000)) 12:15:59 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b37, &(0x7f0000000000)) 12:15:59 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$getsig(0x4202, r0, 0x6, &(0x7f0000000000)) 12:15:59 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$FITHAW(r0, 0xc0045878) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 12:15:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}}, 0xb) 12:15:59 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x6c00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:15:59 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b3a, &(0x7f0000000000)) 12:15:59 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) r1 = creat(&(0x7f0000000340)='./file0\x00', 0x109) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000000180)=""/163) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) syz_mount_image$bfs(&(0x7f0000000140)='bfs\x00', &(0x7f0000000580)='./file0\x00', 0x5, 0x2, &(0x7f0000000540)=[{&(0x7f00000003c0)="accc33b38fa21e858dd61adfcf3000a0433c766ccc515cee60bf17cf53c80fa6f20ad407df199600da8c3b51e6a5de8e6ee99a1c67de81cc83a57f242ff3415b0a590c906cb0ced5482151469ff99ddbad1ee7434ee71aa715a9072dc6baf393b9deaae24e0c6f59febf103d822b70573734cd255556b34b74d2a8e320f66d9e1acc45a1cae0859d45fc3523d8f429e7f5615db35e0c7fd806c922b21051135b6b45f9920b7eec2662dd326a44aa7e23453214737554506215302c998958e864154be1e3e06d376aedc176b59ed962454c23b29701dc8911f4cee3a2625b7fe7c9bbec7f5feaa74e55075a840c2570fb3b9c4d4b905170fb7a", 0xf9, 0x8}, {&(0x7f00000004c0)="950c7df284c739cc27f6efdc52c45e7d5c8f64872b5264f2f7b0a3c14bfb75c7da9e283c5b3f412f3013d9a8461f2ab54652d898b1d2b44ea59d998f7421401019ff77ae238481e069de898854c45f9320c8c4f6b414d8f64ce6", 0x5a, 0x7}], 0x3001003, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r4, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="18000000141400002abd7000ffdbdf2508004f0001000000b5ef0100570fb5a92bcf2605170461d3346bb52188c67e0137d07ec2cfba71453d3c0fce1e2c5f3279ab0dac8099b234c199bd73dc5e0b095507ddda861dbf5f44935dabd662e3985477c2c1d37223cda66b2b44c7395bebc5ef72efd35eb3199176cb62a69f60cec4aaf280b8a5c20c54233b9b318a908e13071ca35f9d5be30930956b52c5be6ae924a82728769db3278ee2ce44949a5f1e50be96348a6dbfc64a69285326f508f529916a2a0facbf9abab8e2675dd2"], 0x18}, 0x1, 0x0, 0x0, 0x80c0}, 0x80) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r2, 0x8983, &(0x7f0000000080)={0x3, 'bridge0\x00', {0x1}, 0x8001}) 12:15:59 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) socket$packet(0x11, 0x3, 0x300) 12:16:00 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x300, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:16:00 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}}, 0xc) 12:16:00 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b3b, &(0x7f0000000000)) 12:16:00 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)=ANY=[@ANYBLOB='Z']) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) r1 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) r2 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000100)=0x0) move_pages(r3, 0x5, &(0x7f00000001c0)=[&(0x7f0000fec000/0x12000)=nil, &(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff8000/0x2000)=nil], 0x0, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x6) r4 = fcntl$dupfd(r0, 0x406, r1) sendmsg$AUDIT_TRIM(r4, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f6, 0x2, 0x70bd26, 0x25dfdbfd, "", ["", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x80}, 0x2400c8d9) setsockopt$TIPC_MCAST_REPLICAST(r4, 0x10f, 0x86) 12:16:00 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x73c5b1fa00000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:16:00 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) ioctl$VIDIOC_QUERYSTD(0xffffffffffffffff, 0x8008563f, &(0x7f0000000040)) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000080)='/dev/input/mice\x00', 0x10000) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f00000000c0)) 12:16:00 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b3c, &(0x7f0000000000)) 12:16:00 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}}, 0xf) 12:16:00 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x7400000000000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:16:00 