1400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:36:50 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 874.805400] audit: type=1804 audit(1572773810.551:736): pid=12782 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir283790537/syzkaller.VUSu0B/824/file0" dev="sda1" ino=18142 res=1 09:36:50 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x1a, &(0x7f00000005c0)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc70000000000000950009000000000095f899071d926e423e0b703a04904c021d9d981f0feff06911ab8ba5fd7beb01b4a248ae02e24e0c7f325ae6e7312dcfdbcd1780089dce06249d3bb1fe6f995c3119fbfbd50a6fd12b833ecca3bf0c80c5c8fbf333ef7e2378d9c7078bdc72b8d48d6cf7dd44350a1b633a6dc85d33b29be40650754cb5ea1d25e5f02e5817e0b014d66437a7229761c516fe9685ea2b9047d22a74ee6fa6df378b25dd4700f6bf00"/214], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 09:36:50 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r2, 0x1, 0x6, @local}, 0x10) 09:36:50 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x1a, &(0x7f00000005c0)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc70000000000000950009000000000095f899071d926e423e0b703a04904c021d9d981f0feff06911ab8ba5fd7beb01b4a248ae02e24e0c7f325ae6e7312dcfdbcd1780089dce06249d3bb1fe6f995c3119fbfbd50a6fd12b833ecca3bf0c80c5c8fbf333ef7e2378d9c7078bdc72b8d48d6cf7dd44350a1b633a6dc85d33b29be40650754cb5ea1d25e5f02e5817e0b014d66437a7229761c516fe9685ea2b9047d22a74ee6fa6df378b25dd4700f6bf00"/214], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 875.158530] device lo entered promiscuous mode 09:36:51 executing program 5: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) [ 875.214451] device lo left promiscuous mode 09:36:51 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x1a, &(0x7f00000005c0)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc70000000000000950009000000000095f899071d926e423e0b703a04904c021d9d981f0feff06911ab8ba5fd7beb01b4a248ae02e24e0c7f325ae6e7312dcfdbcd1780089dce06249d3bb1fe6f995c3119fbfbd50a6fd12b833ecca3bf0c80c5c8fbf333ef7e2378d9c7078bdc72b8d48d6cf7dd44350a1b633a6dc85d33b29be40650754cb5ea1d25e5f02e5817e0b014d66437a7229761c516fe9685ea2b9047d22a74ee6fa6df378b25dd4700f6bf00"/214], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 09:36:51 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:36:51 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 875.292456] device dummy0 entered promiscuous mode [ 875.324747] device dummy0 left promiscuous mode 09:36:51 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:36:51 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:36:51 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x19, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x179, 0x11, 0x100000}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 875.348879] audit: type=1804 audit(1572773811.221:737): pid=12816 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir283790537/syzkaller.VUSu0B/825/file0" dev="sda1" ino=18139 res=1 09:36:51 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x1a, &(0x7f00000005c0)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc70000000000000950009000000000095f899071d926e423e0b703a04904c021d9d981f0feff06911ab8ba5fd7beb01b4a248ae02e24e0c7f325ae6e7312dcfdbcd1780089dce06249d3bb1fe6f995c3119fbfbd50a6fd12b833ecca3bf0c80c5c8fbf333ef7e2378d9c7078bdc72b8d48d6cf7dd44350a1b633a6dc85d33b29be40650754cb5ea1d25e5f02e5817e0b014d66437a7229761c516fe9685ea2b9047d22a74ee6fa6df378b25dd4700f6bf00"/215], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 09:36:51 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:36:51 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:36:51 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x1a, &(0x7f00000005c0)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc70000000000000950009000000000095f899071d926e423e0b703a04904c021d9d981f0feff06911ab8ba5fd7beb01b4a248ae02e24e0c7f325ae6e7312dcfdbcd1780089dce06249d3bb1fe6f995c3119fbfbd50a6fd12b833ecca3bf0c80c5c8fbf333ef7e2378d9c7078bdc72b8d48d6cf7dd44350a1b633a6dc85d33b29be40650754cb5ea1d25e5f02e5817e0b014d66437a7229761c516fe9685ea2b9047d22a74ee6fa6df378b25dd4700f6bf00"/215], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 09:36:51 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:36:51 executing program 5: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) 09:36:51 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(0x0, 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c66736d616769633d3078303030303030303030303030303030302c736d61636b66737472616e736d7574653d2f73656c696e002c737d61636b6673646566fc6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e0592e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c29802c008c0000000000000000faa58b7692891653b11d7432701a2f82f06b18a20130d453c246286888c9c4241f20d61156ec82364f7c3bb3ead7b5fa581c1eaa3108ed05d20547e0a55db6c38213aa99eb678003aa97d23ab8ddd94473b98483844c3070c0b013df198fdf03e138773c5ef05b13c439df99c96322f13a063761f74fd0626717baab71906a9b3f5780c1152aa4585b17d19bf250b8bea7cfddcbd7acdf150b6ddfcbad20f5abcbeac782d9449101ef494c6213b33b3a4c2b9a762e9634"]) 09:36:51 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x1a, &(0x7f00000005c0)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc70000000000000950009000000000095f899071d926e423e0b703a04904c021d9d981f0feff06911ab8ba5fd7beb01b4a248ae02e24e0c7f325ae6e7312dcfdbcd1780089dce06249d3bb1fe6f995c3119fbfbd50a6fd12b833ecca3bf0c80c5c8fbf333ef7e2378d9c7078bdc72b8d48d6cf7dd44350a1b633a6dc85d33b29be40650754cb5ea1d25e5f02e5817e0b014d66437a7229761c516fe9685ea2b9047d22a74ee6fa6df378b25dd4700f6bf00"/215], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 09:36:51 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 875.884811] audit: type=1800 audit(1572773811.761:738): pid=12853 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="sda1" ino=17502 res=0 09:36:51 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:36:52 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:36:52 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x1a, &(0x7f00000005c0)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc70000000000000950009000000000095f899071d926e423e0b703a04904c021d9d981f0feff06911ab8ba5fd7beb01b4a248ae02e24e0c7f325ae6e7312dcfdbcd1780089dce06249d3bb1fe6f995c3119fbfbd50a6fd12b833ecca3bf0c80c5c8fbf333ef7e2378d9c7078bdc72b8d48d6cf7dd44350a1b633a6dc85d33b29be40650754cb5ea1d25e5f02e5817e0b014d66437a7229761c516fe9685ea2b9047d22a74ee6fa6df378b25dd4700f6bf00"/215], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) 09:36:52 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r3, @ANYBLOB="2000000000000000210004000b000100727391703600e6006c00e9cf59c17eb7176b8153f75cfbd1010005003c00010003000000ffffffff03000000010400400100000007007f0005000400fffffeff200107004000ffff0300000005000000ba3affff620b000014000300fe8000000248229f000000000037df000000000000000000000001ce6d59bfab0c9df615a13771e8f45e14683e2b12513c0a2f6ca0f24b4dd6bae5963256b9c278101348e6bf6bda76a052e6ddabfb8e7e5622dfb2ce1f2324e1d967e8920102c29300bd6f113177730d8b9b73becfcf802d89c2ca316574b0c21c114b3a5bd143c333c46891ae4d8c6eca9dfe29ede100d19b5b3e67c29a39e92ffb8a2298dd771057066e74ee7190e43c15bd7309c117f4c7e376f63b2a81e4c25850e56b25416263cbe7d806f095771bcfda5c37902229e7378deb15dee2ba273a189120d66ba783b2b53f26384e5b59864597a27444fd516793239bc2766d0b5a536c5cf67d81f1fa42d720a466a55f85fabf4fb16255d74c38d598"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:36:52 executing program 5: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) 09:36:52 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(0x0, 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c66736d616769633d3078303030303030303030303030303030302c736d61636b66737472616e736d7574653d2f73656c696e002c737d61636b6673646566fc6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e0592e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c29802c008c0000000000000000faa58b7692891653b11d7432701a2f82f06b18a20130d453c246286888c9c4241f20d61156ec82364f7c3bb3ead7b5fa581c1eaa3108ed05d20547e0a55db6c38213aa99eb678003aa97d23ab8ddd94473b98483844c3070c0b013df198fdf03e138773c5ef05b13c439df99c96322f13a063761f74fd0626717baab71906a9b3f5780c1152aa4585b17d19bf250b8bea7cfddcbd7acdf150b6ddfcbad20f5abcbeac782d9449101ef494c6213b33b3a4c2b9a762e9634"]) 09:36:52 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:36:52 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x1a, &(0x7f00000005c0)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc70000000000000950009000000000095f899071d926e423e0b703a04904c021d9d981f0feff06911ab8ba5fd7beb01b4a248ae02e24e0c7f325ae6e7312dcfdbcd1780089dce06249d3bb1fe6f995c3119fbfbd50a6fd12b833ecca3bf0c80c5c8fbf333ef7e2378d9c7078bdc72b8d48d6cf7dd44350a1b633a6dc85d33b29be40650754cb5ea1d25e5f02e5817e0b014d66437a7229761c516fe9685ea2b9047d22a74ee6fa6df378b25dd4700f6bf00"/215], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) 09:36:52 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:36:52 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x1a, &(0x7f00000005c0)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc70000000000000950009000000000095f899071d926e423e0b703a04904c021d9d981f0feff06911ab8ba5fd7beb01b4a248ae02e24e0c7f325ae6e7312dcfdbcd1780089dce06249d3bb1fe6f995c3119fbfbd50a6fd12b833ecca3bf0c80c5c8fbf333ef7e2378d9c7078bdc72b8d48d6cf7dd44350a1b633a6dc85d33b29be40650754cb5ea1d25e5f02e5817e0b014d66437a7229761c516fe9685ea2b9047d22a74ee6fa6df378b25dd4700f6bf00"/215], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) 09:36:52 executing program 5: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) 09:36:52 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c66736d616769633d3078303030303030303030303030303030302c736d61636b66737472616e736d7574653d2f73656c696e002c737d61636b6673646566fc6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e0592e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c29802c008c0000000000000000faa58b7692891653b11d7432701a2f82f06b18a20130d453c246286888c9c4241f20d61156ec82364f7c3bb3ead7b5fa581c1eaa3108ed05d20547e0a55db6c38213aa99eb678003aa97d23ab8ddd94473b98483844c3070c0b013df198fdf03e138773c5ef05b13c439df99c96322f13a063761f74fd0626717baab71906a9b3f5780c1152aa4585b17d19bf250b8bea7cfddcbd7acdf150b6ddfcbad20f5abcbeac782d9449101ef494c6213b33b3a4c2b9a762e9634"]) 09:36:52 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:36:52 executing program 5: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) 09:36:52 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x1a, &(0x7f00000005c0)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc70000000000000950009000000000095f899071d926e423e0b703a04904c021d9d981f0feff06911ab8ba5fd7beb01b4a248ae02e24e0c7f325ae6e7312dcfdbcd1780089dce06249d3bb1fe6f995c3119fbfbd50a6fd12b833ecca3bf0c80c5c8fbf333ef7e2378d9c7078bdc72b8d48d6cf7dd44350a1b633a6dc85d33b29be40650754cb5ea1d25e5f02e5817e0b014d66437a7229761c516fe9685ea2b9047d22a74ee6fa6df378b25dd4700f6bf00"/215], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) 09:36:52 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:36:52 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x4, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:36:52 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(0x0, 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c66736d616769633d3078303030303030303030303030303030302c736d61636b66737472616e736d7574653d2f73656c696e002c737d61636b6673646566fc6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e0592e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c29802c008c0000000000000000faa58b7692891653b11d7432701a2f82f06b18a20130d453c246286888c9c4241f20d61156ec82364f7c3bb3ead7b5fa581c1eaa3108ed05d20547e0a55db6c38213aa99eb678003aa97d23ab8ddd94473b98483844c3070c0b013df198fdf03e138773c5ef05b13c439df99c96322f13a063761f74fd0626717baab71906a9b3f5780c1152aa4585b17d19bf250b8bea7cfddcbd7acdf150b6ddfcbad20f5abcbeac782d9449101ef494c6213b33b3a4c2b9a762e9634"]) 09:36:52 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:36:52 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x1a, &(0x7f00000005c0)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc70000000000000950009000000000095f899071d926e423e0b703a04904c021d9d981f0feff06911ab8ba5fd7beb01b4a248ae02e24e0c7f325ae6e7312dcfdbcd1780089dce06249d3bb1fe6f995c3119fbfbd50a6fd12b833ecca3bf0c80c5c8fbf333ef7e2378d9c7078bdc72b8d48d6cf7dd44350a1b633a6dc85d33b29be40650754cb5ea1d25e5f02e5817e0b014d66437a7229761c516fe9685ea2b9047d22a74ee6fa6df378b25dd4700f6bf00"/215], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) 