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="a417a23e0d0cde24712c2723d5f93b50ecf7817c153e1c515164f4f115caf1078947ff05b4a273dd83356c7b71018084091bd4144355f29d615221f751fd634567ded8c19de2fc143b3f5b06e343567680bdf0280f1dbbcf8bbc3857a0d5b164c30d5ed515414922e9312e32645b37865e48396a7390636937822bd73dc6168b2a7b009840313161e892369c9aa26d2b1fb0c67164ff41e07048132d56ad98e37767d2ec77601f098e6f47bebaad62c15463b2232f84c271cfdb4b0a1d291ae9406ac0749a77e812593caa44e38fbda1bbeb59f6cbbca385b888427681ac6094bf779206478c6df06c28d133951d413c6d5dd937e92a7bd7940825da703bb3f540bbdc2dcee2240624a61246276fdf36732c2818d231e1660f0aa1eefa33d76fd87b3c5fa5d6b51bde049d81b2fe90e2a68b6f9ac9bc9c8afb34685743520d156931b35376c4bba81debab8f00eefb7aedf2068dc03dbebf7af3501a1916397dc3e3e9db54c10dbe0fd8ad46ff3e2f148bbada1b927b422c16bbd7c236aa25f4757b4b18572dca544553fcb15b6f90059fce45411186ece4e724f234b62d60017f1a586f183c9dc131bb5194b07096a7d7b58abd364fa891dd9bec9abf3ec9e18010a235d6ab16013764efe6bd4cbf8531e1e344985df4aa86a503a299bb6a7fbdde2473361dcd15be116e3e673f2d1e0226ac9a499acf7d12b8fadb43d031080cb1589948757149e900daf03a4a5960122f2a8330ffda81ca8741454929d8627a737af9e42c026bbfacef2436a06036d04497e12fe29e9498c4813fc50ae62ebebf267bc30f300694dc4bb0d55ab12442fb3a2abaaa71edf747dd0b34539b9f929031139a9e6230eba117261355662575455fff1971125e2303c9c310f145b95c8bbf8fbd0558c661823749c3b62f2e0f4a908f6e49cb2ba7664a4dafbeb5f7e4778fe2240e9a2724432bd5770da4e0bf7043688dd30b297e6912f16961d55ab4368a9ffe807292c30cce50f6f6c52829ba7a15c63a144d84623c2cadd3d8e90131792475c9bfdd3dbc419e4406e6892f8350887378fd3e5ed23fc5ecff22a586d51324fa69a35dec5a77b589a592866cbed5881d0be74025340bf81a543399cbd3a3c5fb181234be74cb24d406ca934dd36945b587b2bbf3022271d097351fad634bde6e9cd20abd69f7175c0747538c97f610a53fe6c40eb9b7bbeb8850f2e01f29080ddfb09693098d047b14890fccbaa903457b05713a8d901159ebc53ea1b2a405d5ce8cf063c1857cc2a0d4ec44cc25894b5a9053facada7a9bd0cc9860c39e075329f1e91652f54a3cab38a3eaea054f20e2cd151b745d44ebb18a68c3a84b97299a921b012bb0122f997660148f511d1a41ac884d9ace04fb1beb3ba475d2d243908f59a08114979c3ed977b846738bab61aea7022ff1f7cba50866"}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r1, 0x4b72, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="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"}) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r2, 0x4b72, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="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"}) ioctl$TIOCL_PASTESEL(r2, 0x541c, &(0x7f0000000000)) 12:16:00 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b3d, &(0x7f0000000000)) 12:16:00 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f00000005c0)='./file0\x00', 0x220c2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = socket(0x10, 0x3, 0x0) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9, 0x1, 'cake\x00'}, {0xc, 0x2, [@TCA_CAKE_DIFFSERV_MODE={0x8, 0x3, 0xc201}]}}]}, 0x3c}}, 0x0) bind$can_j1939(r2, &(0x7f0000000100)={0x1d, r7, 0x1, {0x1, 0x0, 0x2}, 0x3}, 0x18) r8 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r8, &(0x7f0000000140), 0x4924b68, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r8, 0x84, 0x6b, &(0x7f0000000240)=[@in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e21, @private=0xa010101}, @in6={0xa, 0x4e23, 0xffffff81, @empty}, @in={0x2, 0x4e23, @multicast2}], 0x4c) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000640)={0x14, 0x88, 0xfa00, {r4, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0x90) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {r4, 0x10, 0x0, @in6={0xa, 0x4e21, 0xa73, @local, 0x5}}}, 0x90) 12:16:00 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x7a00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:16:00 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b40, &(0x7f0000000000)) 12:16:00 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:16:00 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}}, 0x10) 12:16:00 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1213c0, 0x3) r2 = open(&(0x7f00000005c0)='./file0\x00', 0x220c2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000640)={0x14, 0x88, 0xfa00, {r4, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0x90) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e21, 0x5ced, @loopback, 0x2429f8dc}, r4}}, 0x38) 12:16:00 executing program 1: ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000000)=0x0) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f00000001c0)={[{@nodiscard='nodiscard'}, {@ref_verify='ref_verify'}, {@nospace_cache='nospace_cache'}, {@check_int_print_mask={'check_int_print_mask', 0x3d, 0x4}}, {@compress_algo={'compress', 0x3d, 'lzo'}}, {@subvolid={'subvolid', 0x3d, 0x9}}, {@ref_verify='ref_verify'}, {@ref_verify='ref_verify'}, {@enospc_debug='enospc_debug'}], [{@uid_eq={'uid', 0x3d, r0}}]}) 12:16:01 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b41, &(0x7f0000000000)) 12:16:01 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000240)=0x2) creat(&(0x7f0000000040)='./file0\x00', 0x140) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f0000000280)={[], 0x2, 0x6, 0x80, 0x0, 0x81, 0x2000, 0x0, [], 0x6}) 12:16:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}}, 0x11) 12:16:01 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b44, &(0x7f0000000000)) 12:16:01 executing program 1: r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) r1 = socket$inet(0x2, 0x6, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) r2 = socket$inet(0x2, 0x3, 0x5) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) r3 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r3, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) r4 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r4, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x3042c31, &(0x7f00000002c0)=ANY=[@ANYBLOB="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", @ANYRES64=r0, @ANYRES32=r4, @ANYRESHEX=r1, @ANYRESHEX=r3, @ANYRESOCT=r2, @ANYRESHEX, @ANYBLOB="9e62a1dc717aa75c9aa64e275e1b925b37f8c1789e72761d61d2b90449ad3fff4daf3492e98808506e82b88adac922a192e88e8671652d4fda812428c63f567ca8d7a0ce756143b62272aeff23c47caa0d1177ff874a7c422564efd7c1a97108492dba178ab4ac89523f3b2c5eb5568ffebaf7cdeb2a06893e833ef86df8d0c8bef92c4805abd91f035d81cd88e1055f9e9511c646299170e25d2645ef1a730b67d9e24fe0f78d99e5aa0dfd38218a16e4e3e3cf0ee902f31c59cc91d607b106705fe716e8672fb18363ba5cdf42f336020e86eb27b185bf92a14a3d020f82b8218a401ddcacb3", @ANYRESHEX]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SOUND_MIXER_WRITE_VOLUME(r6, 0xc0044d1d, &(0x7f0000000000)=0x1e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x3, 0xedfc}, &(0x7f0000000100)=0x18) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000001c0)={r8, @in={{0x2, 0x4e24, @local}}, 0x7, 0x8, 0x80000001, 0x2, 0x0, 0xe5f, 0x2}, &(0x7f0000000280)=0x9c) r9 = dup(r7) ioctl$SNDRV_TIMER_IOCTL_STOP(r9, 0x54a1) 12:16:01 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x8240210000000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:16:01 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x60, "9b50504a108845e42ca251f366cca4f4509bf14e398383b7d34bec5da9c549b4d42c3c252bae33f1ea4f3fe2422c8288f2ab278397162695cfcbf1087edc3b599b59498976877b6c49f43f2634c83b63ea876b13287f43cdd65bab6e5e97aa31"}, &(0x7f0000000100)=0x68) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 12:16:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}}, 0x12) 12:16:01 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}, 0x1000000}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:16:01 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) r0 = socket(0xd33150497a9691fd, 0x3, 0x200) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) ioctl$SIOCAX25OPTRT(r0, 0x89e7, &(0x7f0000000000)={@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}) 12:16:01 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b45, &(0x7f0000000000)) 12:16:01 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) r1 = socket(0x10, 0x3, 0x0) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$TCGETS2(r3, 0x802c542a, &(0x7f0000000240)) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f00000000c0)={&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x2000}) sendmmsg$alg(r1, &(0x7f0000000140), 0x4924b68, 0x0) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080)='NLBL_UNLBL\x00') r5 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r5, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) sendmsg$NLBL_UNLABEL_C_LIST(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xfffffffffffffc8b, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB="88000000", @ANYRES16=r4, @ANYRESOCT=r5], 0x88}, 0x1, 0x0, 0x0, 0x8080}, 0x400c800) tkill(0x0, 0x2) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) r6 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r6, &(0x7f0000000100)={r8, r2, 0x4}) 12:16:01 