09:36:52 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:36:52 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x1a, &(0x7f00000005c0)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc70000000000000950009000000000095f899071d926e423e0b703a04904c021d9d981f0feff06911ab8ba5fd7beb01b4a248ae02e24e0c7f325ae6e7312dcfdbcd1780089dce06249d3bb1fe6f995c3119fbfbd50a6fd12b833ecca3bf0c80c5c8fbf333ef7e2378d9c7078bdc72b8d48d6cf7dd44350a1b633a6dc85d33b29be40650754cb5ea1d25e5f02e5817e0b014d66437a7229761c516fe9685ea2b9047d22a74ee6fa6df378b25dd4700f6bf00"/215], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) 09:36:52 executing program 5: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) 09:36:52 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:36:52 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000180)="2000000012005f0214f9f4070000fbe40a0000000000", 0x3e5) recvmsg(r0, &(0x7f0000002740)={0x0, 0x0, &(0x7f00000025c0)=[{&(0x7f0000002780)=""/4110, 0x100e}, {&(0x7f00000037c0)=""/4092, 0xffc}], 0x2}, 0x0) 09:36:52 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x4, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:36:52 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:36:53 executing program 0: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000540)={'syz_tun\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="240000002e00f700"/20, @ANYRES32=r1, @ANYBLOB="200500e4ffffffffffc599"], 0x24}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924924924923aa, 0x0) 09:36:53 executing program 5: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) 09:36:53 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:36:53 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c66736d616769633d3078303030303030303030303030303030302c736d61636b66737472616e736d7574653d2f73656c696e002c737d61636b6673646566fc6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e0592e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c29802c008c0000000000000000faa58b7692891653b11d7432701a2f82f06b18a20130d453c246286888c9c4241f20d61156ec82364f7c3bb3ead7b5fa581c1eaa3108ed05d20547e0a55db6c38213aa99eb678003aa97d23ab8ddd94473b98483844c3070c0b013df198fdf03e138773c5ef05b13c439df99c96322f13a063761f74fd0626717baab71906a9b3f5780c1152aa4585b17d19bf250b8bea7cfddcbd7acdf150b6ddfcbad20f5abcbeac782d9449101ef494c6213b33b3a4c2b9a762e9634"]) 09:36:53 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket$inet6(0xa, 0x80003, 0xff) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:36:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:36:53 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:36:53 executing program 5: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) [ 877.549422] kauditd_printk_skb: 9 callbacks suppressed [ 877.549431] audit: type=1804 audit(1572773813.421:748): pid=12996 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir283790537/syzkaller.VUSu0B/832/file0" dev="sda1" ino=16897 res=1 09:36:53 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:36:53 executing program 5: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) 09:36:53 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x4, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:36:53 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:36:53 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:36:53 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 877.746692] audit: type=1804 audit(1572773813.611:749): pid=13008 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir283790537/syzkaller.VUSu0B/833/file0" dev="sda1" ino=16851 res=1 09:36:53 executing program 5: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) 09:36:53 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) [ 877.854177] audit: type=1804 audit(1572773813.691:750): pid=13014 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir252868218/syzkaller.oX9zGl/851/file0" dev="sda1" ino=16945 res=1 09:36:53 executing program 1: r0 = socket(0x10, 0x80002, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r1, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:36:54 executing program 5: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) 09:36:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:36:54 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 878.109552] audit: type=1804 audit(1572773813.821:751): pid=13023 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir283790537/syzkaller.VUSu0B/834/file0" dev="sda1" ino=16756 res=1 09:36:54 executing program 1: r0 = socket(0x10, 0x80002, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r1, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:36:54 executing program 1: r0 = socket(0x10, 0x80002, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r1, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) [ 878.349617] audit: type=1804 audit(1572773814.081:752): pid=13042 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir252868218/syzkaller.oX9zGl/852/file0" dev="sda1" ino=17058 res=1 09:36:54 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {0x0, 0x0, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:36:54 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:36:54 executing program 1: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r1, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0xd3, 0x0) [ 878.618168] audit: type=1804 audit(1572773814.151:753): pid=13044 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir283790537/syzkaller.VUSu0B/835/file0" dev="sda1" ino=16993 res=1 09:36:54 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(0x0, 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:36:54 executing program 1: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r1, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0xd3, 0x0) 09:36:54 executing program 5: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) 09:36:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:36:54 executing program 1: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r1, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0xd3, 0x0) 09:36:54 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(0x0, 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 878.946768] audit: type=1804 audit(1572773814.781:754): pid=13088 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir283790537/syzkaller.VUSu0B/836/file0" dev="sda1" ino=17106 res=1 09:36:54 executing program 5: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) 09:36:54 executing program 1: r0 = socket(0x0, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:36:54 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {0x0, 0x0, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:36:55 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(0x0, 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:36:55 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c66736d616769633d3078303030303030303030303030303030302c736d61636b66737472616e736d7574653d2f73656c696e002c737d61636b6673646566fc6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e0592e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c29802c008c0000000000000000faa58b7692891653b11d7432701a2f82f06b18a20130d453c246286888c9c4241f20d61156ec82364f7c3bb3ead7b5fa581c1eaa3108ed05d20547e0a55db6c38213aa99eb678003aa97d23ab8ddd94473b98483844c3070c0b013df198fdf03e138773c5ef05b13c439df99c96322f13a063761f74fd0626717baab71906a9b3f5780c1152aa4585b17d19bf250b8bea7cfddcbd7acdf150b6ddfcbad20f5abcbeac782d9449101ef494c6213b33b3a4c2b9a762e9634"]) 09:36:55 executing program 1: r0 = socket(0x0, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) [ 879.150928] audit: type=1804 audit(1572773815.031:755): pid=13111 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir283790537/syzkaller.VUSu0B/837/file0" dev="sda1" ino=16897 res=1 09:36:55 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:36:55 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:36:55 executing program 1: r0 = socket(0x0, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) [ 879.449123] audit: type=1804 audit(1572773815.321:756): pid=13131 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir252868218/syzkaller.oX9zGl/856/file0" dev="sda1" ino=17185 res=1 09:36:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:36:55 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c66736d616769633d3078303030303030303030303030303030302c736d61636b66737472616e736d7574653d2f73656c696e002c737d61636b6673646566fc6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e0592e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c29802c008c0000000000000000faa58b7692891653b11d7432701a2f82f06b18a20130d453c246286888c9c4241f20d61156ec82364f7c3bb3ead7b5fa581c1eaa3108ed05d20547e0a55db6c38213aa99eb678003aa97d23ab8ddd94473b98483844c3070c0b013df198fdf03e138773c5ef05b13c439df99c96322f13a063761f74fd0626717baab71906a9b3f5780c1152aa4585b17d19bf250b8bea7cfddcbd7acdf150b6ddfcbad20f5abcbeac782d9449101ef494c6213b33b3a4c2b9a762e9634"]) 09:36:55 executing program 5: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x8800000) 09:36:55 executing program 1: r0 = socket(0x10, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:36:55 executing program 1: r0 = socket(0x10, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) [ 879.631738] audit: type=1804 audit(1572773815.511:757): pid=13148 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir252868218/syzkaller.oX9zGl/857/file0" dev="sda1" ino=17073 res=1 09:36:55 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {0x0, 0x0, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c66736d616769633d3078303030303030303030303030303030302c736d61636b66737472616e736d7574653d2f73656c696e002c737d61636b6673646566fc6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e0592e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c29802c008c0000000000000000faa58b7692891653b11d7432701a2f82f06b18a20130d453c246286888c9c4241f20d61156ec82364f7c3bb3ead7b5fa581c1eaa3108ed05d20547e0a55db6c38213aa99eb678003aa97d23ab8ddd94473b98483844c3070c0b013df198fdf03e138773c5ef05b13c439df99c96322f13a063761f74fd0626717baab71906a9b3f5780c1152aa4585b17d19bf250b8bea7cfddcbd7acdf150b6ddfcbad20f5abcbeac782d9449101ef494c6213b33b3a4c2b9a762e9634"]) 09:36:55 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c66736d616769633d3078303030303030303030303030303030302c736d61636b66737472616e736d7574653d2f73656c696e002c737d61636b6673646566fc6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e0592e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c29802c008c0000000000000000faa58b7692891653b11d7432701a2f82f06b18a20130d453c246286888c9c4241f20d61156ec82364f7c3bb3ead7b5fa581c1eaa3108ed05d20547e0a55db6c38213aa99eb678003aa97d23ab8ddd94473b98483844c3070c0b013df198fdf03e138773c5ef05b13c439df99c96322f13a063761f74fd0626717baab71906a9b3f5780c1152aa4585b17d19bf250b8bea7cfddcbd7acdf150b6ddfcbad20f5abcbeac782d9449101ef494c6213b33b3a4c2b9a762e9634"]) 09:36:55 executing program 5: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x8800000) 09:36:55 executing program 1: r0 = socket(0x10, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:36:55 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:36:55 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:36:55 executing program 5: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x8800000) 09:36:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:36:56 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(0x0, 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:36:56 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x0, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:36:56 executing program 5: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8800000) 09:36:56 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:36:56 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840), 0x0, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:36:56 executing program 5: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8800000) 09:36:56 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(0x0, 