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:16:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}}, 0x13) 12:16:02 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b46, &(0x7f0000000000)) 12:16:02 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x2, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r1, 0x80dc5521, &(0x7f0000000000)=""/72) 12:16:02 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x97ffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:16:02 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}}, 0x60) 12:16:02 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b47, &(0x7f0000000000)) 12:16:02 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) lsetxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64EXEC\x00', &(0x7f00000000c0)={'.%!'}, 0x4, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r3, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) r4 = dup2(r0, r3) sendmsg$NFT_MSG_GETRULE(r4, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0xd8, 0x7, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x3}, [@NFTA_RULE_USERDATA={0xab, 0x7, 0x1, 0x0, "5cfe9bf806a6c9005100248d198b7bd86a998a73eba6da7503ac1f1bbd4e1a8380f6996f29b672b7c60591df06fbf7f005a139d9060d25a56cf761b29a5c44cc99d0b98e9a5fd0b897548d6c2897eee3ad7b0cbbb0f8fd6b2ebea89108ef0ae21f54abc050b3586fbca2e764ec84a059a9bf097ca24d153ee7c797df85e17681bb52402247af936c7e91523d082718ae9c1d3bef036310e46237f092a9c2d81552321d58a86361"}, @NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x5}, @NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x3}]}, 0xd8}, 0x1, 0x0, 0x0, 0x814}, 0x40000) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af12, &(0x7f0000000100)={0x1, 0x6}) 12:16:02 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}, 0x20002323}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:16:02 executing program 1: r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000000)='trusted.overlay.opaque\x00', &(0x7f0000000040)='y\x00', 0x2, 0x0) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x49, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:16:02 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}}, 0x300) 12:16:02 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b48, &(0x7f0000000000)) 12:16:02 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket(0xb, 0x6, 0x89a8) sendmmsg$alg(r1, &(0x7f0000000140), 0x0, 0x20040040) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x10480, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_QUERY_DV_TIMINGS(r3, 0x80845663, &(0x7f0000000180)) ioctl$IMGETCOUNT(r1, 0x80044943, &(0x7f0000000040)) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 12:16:02 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xe0ffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:16:02 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b49, &(0x7f0000000000)) 12:16:02 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r3, 0x4b72, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)="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"}) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x9) ioctl$VHOST_RESET_OWNER(r2, 0xaf02, 0x0) 12:16:02 executing program 1: r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x110, r0, 0x6a090000) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mISDNtimer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000000)={{0x80, 0x53b, 0x2, 0x6}, 'syz1\x00', 0x3b}) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:16:02 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x301800, 0x0) ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) connect$rds(r0, &(0x7f0000000080)={0x2, 0x4e21, @rand_addr=0x64010102}, 0x10) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x600, 0x0) 12:16:02 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}}, 0x3e8) 12:16:02 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xebffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:16:03 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}, 0x23230020}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:16:03 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b4a, &(0x7f0000000000)) 12:16:03 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000000c0)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xffffffffffffff96) r3 = socket(0x10, 0x3, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9, 0x1, 'cake\x00'}, {0xc, 0x2, [@TCA_CAKE_DIFFSERV_MODE={0x8, 