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:36:56 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x0, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:36:56 executing program 5: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8800000) 09:36:56 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x0, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:36:56 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(0x0, 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:36:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:36:56 executing program 5: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x0) 09:36:56 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:36:56 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:36:56 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:36:56 executing program 5: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x0) 09:36:56 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:36:56 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c66736d616769633d3078303030303030303030303030303030302c736d61636b66737472616e736d7574653d2f73656c696e002c737d61636b6673646566fc6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e0592e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c29802c008c0000000000000000faa58b7692891653b11d7432701a2f82f06b18a20130d453c246286888c9c4241f20d61156ec82364f7c3bb3ead7b5fa581c1eaa3108ed05d20547e0a55db6c38213aa99eb678003aa97d23ab8ddd94473b98483844c3070c0b013df198fdf03e138773c5ef05b13c439df99c96322f13a063761f74fd0626717baab71906a9b3f5780c1152aa4585b17d19bf250b8bea7cfddcbd7acdf150b6ddfcbad20f5abcbeac782d9449101ef494c6213b33b3a4c2b9a762e9634"]) 09:36:56 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840), 0x0, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:36:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:36:56 executing program 5: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x0) 09:36:57 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:36:57 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:36:57 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c66736d616769633d3078303030303030303030303030303030302c736d61636b66737472616e736d7574653d2f73656c696e002c737d61636b6673646566fc6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e0592e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c29802c008c0000000000000000faa58b7692891653b11d7432701a2f82f06b18a20130d453c246286888c9c4241f20d61156ec82364f7c3bb3ead7b5fa581c1eaa3108ed05d20547e0a55db6c38213aa99eb678003aa97d23ab8ddd94473b98483844c3070c0b013df198fdf03e138773c5ef05b13c439df99c96322f13a063761f74fd0626717baab71906a9b3f5780c1152aa4585b17d19bf250b8bea7cfddcbd7acdf150b6ddfcbad20f5abcbeac782d9449101ef494c6213b33b3a4c2b9a762e9634"]) 09:36:57 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:36:57 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, r0, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:36:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:36:57 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="2000000000000000210004000b000100727391703600e6006c00e9cf59c17eb7176b8153f75cfbd1010005003c00010003000000ffffffff03000000010400400100000007007f0005000400fffffeff200107004000ffff0300000005000000ba3affff620b000014000300fe8000000248229f000000000037df000000000000000000000001ce6d59bfab0c9df615a13771e8f45e14683e2b12513c0a2f6ca0f24b4dd6bae5963256b9c278101348e6bf6bda76a052e6ddabfb8e7e5622dfb2ce1f2324e1d967e8920102c29300bd6f113177730d8b9b73becfcf802d89c2ca316574b0c21c114b3a5bd143c333c46891ae4d8c6eca9dfe29ede100d19b5b3e67c29a39e92ffb8a2298dd771057066e74ee7190e43c15bd7309c117f4c7e376f63b2a81e4c25850e56b25416263cbe7d806f095771bcfda5c37902229e7378deb15dee2ba273a189120d66ba783b2b53f26384e5b59864597a27444fd516793239bc2766d0b5a536c5cf67d81f1fa42d720a466a55f85fabf4fb16255d74c38d598"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:36:57 executing program 5: 09:36:57 executing program 5: 09:36:57 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840), 0x0, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:36:57 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:36:57 executing program 5: 09:36:57 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c66736d616769633d3078303030303030303030303030303030302c736d61636b66737472616e736d7574653d2f73656c696e002c737d61636b6673646566fc6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e0592e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c29802c008c0000000000000000faa58b7692891653b11d7432701a2f82f06b18a20130d453c246286888c9c4241f20d61156ec82364f7c3bb3ead7b5fa581c1eaa3108ed05d20547e0a55db6c38213aa99eb678003aa97d23ab8ddd94473b98483844c3070c0b013df198fdf03e138773c5ef05b13c439df99c96322f13a063761f74fd0626717baab71906a9b3f5780c1152aa4585b17d19bf250b8bea7cfddcbd7acdf150b6ddfcbad20f5abcbeac782d9449101ef494c6213b33b3a4c2b9a762e9634"]) 09:36:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:36:57 executing program 5: 09:36:57 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, r0, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c66736d616769633d3078303030303030303030303030303030302c736d61636b66737472616e736d7574653d2f73656c696e002c737d61636b6673646566fc6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e0592e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c29802c008c0000000000000000faa58b7692891653b11d7432701a2f82f06b18a20130d453c246286888c9c4241f20d61156ec82364f7c3bb3ead7b5fa581c1eaa3108ed05d20547e0a55db6c38213aa99eb678003aa97d23ab8ddd94473b98483844c3070c0b013df198fdf03e138773c5ef05b13c439df99c96322f13a063761f74fd0626717baab71906a9b3f5780c1152aa4585b17d19bf250b8bea7cfddcbd7acdf150b6ddfcbad20f5abcbeac782d9449101ef494c6213b33b3a4c2b9a762e9634"]) 09:36:57 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:36:57 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce39", 0x5, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:36:57 executing program 5: 09:36:57 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:36:58 executing program 5: 09:36:58 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:36:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:36:58 executing program 5: 09:36:58 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:36:58 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:36:58 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, r0, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c66736d616769633d3078303030303030303030303030303030302c736d61636b66737472616e736d7574653d2f73656c696e002c737d61636b6673646566fc6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e0592e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c29802c008c0000000000000000faa58b7692891653b11d7432701a2f82f06b18a20130d453c246286888c9c4241f20d61156ec82364f7c3bb3ead7b5fa581c1eaa3108ed05d20547e0a55db6c38213aa99eb678003aa97d23ab8ddd94473b98483844c3070c0b013df198fdf03e138773c5ef05b13c439df99c96322f13a063761f74fd0626717baab71906a9b3f5780c1152aa4585b17d19bf250b8bea7cfddcbd7acdf150b6ddfcbad20f5abcbeac782d9449101ef494c6213b33b3a4c2b9a762e9634"]) 09:36:58 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x7) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r1, r0) 09:36:58 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:36:58 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce39", 0x5, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:36:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:36:58 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x7) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r1, r0) 09:36:58 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="2000000000000000210004000b000100727391703600e6006c00e9cf59c17eb7176b8153f75cfbd1010005003c00010003000000ffffffff03000000010400400100000007007f0005000400fffffeff200107004000ffff0300000005000000ba3affff620b000014000300fe8000000248229f000000000037df000000000000000000000001ce6d59bfab0c9df615a13771e8f45e14683e2b12513c0a2f6ca0f24b4dd6bae5963256b9c278101348e6bf6bda76a052e6ddabfb8e7e5622dfb2ce1f2324e1d967e8920102c29300bd6f113177730d8b9b73becfcf802d89c2ca316574b0c21c114b3a5bd143c333c46891ae4d8c6eca9dfe29ede100d19b5b3e67c29a39e92ffb8a2298dd771057066e74ee7190e43c15bd7309c117f4c7e376f63b2a81e4c25850e56b25416263cbe7d806f095771bcfda5c37902229e7378deb15dee2ba273a189120d66ba783b2b53f26384e5b59864597a27444fd516793239bc2766d0b5a536c5cf67d81f1fa42d720a466a55f85fabf4fb16255d74c38d598"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:36:58 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:36:58 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x7) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r1, r0) 09:36:58 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:36:58 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x7) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r1, r0) 09:36:58 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:36:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:36:59 executing program 5: socket$can_bcm(0x1d, 0x2, 0x7) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 09:36:59 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:36:59 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce39", 0x5, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:36:59 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:36:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:36:59 executing program 5: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 09:36:59 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="2000000000000000210004000b000100727391703600e6006c00e9cf59c17eb7176b8153f75cfbd1010005003c00010003000000ffffffff03000000010400400100000007007f0005000400fffffeff200107004000ffff0300000005000000ba3affff620b000014000300fe8000000248229f000000000037df000000000000000000000001ce6d59bfab0c9df615a13771e8f45e14683e2b12513c0a2f6ca0f24b4dd6bae5963256b9c278101348e6bf6bda76a052e6ddabfb8e7e5622dfb2ce1f2324e1d967e8920102c29300bd6f113177730d8b9b73becfcf802d89c2ca316574b0c21c114b3a5bd143c333c46891ae4d8c6eca9dfe29ede100d19b5b3e67c29a39e92ffb8a2298dd771057066e74ee7190e43c15bd7309c117f4c7e376f63b2a81e4c25850e56b25416263cbe7d806f095771bcfda5c37902229e7378deb15dee2ba273a189120d66ba783b2b53f26384e5b59864597a27444fd516793239bc2766d0b5a536c5cf67d81f1fa42d720a466a55f85fabf4fb16255d74c38d598"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:36:59 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:36:59 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$sock_int(r0, 0x1, 0x3d, &(0x7f0000000600), 0x4) 09:36:59 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, 0x0, &(0x7f0000000140)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:36:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:36:59 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x7) write$P9_RREAD(r0, 0x0, 0x0) 09:36:59 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, 0x0, &(0x7f0000000140)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:36:59 executing program 5: r0 = socket(0x2, 0x3, 0x100000001) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x32) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @broadcast}, @icmp=@address_reply={0x4788}}}}}, 0x0) 09:36:59 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932", 0x8, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:36:59 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:36:59 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, 0x0, &(0x7f0000000140)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:36:59 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:36:59 executing program 5: r0 = socket(0x2, 0x3, 0x100000001) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x32) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @broadcast}, @icmp=@address_reply={0x4788}}}}}, 0x0) 09:36:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:00 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="2000000000000000210004000b000100727391703600e6006c00e9cf59c17eb7176b8153f75cfbd1010005003c00010003000000ffffffff03000000010400400100000007007f0005000400fffffeff200107004000ffff0300000005000000ba3affff620b000014000300fe8000000248229f000000000037df000000000000000000000001ce6d59bfab0c9df615a13771e8f45e14683e2b12513c0a2f6ca0f24b4dd6bae5963256b9c278101348e6bf6bda76a052e6ddabfb8e7e5622dfb2ce1f2324e1d967e8920102c29300bd6f113177730d8b9b73becfcf802d89c2ca316574b0c21c114b3a5bd143c333c46891ae4d8c6eca9dfe29ede100d19b5b3e67c29a39e92ffb8a2298dd771057066e74ee7190e43c15bd7309c117f4c7e376f63b2a81e4c25850e56b25416263cbe7d806f095771bcfda5c37902229e7378deb15dee2ba273a189120d66ba783b2b53f26384e5b59864597a27444fd516793239bc2766d0b5a536c5cf67d81f1fa42d720a466a55f85fabf4fb16255d74c38d598"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:00 executing program 5: r0 = socket(0x2, 0x3, 0x100000001) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x32) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @broadcast}, @icmp=@address_reply={0x4788}}}}}, 0x0) 09:37:00 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:00 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:00 executing program 5: r0 = socket(0x2, 0x3, 0x100000001) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x32) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @broadcast}, @icmp=@address_reply={0x4788}}}}}, 0x0) 09:37:00 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:00 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="2000000000000000210004000b000100727391703600e6006c00e9cf59c17eb7176b8153f75cfbd1010005003c00010003000000ffffffff03000000010400400100000007007f0005000400fffffeff200107004000ffff0300000005000000ba3affff620b000014000300fe8000000248229f000000000037df000000000000000000000001ce6d59bfab0c9df615a13771e8f45e14683e2b12513c0a2f6ca0f24b4dd6bae5963256b9c278101348e6bf6bda76a052e6ddabfb8e7e5622dfb2ce1f2324e1d967e8920102c29300bd6f113177730d8b9b73becfcf802d89c2ca316574b0c21c114b3a5bd143c333c46891ae4d8c6eca9dfe29ede100d19b5b3e67c29a39e92ffb8a2298dd771057066e74ee7190e43c15bd7309c117f4c7e376f63b2a81e4c25850e56b25416263cbe7d806f095771bcfda5c37902229e7378deb15dee2ba273a189120d66ba783b2b53f26384e5b59864597a27444fd516793239bc2766d0b5a536c5cf67d81f1fa42d720a466a55f85fabf4fb16255d74c38d598"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:00 executing program 5: r0 = socket(0x2, 0x3, 0x100000001) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @broadcast}, @icmp=@address_reply={0x4788}}}}}, 0x0) 09:37:00 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932", 0x8, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:00 executing program 5: socket(0x2, 0x3, 0x100000001) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @broadcast}, @icmp=@address_reply={0x4788}}}}}, 0x0) 09:37:00 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:00 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:00 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @broadcast}, @icmp=@address_reply={0x4788}}}}}, 0x0) 09:37:00 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:01 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:01 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:01 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) 09:37:01 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:01 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932", 0x8, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:01 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) 09:37:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:01 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:01 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) 09:37:01 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:01 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:01 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @broadcast}, @icmp=@address_reply={0x4788}}}}}, 0x0) 09:37:01 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:01 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:01 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) r1 = syz_open_procfs(0x0, 0x0) r2 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r2, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000300)) r3 = syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) sendmsg$TIPC_NL_MEDIA_GET(r3, &(0x7f00000009c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000980)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000340)={@remote, @multicast2}, &(0x7f0000000380)=0xc) 09:37:02 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db", 0x9, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:02 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:02 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:02 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) r1 = syz_open_procfs(0x0, 0x0) r2 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r2, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000300)) r3 = syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) sendmsg$TIPC_NL_MEDIA_GET(r3, &(0x7f00000009c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000980)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000340)={@remote, @multicast2}, &(0x7f0000000380)=0xc) 09:37:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:02 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(0x0, 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:02 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:02 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:02 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2], 0x2}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:02 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) r1 = syz_open_procfs(0x0, 0x0) r2 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r2, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000300)) r3 = syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) sendmsg$TIPC_NL_MEDIA_GET(r3, &(0x7f00000009c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000980)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000340)={@remote, @multicast2}, &(0x7f0000000380)=0xc) 09:37:02 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(0x0, 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c66736d616769633d3078303030303030303030303030303030302c736d61636b66737472616e736d7574653d2f73656c696e002c737d61636b6673646566fc6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e0592e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c29802c008c0000000000000000faa58b7692891653b11d7432701a2f82f06b18a20130d453c246286888c9c4241f20d61156ec82364f7c3bb3ead7b5fa581c1eaa3108ed05d20547e0a55db6c38213aa99eb678003aa97d23ab8ddd94473b98483844c3070c0b013df198fdf03e138773c5ef05b13c439df99c96322f13a063761f74fd0626717baab71906a9b3f5780c1152aa4585b17d19bf250b8bea7cfddcbd7acdf150b6ddfcbad20f5abcbeac782d9449101ef494c6213b33b3a4c2b9a762e9634"]) 09:37:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:02 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:02 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2], 0x2}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:02 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(0x0, 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c66736d616769633d3078303030303030303030303030303030302c736d61636b66737472616e736d7574653d2f73656c696e002c737d61636b6673646566fc6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e0592e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c29802c008c0000000000000000faa58b7692891653b11d7432701a2f82f06b18a20130d453c246286888c9c4241f20d61156ec82364f7c3bb3ead7b5fa581c1eaa3108ed05d20547e0a55db6c38213aa99eb678003aa97d23ab8ddd94473b98483844c3070c0b013df198fdf03e138773c5ef05b13c439df99c96322f13a063761f74fd0626717baab71906a9b3f5780c1152aa4585b17d19bf250b8bea7cfddcbd7acdf150b6ddfcbad20f5abcbeac782d9449101ef494c6213b33b3a4c2b9a762e9634"]) 09:37:02 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) r1 = syz_open_procfs(0x0, 0x0) r2 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r2, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000300)) r3 = syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) sendmsg$TIPC_NL_MEDIA_GET(r3, &(0x7f00000009c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000980)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000340)={@remote, @multicast2}, &(0x7f0000000380)=0xc) 09:37:02 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db", 0x9, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:02 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:02 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:02 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2], 0x2}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:02 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) r1 = syz_open_procfs(0x0, 0x0) r2 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r2, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000300)) r3 = syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) sendmsg$TIPC_NL_MEDIA_GET(r3, &(0x7f00000009c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000980)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x0) 09:37:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:02 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:02 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:02 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:03 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c66736d616769633d3078303030303030303030303030303030302c736d61636b66737472616e736d7574653d2f73656c696e002c737d61636b6673646566fc6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e0592e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c29802c008c0000000000000000faa58b7692891653b11d7432701a2f82f06b18a20130d453c246286888c9c4241f20d61156ec82364f7c3bb3ead7b5fa581c1eaa3108ed05d20547e0a55db6c38213aa99eb678003aa97d23ab8ddd94473b98483844c3070c0b013df198fdf03e138773c5ef05b13c439df99c96322f13a063761f74fd0626717baab71906a9b3f5780c1152aa4585b17d19bf250b8bea7cfddcbd7acdf150b6ddfcbad20f5abcbeac782d9449101ef494c6213b33b3a4c2b9a762e9634"]) 09:37:03 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:03 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) r1 = syz_open_procfs(0x0, 0x0) r2 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r2, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000300)) r3 = syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) sendmsg$TIPC_NL_MEDIA_GET(r3, &(0x7f00000009c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000980)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x0) 09:37:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:03 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db", 0x9, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:03 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:03 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:03 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c66736d616769633d3078303030303030303030303030303030302c736d61636b66737472616e736d7574653d2f73656c696e002c737d61636b6673646566fc6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e0592e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c29802c008c0000000000000000faa58b7692891653b11d7432701a2f82f06b18a20130d453c246286888c9c4241f20d61156ec82364f7c3bb3ead7b5fa581c1eaa3108ed05d20547e0a55db6c38213aa99eb678003aa97d23ab8ddd94473b98483844c3070c0b013df198fdf03e138773c5ef05b13c439df99c96322f13a063761f74fd0626717baab71906a9b3f5780c1152aa4585b17d19bf250b8bea7cfddcbd7acdf150b6ddfcbad20f5abcbeac782d9449101ef494c6213b33b3a4c2b9a762e9634"]) 09:37:03 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) r1 = syz_open_procfs(0x0, 0x0) r2 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r2, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:03 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="2000000000000000210004000b000100727391703600e6006c00e9cf59c17eb7176b8153f75cfbd1010005003c00010003000000ffffffff03000000010400400100000007007f0005000400fffffeff200107004000ffff0300000005000000ba3affff620b000014000300fe8000000248229f000000000037df000000000000000000000001ce6d59bfab0c9df615a13771e8f45e14683e2b12513c0a2f6ca0f24b4dd6bae5963256b9c278101348e6bf6bda76a052e6ddabfb8e7e5622dfb2ce"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:03 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:03 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:03 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="2000000000000000210004000b000100727391703600e6006c00e9cf59c17eb7176b8153f75cfbd1010005003c00010003000000ffffffff03000000010400400100000007007f0005000400fffffeff200107004000ffff0300000005000000ba3affff620b000014000300fe8000000248229f000000000037df000000000000000000000001ce6d59bfab0c9df615a13771e8f45e14683e2b12513c0a2f6ca0f24b4dd6bae5963256b9c278101348e6bf6bda76a052e6ddabfb8e7e5622dfb2ce"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:03 