0x3, 0xc201}]}}]}, 0x3c}}, 0x0) r6 = socket(0x10, 0x3, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="3c00000024000b0f00"/20, @ANYRES32=r8, @ANYBLOB="00000000ffffffff000000000900000000000000000000000c0002000800030001c20000"], 0x3c}}, 0x0) r9 = socket(0x10, 0x3, 0x0) r10 = socket(0x11, 0x800000003, 0x0) bind(r10, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r9, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="3c00000024000b0f00"/20, @ANYRES32=r11, @ANYBLOB="faffffffff6b6500000d803c2050781a1606386088f4c38e00000c00020001c2"], 0x3c}}, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000380)={&(0x7f0000000200)={0x148, 0x0, 0x100, 0x70bd29, 0x25dfdbfe, {}, [{{0x8}, {0x12c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r2}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r5}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r11}}}]}}]}, 0x148}, 0x1, 0x0, 0x0, 0x4040}, 0x40804) 12:16:03 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x1e1440, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r1, &(0x7f0000000140), 0x4924b68, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000100)={0x0, 0x82, "b288a0376385ccedf628651244bdd361456531dc36ea9bd07dd1758f907e8958c52046116bfac485004bbe872c21eb125afc3397ff5b02e12d0d4368af9e563945879fc1a76a0c459c99aa4c55ef5fd3b04538c44f2246c65b1805e4e5c12dc32c65ce121128676b089842157a83f12ccf0cd43137acb072e1b238f9164dbd3ec411"}, &(0x7f00000001c0)=0x8a) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e24, 0x2, @dev={0xfe, 0x80, [], 0x42}, 0x7}}}, 0x84) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r3, 0x4b72, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)="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"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$CHAR_RAW_FRASET(r5, 0x1264, &(0x7f0000000300)=0x6) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f00000002c0)) ioctl$TIOCL_PASTESEL(r3, 0x541c, &(0x7f00000000c0)) 12:16:03 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}}, 0x500) 12:16:03 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:16:03 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b4b, &(0x7f0000000000)) [ 1184.978035][ T2272] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 12:16:03 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}}, 0x600) 12:16:03 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b4c, &(0x7f0000000000)) 12:16:03 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) fcntl$setlease(r1, 0x400, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SG_SET_TIMEOUT(r3, 0x2201, &(0x7f00000000c0)=0x1ff) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsu\x00', 0x1b1ac0, 0x0) ioctl$TIOCGDEV(r4, 0x80045432, &(0x7f0000000080)) 12:16:03 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xf9fdffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:16:03 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b4d, &(0x7f0000000000)) [ 1185.162695][ T2282] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 12:16:04 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x8, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:16:04 executing program 3: r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000040), 0x4) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0xa0101) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) move_mount(r1, &(0x7f00000000c0)='./file0\x00', r3, &(0x7f0000000100)='./file0\x00', 0x12) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r4, 0x541c, &(0x7f0000000000)) 12:16:04 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b4e, &(0x7f0000000000)) 12:16:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}}, 0x900) 12:16:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SG_GET_KEEP_ORPHAN(r1, 0x2288, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:16:04 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xfdfdffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:16:04 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2080001, &(0x7f0000000400)) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000080)={r1, 0x80000000}, 0x8) 12:16:04 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) r1 = socket$inet(0x2, 0x3, 0x9) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) fsetxattr$smack_xattr_label(r1, &(0x7f0000000040)='security.SMACK64EXEC\x00', &(0x7f0000000080)={'.'