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) r1 = syz_open_procfs(0x0, 0x0) r2 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r2, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:03 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="2000000000000000210004000b000100727391703600e6006c00e9cf59c17eb7176b8153f75cfbd1010005003c00010003000000ffffffff03000000010400400100000007007f0005000400fffffeff200107004000ffff0300000005000000ba3affff620b000014000300fe8000000248229f000000000037df000000000000000000000001ce6d59bfab0c9df615a13771e8f45e14683e2b12513c0a2f6ca0f24b4dd6bae5963256b9c278101348e6bf6bda76a052e6ddabfb8e7e5622dfb2ce"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:03 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c66736d616769633d3078303030303030303030303030303030302c736d61636b66737472616e736d7574653d2f73656c696e002c737d61636b6673646566fc6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e0592e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c29802c008c0000000000000000faa58b7692891653b11d7432701a2f82f06b18a20130d453c246286888c9c4241f20d61156ec82364f7c3bb3ead7b5fa581c1eaa3108ed05d20547e0a55db6c38213aa99eb678003aa97d23ab8ddd94473b98483844c3070c0b013df198fdf03e138773c5ef05b13c439df99c96322f13a063761f74fd0626717baab71906a9b3f5780c1152aa4585b17d19bf250b8bea7cfddcbd7acdf150b6ddfcbad20f5abcbeac782d9449101ef494c6213b33b3a4c2b9a762e9634"]) 09:37:03 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:03 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:03 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:03 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) r1 = syz_open_procfs(0x0, 0x0) r2 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r2, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000300)) 09:37:03 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:03 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:03 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:03 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:04 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) r1 = syz_open_procfs(0x0, 0x0) r2 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r2, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000300)) 09:37:04 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="2000000000000000210004000b000100727391703600e6006c00e9cf59c17eb7176b8153f75cfbd1010005003c00010003000000ffffffff03000000010400400100000007007f0005000400fffffeff200107004000ffff0300000005000000ba3affff620b000014000300fe8000000248229f000000000037df000000000000000000000001ce6d59bfab0c9df615a13771e8f45e14683e2b12513c0a2f6ca0f24b4dd6bae5963256b9c278101348e6bf6bda76a052e6ddabfb8e7e5622dfb2ce1f2324e1d967e8920102c29300bd6f113177730d8b9b73becfcf802d89c2ca316574b0c21c114b3a5bd143c333c46891ae4d8c6eca9dfe29ede100d19b5b3e67c29a39e92ffb8a2298dd771057066e74ee7190e43c15bd7309c117f4c7e376f63b2a81e4c25850e56b25416263cbe7d806f095771bcfda5c37902229e7378deb15dee2ba273a189120d66ba783b2b53f26"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:04 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:04 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c66736d616769633d3078303030303030303030303030303030302c736d61636b66737472616e736d7574653d2f73656c696e002c737d61636b6673646566fc6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e0592e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c29802c008c0000000000000000faa58b7692891653b11d7432701a2f82f06b18a20130d453c246286888c9c4241f20d61156ec82364f7c3bb3ead7b5fa581c1eaa3108ed05d20547e0a55db6c38213aa99eb678003aa97d23ab8ddd94473b98483844c3070c0b013df198fdf03e138773c5ef05b13c439df99c96322f13a063761f74fd0626717baab71906a9b3f5780c1152aa4585b17d19bf250b8bea7cfddcbd7acdf150b6ddfcbad20f5abcbeac782d9449101ef494c6213b33b3a4c2b9a762e9634"]) 09:37:04 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:04 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:04 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) r1 = syz_open_procfs(0x0, 0x0) r2 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r2, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000300)) 09:37:04 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c66736d616769633d3078303030303030303030303030303030302c736d61636b66737472616e736d7574653d2f73656c696e002c737d61636b6673646566fc6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e0592e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c29802c008c0000000000000000faa58b7692891653b11d7432701a2f82f06b18a20130d453c246286888c9c4241f20d61156ec82364f7c3bb3ead7b5fa581c1eaa3108ed05d20547e0a55db6c38213aa99eb678003aa97d23ab8ddd94473b98483844c3070c0b013df198fdf03e138773c5ef05b13c439df99c96322f13a063761f74fd0626717baab71906a9b3f5780c1152aa4585b17d19bf250b8bea7cfddcbd7acdf150b6ddfcbad20f5abcbeac782d9449101ef494c6213b33b3a4c2b9a762e9634"]) 09:37:04 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:04 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:04 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:04 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:04 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:04 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:04 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:04 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:04 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:04 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:04 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:04 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:04 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:04 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:05 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:05 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x4, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:05 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:05 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:05 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:05 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:05 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) r1 = syz_open_procfs(0x0, 0x0) r2 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r2, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:05 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:05 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) r1 = syz_open_procfs(0x0, 0x0) r2 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r2, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:05 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:05 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:05 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x4, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:05 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) r1 = syz_open_procfs(0x0, 0x0) r2 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r2, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:05 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:05 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:05 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:05 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) r1 = syz_open_procfs(0x0, 0x0) r2 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r2, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:05 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:05 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:06 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:06 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:06 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="2000000000000000210004000b000100727391703600e6006c00e9cf59c17eb7176b8153f75cfbd1010005003c00010003000000ffffffff03000000010400400100000007007f0005000400fffffeff200107004000ffff0300000005000000ba3affff620b000014000300fe8000000248229f000000000037df000000000000000000000001ce6d59bfab0c9df615a13771e8f45e14683e2b12513c0a2f6ca0f24b4dd6bae5963256b9c278101348e6bf6bda76a052e6ddabfb8e7e5622dfb2ce1f2324e1d967e8920102c29300bd6f113177730d8b9b73becfcf802d89c2ca316574b0c21c114b3a5bd143c333c46891ae4d8c6eca9dfe29ede100d19b5b3e67c29a39e92ffb8a2298dd771057066e74ee7190e43c15bd7309c117f4c7e376f63b2a81e4c25850e56b25416263cbe7d806f095771bcfda5c37902229e7378deb15dee2ba273a189120d66ba783b2b53f26384e5b59864597a27444fd516793239bc2766d0b5a536c5cf67d81f1fa42d720a466a55f85fabf4fb16255d74c"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:06 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x4, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:06 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:06 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:06 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) r1 = syz_open_procfs(0x0, 0x0) r2 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r2, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:06 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:06 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:06 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c66736d616769633d3078303030303030303030303030303030302c736d61636b66737472616e736d7574653d2f73656c696e002c737d61636b6673646566fc6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e0592e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c29802c008c0000000000000000faa58b7692891653b11d7432701a2f82f06b18a20130d453c246286888c9c4241f20d61156ec82364f7c3bb3ead7b5fa581c1eaa3108ed05d20547e0a55db6c38213aa99eb678003aa97d23ab8ddd94473b98483844c3070c0b013df198fdf03e138773c5ef05b13c439df99c96322f13a063761f74fd0626717baab71906a9b3f5780c1152aa4585b17d19bf250b8bea7cfddcbd7acdf150b6ddfcbad20f5abcbeac782d9449101ef494c6213b33b3a4c2b9a762e9634"]) 09:37:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:06 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:06 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:06 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) r1 = syz_open_procfs(0x0, 0x0) r2 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r2, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:06 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:06 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:06 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:06 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c66736d616769633d3078303030303030303030303030303030302c736d61636b66737472616e736d7574653d2f73656c696e002c737d61636b6673646566fc6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e0592e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c29802c008c0000000000000000faa58b7692891653b11d7432701a2f82f06b18a20130d453c246286888c9c4241f20d61156ec82364f7c3bb3ead7b5fa581c1eaa3108ed05d20547e0a55db6c38213aa99eb678003aa97d23ab8ddd94473b98483844c3070c0b013df198fdf03e138773c5ef05b13c439df99c96322f13a063761f74fd0626717baab71906a9b3f5780c1152aa4585b17d19bf250b8bea7cfddcbd7acdf150b6ddfcbad20f5abcbeac782d9449101ef494c6213b33b3a4c2b9a762e9634"]) 09:37:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:07 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) r1 = syz_open_procfs(0x0, 0x0) r2 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r2, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:07 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:07 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYBLOB="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"], 0x2}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:07 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:07 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) r1 = syz_open_procfs(0x0, 0x0) r2 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r2, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:07 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:07 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYBLOB="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"], 0x2}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:07 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:07 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYBLOB="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"], 0x2}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:07 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c66736d616769633d3078303030303030303030303030303030302c736d61636b66737472616e736d7574653d2f73656c696e002c737d61636b6673646566fc6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e0592e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c29802c008c0000000000000000faa58b7692891653b11d7432701a2f82f06b18a20130d453c246286888c9c4241f20d61156ec82364f7c3bb3ead7b5fa581c1eaa3108ed05d20547e0a55db6c38213aa99eb678003aa97d23ab8ddd94473b98483844c3070c0b013df198fdf03e138773c5ef05b13c439df99c96322f13a063761f74fd0626717baab71906a9b3f5780c1152aa4585b17d19bf250b8bea7cfddcbd7acdf150b6ddfcbad20f5abcbeac782d9449101ef494c6213b33b3a4c2b9a762e9634"]) 09:37:07 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) r1 = syz_open_procfs(0x0, 0x0) r2 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r2, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:07 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:07 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:07 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c66736d616769633d3078303030303030303030303030303030302c736d61636b66737472616e736d7574653d2f73656c696e002c737d61636b6673646566fc6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e0592e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c29802c008c0000000000000000faa58b7692891653b11d7432701a2f82f06b18a20130d453c246286888c9c4241f20d61156ec82364f7c3bb3ead7b5fa581c1eaa3108ed05d20547e0a55db6c38213aa99eb678003aa97d23ab8ddd94473b98483844c3070c0b013df198fdf03e138773c5ef05b13c439df99c96322f13a063761f74fd0626717baab71906a9b3f5780c1152aa4585b17d19bf250b8bea7cfddcbd7acdf150b6ddfcbad20f5abcbeac782d9449101ef494c6213b33b3a4c2b9a762e9634"]) 09:37:07 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) r1 = syz_open_procfs(0x0, 0x0) r2 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r2, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:07 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:07 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:08 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) r1 = syz_open_procfs(0x0, 0x0) r2 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r2, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:08 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:08 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c66736d616769633d3078303030303030303030303030303030302c736d61636b66737472616e736d7574653d2f73656c696e002c737d61636b6673646566fc6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e0592e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c29802c008c0000000000000000faa58b7692891653b11d7432701a2f82f06b18a20130d453c246286888c9c4241f20d61156ec82364f7c3bb3ead7b5fa581c1eaa3108ed05d20547e0a55db6c38213aa99eb678003aa97d23ab8ddd94473b98483844c3070c0b013df198fdf03e138773c5ef05b13c439df99c96322f13a063761f74fd0626717baab71906a9b3f5780c1152aa4585b17d19bf250b8bea7cfddcbd7acdf150b6ddfcbad20f5abcbeac782d9449101ef494c6213b33b3a4c2b9a762e9634"]) 09:37:08 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:08 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:08 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c66736d616769633d3078303030303030303030303030303030302c736d61636b66737472616e736d7574653d2f73656c696e002c737d61636b6673646566fc6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e0592e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c29802c008c0000000000000000faa58b7692891653b11d7432701a2f82f06b18a20130d453c246286888c9c4241f20d61156ec82364f7c3bb3ead7b5fa581c1eaa3108ed05d20547e0a55db6c38213aa99eb678003aa97d23ab8ddd94473b98483844c3070c0b013df198fdf03e138773c5ef05b13c439df99c96322f13a063761f74fd0626717baab71906a9b3f5780c1152aa4585b17d19bf250b8bea7cfddcbd7acdf150b6ddfcbad20f5abcbeac782d9449101ef494c6213b33b3a4c2b9a762e9634"]) 09:37:08 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) r1 = syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:08 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:08 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c66736d616769633d3078303030303030303030303030303030302c736d61636b66737472616e736d7574653d2f73656c696e002c737d61636b6673646566fc6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e0592e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c29802c008c0000000000000000faa58b7692891653b11d7432701a2f82f06b18a20130d453c246286888c9c4241f20d61156ec82364f7c3bb3ead7b5fa581c1eaa3108ed05d20547e0a55db6c38213aa99eb678003aa97d23ab8ddd94473b98483844c3070c0b013df198fdf03e138773c5ef05b13c439df99c96322f13a063761f74fd0626717baab71906a9b3f5780c1152aa4585b17d19bf250b8bea7cfddcbd7acdf150b6ddfcbad20f5abcbeac782d9449101ef494c6213b33b3a4c2b9a762e9634"]) 09:37:08 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x4, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:08 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) r1 = syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:08 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYRES32=r2, @ANYBLOB="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"], 0x2}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:08 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:08 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) r1 = syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:08 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYRES32=r2, @ANYBLOB="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"], 0x2}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:08 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x4, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:08 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:08 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(0xffffffffffffffff, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:08 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', 0x0, 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:08 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYRES32=r2, @ANYBLOB="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"], 0x2}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:08 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:08 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(0xffffffffffffffff, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:09 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:09 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:09 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(0xffffffffffffffff, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:09 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:09 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x4, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c66736d616769633d3078303030303030303030303030303030302c736d61636b66737472616e736d7574653d2f73656c696e002c737d61636b6673646566fc6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e0592e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c29802c008c0000000000000000faa58b7692891653b11d7432701a2f82f06b18a20130d453c246286888c9c4241f20d61156ec82364f7c3bb3ead7b5fa581c1eaa3108ed05d20547e0a55db6c38213aa99eb678003aa97d23ab8ddd94473b98483844c3070c0b013df198fdf03e138773c5ef05b13c439df99c96322f13a063761f74fd0626717baab71906a9b3f5780c1152aa4585b17d19bf250b8bea7cfddcbd7acdf150b6ddfcbad20f5abcbeac782d9449101ef494c6213b33b3a4c2b9a762e9634"]) 09:37:09 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', 0x0, 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c66736d616769633d3078303030303030303030303030303030302c736d61636b66737472616e736d7574653d2f73656c696e002c737d61636b6673646566fc6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e0592e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c29802c008c0000000000000000faa58b7692891653b11d7432701a2f82f06b18a20130d453c246286888c9c4241f20d61156ec82364f7c3bb3ead7b5fa581c1eaa3108ed05d20547e0a55db6c38213aa99eb678003aa97d23ab8ddd94473b98483844c3070c0b013df198fdf03e138773c5ef05b13c439df99c96322f13a063761f74fd0626717baab71906a9b3f5780c1152aa4585b17d19bf250b8bea7cfddcbd7acdf150b6ddfcbad20f5abcbeac782d9449101ef494c6213b33b3a4c2b9a762e9634"]) 09:37:09 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c0001070000", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:09 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c0001070000", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:09 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0xa) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:09 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:09 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c0001070000", @ANYRES32=r2, @ANYBLOB="2000000000000000210004000b000100727391703600e6006c00e9cf59c17eb7176b8153f75cfbd1010005003c00010003000000ffffffff03000000010400400100000007007f0005000400fffffeff200107004000ffff0300000005000000ba3affff620b000014000300fe8000000248229f000000000037df000000000000000000000001ce6d59bfab0c9df615a13771e8f45e14683e2b12513c0a2f6ca0f24b4dd6bae5963256b9c278101348e6bf6bda76a052e6ddabfb8e7e5622dfb2ce1f2324e1d967e8920102c29300bd6f113177730d8b9b73becfcf802d89c2ca316574b0c21c114b3a5bd143c333c46891ae4d8c6eca9dfe29ede100d19b5b3e67c29a39e92ffb8a2298dd771057066e74ee7190e43c15bd7309c117f4c7e376f63b2a81e4c25850e56b25416263cbe7d806f095771bcfda5c37902229e7378deb15dee2ba273a189120d66ba783b2b53f26384e5b59864597a27444fd516793239bc2766d0b5a536c5cf67d81f1fa42d720a466a55f85fabf4fb16255d74c38d598"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:09 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0xa) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:09 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700000000000000", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:09 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {0x0, 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:09 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', 0x0, 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:10 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:10 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700000000000000", @ANYRES32=r2, @ANYBLOB="2000000000000000210004000b000100727391703600e6006c00e9cf59c17eb7176b8153f75cfbd1010005003c00010003000000ffffffff03000000010400400100000007007f0005000400fffffeff200107004000ffff0300000005000000ba3affff620b000014000300fe8000000248229f000000000037df000000000000000000000001ce6d59bfab0c9df615a13771e8f45e14683e2b12513c0a2f6ca0f24b4dd6bae5963256b9c278101348e6bf6bda76a052e6ddabfb8e7e5622dfb2ce1f2324e1d967e8920102c29300bd6f113177730d8b9b73becfcf802d89c2ca316574b0c21c114b3a5bd143c333c46891ae4d8c6eca9dfe29ede100d19b5b3e67c29a39e92ffb8a2298dd771057066e74ee7190e43c15bd7309c117f4c7e376f63b2a81e4c25850e56b25416263cbe7d806f095771bcfda5c37902229e7378deb15dee2ba273a189120d66ba783b2b53f26384e5b59864597a27444fd516793239bc2766d0b5a536c5cf67d81f1fa42d720a466a55f85fabf4fb16255d74c38d598"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:10 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:10 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:10 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700000000000000", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:10 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:10 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/18, @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:10 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c66736d616769633d3078303030303030303030303030303030302c736d61636b66737472616e736d7574653d2f73656c696e002c737d61636b6673646566fc6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e0592e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c29802c008c0000000000000000faa58b7692891653b11d7432701a2f82f06b18a20130d453c246286888c9c4241f20d61156ec82364f7c3bb3ead7b5fa581c1eaa3108ed05d20547e0a55db6c38213aa99eb678003aa97d23ab8ddd94473b98483844c3070c0b013df198fdf03e138773c5ef05b13c439df99c96322f13a063761f74fd0626717baab71906a9b3f5780c1152aa4585b17d19bf250b8bea7cfddcbd7acdf150b6ddfcbad20f5abcbeac782d9449101ef494c6213b33b3a4c2b9a762e9634"]) 09:37:10 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:10 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/18, @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:10 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {0x0, 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:10 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:10 