}, 0x2, 0x2) 12:16:04 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b52, &(0x7f0000000000)) 12:16:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}}, 0xa00) 12:16:04 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b60, &(0x7f0000000000)) 12:16:04 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000000)={0x4, 0x6, 0x4, 0x10, 0x1, {0x77359400}, {0x3, 0x8, 0x7f, 0x9, 0x40, 0x7, "a1e657b3"}, 0x9366, 0x1, @userptr, 0x2}) 12:16:05 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x300, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x1e, 0x0, 0x170) 12:16:05 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet(0x2, 0x3, 0x7) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xfdffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@hash='hash'}]}) 12:16:05 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r0, 0x5606, 0x4) r1 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0x1f8, 0xe8, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x1f8}}, {{@arp={@multicast2, @empty, 0xffffffff, 0x0, 0x0, 0x10, {@mac=@local, {[0x0, 0xff]}}, {@empty, {[0xff, 0x0, 0x0, 0x0, 0xff]}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@local, @empty, @multicast1}}}, {{@arp={@dev={0xac, 0x14, 0x14, 0x10}, @dev={0xac, 0x14, 0x14, 0x44}, 0xff000000, 0xff000000, 0x1b, 0x4, {@empty, {[0xff, 0x0, 0x0, 0xff, 0xff, 0xff]}}, {@empty, {[0xff, 0xff, 0x80, 0x0, 0x0, 0xff]}}, 0x9, 0xb3, 0x7ff, 0x9, 0x1, 0x1, 'sit0\x00', 'team_slave_0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) r2 = socket$inet(0x2, 0x3, 0x7) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000001100)={'filter\x00', 0xb001, 0x4, 0x3f0, 0x0, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x302}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'ip6tnl0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="55f895b6378b", @empty, @multicast1}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @local, @multicast2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r1, 0xf504, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f0000000080)={0x7fff, 0x2, 0x5, 0x6}) ioctl$F2FS_IOC_WRITE_CHECKPOINT(0xffffffffffffffff, 0xf507, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) 12:16:05 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b61, &(0x7f0000000000)) 12:16:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0xffffffffffffa6d0}], 0x2000001, &(0x7f0000000400)) 12:16:05 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0xc, 0x2, [@TCA_PIE_ECN={0x8}]}}]}, 0x38}}, 0xb00) [ 1186.690701][T24377] ================================================================== [ 1186.690766][T24377] BUG: KASAN: use-after-free in bit_putcs+0x132a/0x1bf0 [ 1186.690777][T24377] Read of size 1 at addr ffff888097860450 by task kworker/1:1/24377 [ 1186.690781][T24377] [ 1186.690793][T24377] CPU: 1 PID: 24377 Comm: kworker/1:1 Not tainted 5.8.0-rc7-syzkaller #0 [ 1186.690799][T24377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1186.690811][T24377] Workqueue: events console_callback [ 1186.690818][T24377] Call Trace: [ 1186.690830][T24377] dump_stack+0x1f0/0x31e [ 1186.690848][T24377] print_address_description+0x66/0x5a0 [ 1186.690859][T24377] ? vprintk_emit+0x342/0x3c0 [ 1186.690874][T24377] ? printk+0x62/0x83 [ 1186.690886][T24377] ? vprintk_emit+0x339/0x3c0 [ 1186.690901][T24377] kasan_report+0x132/0x1d0 [ 1186.690914][T24377] ? bit_putcs+0x132a/0x1bf0 [ 1186.690929][T24377] bit_putcs+0x132a/0x1bf0 [ 1186.690944][T24377] ? sched_clock_cpu+0x18/0x3b0 [ 1186.690979][T24377] ? vga16fb_setcolreg+0x71/0x350 [ 1186.690994][T24377] ? bit_clear+0x540/0x540 [ 1186.691007][T24377] fbcon_putcs+0x790/0xaf0 [ 1186.691021][T24377] ? bit_clear+0x540/0x540 [ 1186.691046][T24377] do_update_region+0x462/0x620 [ 1186.691069][T24377] redraw_screen+0xc30/0x16f0 [ 1186.691084][T24377] ? fbcon_cursor+0x7c1/0xc00 [ 1186.691099][T24377] complete_change_console+0xb1/0x720 [ 1186.691108][T24377] ? change_console+0x2d0/0x450 [ 1186.691120][T24377] ? hide_cursor+0x112/0x310 [ 1186.691134][T24377] console_callback+0x106/0x330 [ 1186.691144][T24377] ? rcu_read_lock_sched_held+0x2f/0xa0 [ 1186.691160][T24377] process_one_work+0x789/0xfc0 [ 1186.691190][T24377] worker_thread+0xaa4/0x1460 [ 1186.691212][T24377] ? _raw_spin_unlock_irqrestore+0x6f/0xd0 [ 1186.691234][T24377] kthread+0x37e/0x3a0 [ 1186.691244][T24377] ? rcu_lock_release+0x20/0x20 [ 1186.691253][T24377] ? kthread_blkcg+0xd0/0xd0 [ 