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:10 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:10 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/18, @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:10 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {0x0, 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:10 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:10 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/19, @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:10 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x4, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:11 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/19, @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:11 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:11 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', 0x0, 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c66736d616769633d3078303030303030303030303030303030302c736d61636b66737472616e736d7574653d2f73656c696e002c737d61636b6673646566fc6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e0592e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c29802c008c0000000000000000faa58b7692891653b11d7432701a2f82f06b18a20130d453c246286888c9c4241f20d61156ec82364f7c3bb3ead7b5fa581c1eaa3108ed05d20547e0a55db6c38213aa99eb678003aa97d23ab8ddd94473b98483844c3070c0b013df198fdf03e138773c5ef05b13c439df99c96322f13a063761f74fd0626717baab71906a9b3f5780c1152aa4585b17d19bf250b8bea7cfddcbd7acdf150b6ddfcbad20f5abcbeac782d9449101ef494c6213b33b3a4c2b9a762e9634"]) 09:37:11 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/19, @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd3, 0x0) 09:37:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:11 executing program 1: socket(0x10, 0x80002, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r1, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0xd3, 0x0) 09:37:11 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x4, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c66736d616769633d3078303030303030303030303030303030302c736d61636b66737472616e736d7574653d2f73656c696e002c737d61636b6673646566fc6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e0592e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c29802c008c0000000000000000faa58b7692891653b11d7432701a2f82f06b18a20130d453c246286888c9c4241f20d61156ec82364f7c3bb3ead7b5fa581c1eaa3108ed05d20547e0a55db6c38213aa99eb678003aa97d23ab8ddd94473b98483844c3070c0b013df198fdf03e138773c5ef05b13c439df99c96322f13a063761f74fd0626717baab71906a9b3f5780c1152aa4585b17d19bf250b8bea7cfddcbd7acdf150b6ddfcbad20f5abcbeac782d9449101ef494c6213b33b3a4c2b9a762e9634"]) 09:37:11 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:11 executing program 1: socket(0x10, 0x80002, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r1, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0xd3, 0x0) 09:37:11 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780)}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:11 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x4, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:11 executing program 1: socket(0x10, 0x80002, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r1, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0xd3, 0x0) 09:37:11 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:11 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', 0x0, 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:11 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) 09:37:11 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x9c}}, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) 09:37:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:11 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:12 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x294) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xffffffffffffff23, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="2000000000000000210004000b000100727391703600e6006c00e9cf59c17eb7176b8153f75cfbd1010005003c00010003000000ffffffff03000000010400400100000007007f0005000400fffffeff200107004000ffff0300000005000000ba3affff620b000014000300fe8000000248229f000000000037df000000000000000000000001ce6d59bfab0c9df615a13771e8f45e14683e2b12513c0a2f6ca0f24b4dd6bae5963256b9c278101348e6bf6bda76a052e6ddabfb8e7e5622dfb2ce1f2324e1d967e8920102c29300bd6f113177730d8b9b73becfcf802d89c2ca316574b0c21c114b3a5bd143c333c46891ae4d8c6eca9dfe29ede100d19b5b3e67c29a39e92ffb8a2298dd771057066e74ee7190e43c15bd7309c117f4c7e376f63b2a81e4c25850e56b25416263cbe7d806f095771bcfda5c37902229e7378deb15dee2ba273a189120d66ba783b2b53f26384e5b59864597a27444fd516793239bc2766d0b5a536c5cf67d81f1fa42d720a466a55f85fabf4fb16255d74c38d598"], 0x9c}}, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) 09:37:12 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:12 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780)}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c66736d616769633d3078303030303030303030303030303030302c736d61636b66737472616e736d7574653d2f73656c696e002c737d61636b6673646566fc6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e0592e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c29802c008c0000000000000000faa58b7692891653b11d7432701a2f82f06b18a20130d453c246286888c9c4241f20d61156ec82364f7c3bb3ead7b5fa581c1eaa3108ed05d20547e0a55db6c38213aa99eb678003aa97d23ab8ddd94473b98483844c3070c0b013df198fdf03e138773c5ef05b13c439df99c96322f13a063761f74fd0626717baab71906a9b3f5780c1152aa4585b17d19bf250b8bea7cfddcbd7acdf150b6ddfcbad20f5abcbeac782d9449101ef494c6213b33b3a4c2b9a762e9634"]) 09:37:12 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', 0x0, 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:12 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {0x0, 0x0, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c66736d616769633d3078303030303030303030303030303030302c736d61636b66737472616e736d7574653d2f73656c696e002c737d61636b6673646566fc6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e0592e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c29802c008c0000000000000000faa58b7692891653b11d7432701a2f82f06b18a20130d453c246286888c9c4241f20d61156ec82364f7c3bb3ead7b5fa581c1eaa3108ed05d20547e0a55db6c38213aa99eb678003aa97d23ab8ddd94473b98483844c3070c0b013df198fdf03e138773c5ef05b13c439df99c96322f13a063761f74fd0626717baab71906a9b3f5780c1152aa4585b17d19bf250b8bea7cfddcbd7acdf150b6ddfcbad20f5abcbeac782d9449101ef494c6213b33b3a4c2b9a762e9634"]) 09:37:12 executing program 1: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) r1 = syz_open_procfs(0x0, 0x0) r2 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r2, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000300)) r3 = syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) sendmsg$TIPC_NL_MEDIA_GET(r3, &(0x7f00000009c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000980)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000340)={@remote, @multicast2}, &(0x7f0000000380)=0xc) 09:37:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:12 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:12 executing program 1: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) r1 = syz_open_procfs(0x0, 0x0) r2 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r2, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000300)) r3 = syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) sendmsg$TIPC_NL_MEDIA_GET(r3, &(0x7f00000009c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000980)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000340)={@remote, @multicast2}, &(0x7f0000000380)=0xc) 09:37:12 executing program 1: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) r1 = syz_open_procfs(0x0, 0x0) r2 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r2, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000300)) r3 = syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) sendmsg$TIPC_NL_MEDIA_GET(r3, &(0x7f00000009c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000980)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000340)={@remote, @multicast2}, &(0x7f0000000380)=0xc) 09:37:12 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:12 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:12 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780)}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:12 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {0x0, 0x0, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:12 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:12 executing program 1: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) r1 = syz_open_procfs(0x0, 0x0) r2 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r2, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000300)) r3 = syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) sendmsg$TIPC_NL_MEDIA_GET(r3, &(0x7f00000009c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000980)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000340)={@remote, @multicast2}, &(0x7f0000000380)=0xc) 09:37:13 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {0x0, 0x0, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c66736d616769633d3078303030303030303030303030303030302c736d61636b66737472616e736d7574653d2f73656c696e002c737d61636b6673646566fc6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e0592e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c29802c008c0000000000000000faa58b7692891653b11d7432701a2f82f06b18a20130d453c246286888c9c4241f20d61156ec82364f7c3bb3ead7b5fa581c1eaa3108ed05d20547e0a55db6c38213aa99eb678003aa97d23ab8ddd94473b98483844c3070c0b013df198fdf03e138773c5ef05b13c439df99c96322f13a063761f74fd0626717baab71906a9b3f5780c1152aa4585b17d19bf250b8bea7cfddcbd7acdf150b6ddfcbad20f5abcbeac782d9449101ef494c6213b33b3a4c2b9a762e9634"]) 09:37:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:13 executing program 1: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) r1 = syz_open_procfs(0x0, 0x0) r2 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r2, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000300)) r3 = syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) sendmsg$TIPC_NL_MEDIA_GET(r3, &(0x7f00000009c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000980)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x0) 09:37:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:13 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c66736d616769633d3078303030303030303030303030303030302c736d61636b66737472616e736d7574653d2f73656c696e002c737d61636b6673646566fc6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e0592e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c29802c008c0000000000000000faa58b7692891653b11d7432701a2f82f06b18a20130d453c246286888c9c4241f20d61156ec82364f7c3bb3ead7b5fa581c1eaa3108ed05d20547e0a55db6c38213aa99eb678003aa97d23ab8ddd94473b98483844c3070c0b013df198fdf03e138773c5ef05b13c439df99c96322f13a063761f74fd0626717baab71906a9b3f5780c1152aa4585b17d19bf250b8bea7cfddcbd7acdf150b6ddfcbad20f5abcbeac782d9449101ef494c6213b33b3a4c2b9a762e9634"]) 09:37:13 executing program 1: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) r1 = syz_open_procfs(0x0, 0x0) r2 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r2, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:13 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x4, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c66736d616769633d3078303030303030303030303030303030302c736d61636b66737472616e736d7574653d2f73656c696e002c737d61636b6673646566fc6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e0592e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c29802c008c0000000000000000faa58b7692891653b11d7432701a2f82f06b18a20130d453c246286888c9c4241f20d61156ec82364f7c3bb3ead7b5fa581c1eaa3108ed05d20547e0a55db6c38213aa99eb678003aa97d23ab8ddd94473b98483844c3070c0b013df198fdf03e138773c5ef05b13c439df99c96322f13a063761f74fd0626717baab71906a9b3f5780c1152aa4585b17d19bf250b8bea7cfddcbd7acdf150b6ddfcbad20f5abcbeac782d9449101ef494c6213b33b3a4c2b9a762e9634"]) 09:37:13 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:13 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840), 0x0, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:13 executing program 