1186.691268][T24377] ret_from_fork+0x1f/0x30 [ 1186.691286][T24377] [ 1186.691293][T24377] Allocated by task 2157: [ 1186.691303][T24377] __kasan_kmalloc+0x103/0x140 [ 1186.691313][T24377] __alloc_skb+0xde/0x4f0 [ 1186.691322][T24377] netlink_sendmsg+0x7b2/0xd70 [ 1186.691332][T24377] ____sys_sendmsg+0x519/0x800 [ 1186.691341][T24377] __sys_sendmmsg+0x45b/0x680 [ 1186.691350][T24377] __x64_sys_sendmmsg+0x9c/0xb0 [ 1186.691359][T24377] do_syscall_64+0x73/0xe0 [ 1186.691367][T24377] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1186.691371][T24377] [ 1186.691376][T24377] Freed by task 2157: [ 1186.691385][T24377] __kasan_slab_free+0x114/0x170 [ 1186.691394][T24377] kfree+0x10a/0x220 [ 1186.691402][T24377] __kfree_skb+0x56/0x1c0 [ 1186.691410][T24377] netlink_unicast+0x78e/0x940 [ 1186.691418][T24377] netlink_sendmsg+0xa57/0xd70 [ 1186.691427][T24377] ____sys_sendmsg+0x519/0x800 [ 1186.691436][T24377] __sys_sendmmsg+0x45b/0x680 [ 1186.691445][T24377] __x64_sys_sendmmsg+0x9c/0xb0 [ 1186.691454][T24377] do_syscall_64+0x73/0xe0 [ 1186.691462][T24377] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1186.691466][T24377] [ 1186.691474][T24377] The buggy address belongs to the object at ffff888097860400 [ 1186.691474][T24377] which belongs to the cache kmalloc-512 of size 512 [ 1186.691484][T24377] The buggy address is located 80 bytes inside of [ 1186.691484][T24377] 512-byte region [ffff888097860400, ffff888097860600) [ 1186.691488][T24377] The buggy address belongs to the page: [ 1186.691500][T24377] page:ffffea00025e1800 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 [ 1186.691508][T24377] flags: 0xfffe0000000200(slab) [ 1186.691522][T24377] raw: 00fffe0000000200 ffffea00013e4708 ffffea000228ed08 ffff8880aa400a80 [ 1186.691533][T24377] raw: 0000000000000000 ffff888097860000 0000000100000004 0000000000000000 [ 1186.691538][T24377] page dumped because: kasan: bad access detected [ 1186.691541][T24377] [ 1186.691545][T24377] Memory state around the buggy address: [ 1186.691554][T24377] ffff888097860300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1186.691562][T24377] ffff888097860380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1186.691569][T24377] >ffff888097860400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1186.691574][T24377] ^ [ 1186.691582][T24377] ffff888097860480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1186.691590][T24377] ffff888097860500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1186.691594][T24377] ================================================================== [ 1186.691598][T24377] Disabling lock debugging due to kernel taint [ 1186.691604][T24377] Kernel panic - not syncing: panic_on_warn set ... [ 1186.691614][T24377] CPU: 1 PID: 24377 Comm: kworker/1:1 Tainted: G B 5.8.0-rc7-syzkaller #0 [ 1186.691618][T24377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1186.691626][T24377] Workqueue: events console_callback [ 1186.691631][T24377] Call Trace: [ 1186.691640][T24377] dump_stack+0x1f0/0x31e [ 1186.691652][T24377] panic+0x264/0x7a0 [ 1186.691662][T24377] ? trace_hardirqs_on+0x30/0x80 [ 1186.691674][T24377] kasan_report+0x1c9/0x1d0 [ 1186.691684][T24377] ? bit_putcs+0x132a/0x1bf0 [ 1186.691695][T24377] bit_putcs+0x132a/0x1bf0 [ 1186.691705][T24377] ? sched_clock_cpu+0x18/0x3b0 [ 1186.691724][T24377] ? vga16fb_setcolreg+0x71/0x350 [ 1186.691734][T24377] ? bit_clear+0x540/0x540 [ 1186.691743][T24377] fbcon_putcs+0x790/0xaf0 [ 1186.691752][T24377] ? bit_clear+0x540/0x540 [ 1186.691761][T24377] do_update_region+0x462/0x620 [ 1186.691775][T24377] redraw_screen+0xc30/0x16f0 [ 1186.691786][T24377] ? fbcon_cursor+0x7c1/0xc00 [ 1186.691795][T24377] complete_change_console+0xb1/0x720 [ 1186.691802][T24377] ? change_console+0x2d0/0x450 [ 1186.691811][T24377] ? hide_cursor+0x112/0x310 [ 1186.691821][T24377] console_callback+0x106/0x330 [ 1186.691829][T24377] ? rcu_read_lock_sched_held+0x2f/0xa0 [ 1186.691840][T24377] process_one_work+0x789/0xfc0 [ 1186.691858][T24377] worker_thread+0xaa4/0x1460 [ 1186.691871][T24377] ? _raw_spin_unlock_irqrestore+0x6f/0xd0 [ 1186.691886][T24377] kthread+0x37e/0x3a0 [ 1186.691895][T24377] ? rcu_lock_release+0x20/0x20 [ 1186.691903][T24377] ? kthread_blkcg+0xd0/0xd0 [ 1186.691913][T24377] ret_from_fork+0x1f/0x30 [ 1186.693132][T24377] Kernel Offset: disabled [ 1187.300169][T24377] Rebooting in 86400 seconds..