1: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) r1 = syz_open_procfs(0x0, 0x0) r2 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r2, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000300)) 09:37:13 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:13 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840), 0x0, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c66736d616769633d3078303030303030303030303030303030302c736d61636b66737472616e736d7574653d2f73656c696e002c737d61636b6673646566fc6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e0592e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c29802c008c0000000000000000faa58b7692891653b11d7432701a2f82f06b18a20130d453c246286888c9c4241f20d61156ec82364f7c3bb3ead7b5fa581c1eaa3108ed05d20547e0a55db6c38213aa99eb678003aa97d23ab8ddd94473b98483844c3070c0b013df198fdf03e138773c5ef05b13c439df99c96322f13a063761f74fd0626717baab71906a9b3f5780c1152aa4585b17d19bf250b8bea7cfddcbd7acdf150b6ddfcbad20f5abcbeac782d9449101ef494c6213b33b3a4c2b9a762e9634"]) 09:37:13 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:13 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:13 executing program 1: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) 09:37:13 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840), 0x0, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c66736d616769633d3078303030303030303030303030303030302c736d61636b66737472616e736d7574653d2f73656c696e002c737d61636b6673646566fc6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e0592e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c29802c008c0000000000000000faa58b7692891653b11d7432701a2f82f06b18a20130d453c246286888c9c4241f20d61156ec82364f7c3bb3ead7b5fa581c1eaa3108ed05d20547e0a55db6c38213aa99eb678003aa97d23ab8ddd94473b98483844c3070c0b013df198fdf03e138773c5ef05b13c439df99c96322f13a063761f74fd0626717baab71906a9b3f5780c1152aa4585b17d19bf250b8bea7cfddcbd7acdf150b6ddfcbad20f5abcbeac782d9449101ef494c6213b33b3a4c2b9a762e9634"]) 09:37:13 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x4, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:14 executing program 1: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:37:14 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x4, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:14 executing program 1: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) 09:37:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:14 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce39", 0x5, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:14 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x4, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:14 executing program 1: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:37:14 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x4, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:14 executing program 1: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) 09:37:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:15 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce39", 0x5, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:15 executing program 1: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) 09:37:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:15 executing program 1: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) syz_open_procfs(0x0, 0x0) syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) 09:37:15 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:15 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce39", 0x5, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:15 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x4, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:15 executing program 1: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) syz_open_procfs(0x0, 0x0) 09:37:15 executing program 1: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) 09:37:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:15 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932", 0x8, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:15 executing program 1: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) 09:37:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:15 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {0x0, 0x0, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:15 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:15 executing program 1: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) 09:37:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:16 executing program 1: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) 09:37:16 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932", 0x8, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:16 executing program 1: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) 09:37:16 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {0x0, 0x0, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c66736d616769633d3078303030303030303030303030303030302c736d61636b66737472616e736d7574653d2f73656c696e002c737d61636b6673646566fc6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e0592e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c29802c008c0000000000000000faa58b7692891653b11d7432701a2f82f06b18a20130d453c246286888c9c4241f20d61156ec82364f7c3bb3ead7b5fa581c1eaa3108ed05d20547e0a55db6c38213aa99eb678003aa97d23ab8ddd94473b98483844c3070c0b013df198fdf03e138773c5ef05b13c439df99c96322f13a063761f74fd0626717baab71906a9b3f5780c1152aa4585b17d19bf250b8bea7cfddcbd7acdf150b6ddfcbad20f5abcbeac782d9449101ef494c6213b33b3a4c2b9a762e9634"]) 09:37:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:16 executing program 1: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) 09:37:16 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:16 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932", 0x8, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c66736d616769633d3078303030303030303030303030303030302c736d61636b66737472616e736d7574653d2f73656c696e002c737d61636b6673646566fc6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e0592e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c29802c008c0000000000000000faa58b7692891653b11d7432701a2f82f06b18a20130d453c246286888c9c4241f20d61156ec82364f7c3bb3ead7b5fa581c1eaa3108ed05d20547e0a55db6c38213aa99eb678003aa97d23ab8ddd94473b98483844c3070c0b013df198fdf03e138773c5ef05b13c439df99c96322f13a063761f74fd0626717baab71906a9b3f5780c1152aa4585b17d19bf250b8bea7cfddcbd7acdf150b6ddfcbad20f5abcbeac782d9449101ef494c6213b33b3a4c2b9a762e9634"]) 09:37:16 executing program 1: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) 09:37:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(0x0, 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:16 executing program 1: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) 09:37:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) 09:37:17 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {0x0, 0x0, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:17 executing program 1: r0 = socket$inet6(0xa, 0x0, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) 09:37:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:17 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680)}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:17 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db", 0x9, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:17 executing program 1: r0 = socket$inet6(0xa, 0x0, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) 09:37:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:17 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db", 0x9, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:17 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840), 0x0, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:17 executing program 1: r0 = socket$inet6(0xa, 0x0, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) 09:37:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:17 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) 09:37:17 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680)}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:18 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840), 0x0, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:18 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) 09:37:18 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db", 0x9, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:18 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) 09:37:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}], 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:18 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:18 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680)}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c66736d616769633d3078303030303030303030303030303030302c736d61636b66737472616e736d7574653d2f73656c696e002c737d61636b6673646566fc6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e0592e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c29802c008c0000000000000000faa58b7692891653b11d7432701a2f82f06b18a20130d453c246286888c9c4241f20d61156ec82364f7c3bb3ead7b5fa581c1eaa3108ed05d20547e0a55db6c38213aa99eb678003aa97d23ab8ddd94473b98483844c3070c0b013df198fdf03e138773c5ef05b13c439df99c96322f13a063761f74fd0626717baab71906a9b3f5780c1152aa4585b17d19bf250b8bea7cfddcbd7acdf150b6ddfcbad20f5abcbeac782d9449101ef494c6213b33b3a4c2b9a762e9634"]) 09:37:18 executing program 1: socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) 09:37:18 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840), 0x0, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c66736d616769633d3078303030303030303030303030303030302c736d61636b66737472616e736d7574653d2f73656c696e002c737d61636b6673646566fc6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e0592e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c29802c008c0000000000000000faa58b7692891653b11d7432701a2f82f06b18a20130d453c246286888c9c4241f20d61156ec82364f7c3bb3ead7b5fa581c1eaa3108ed05d20547e0a55db6c38213aa99eb678003aa97d23ab8ddd94473b98483844c3070c0b013df198fdf03e138773c5ef05b13c439df99c96322f13a063761f74fd0626717baab71906a9b3f5780c1152aa4585b17d19bf250b8bea7cfddcbd7acdf150b6ddfcbad20f5abcbeac782d9449101ef494c6213b33b3a4c2b9a762e9634"]) 09:37:18 executing program 1: socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) 09:37:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}], 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:18 executing program 1: socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) 09:37:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}], 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:19 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce39", 0x5, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:19 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) 09:37:19 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:19 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) 09:37:19 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x4, &(0x7f0000003880)=[{&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {0x0}], 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:19 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) 09:37:19 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {0x0}], 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:19 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote}, 0x20) 09:37:19 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote}, 0x20) 09:37:19 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce39", 0x5, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:19 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote}, 0x20) 09:37:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {0x0}], 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:19 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x4, &(0x7f0000003880)=[{&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:19 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x4, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c66736d616769633d3078303030303030303030303030303030302c736d61636b66737472616e736d7574653d2f73656c696e002c737d61636b6673646566fc6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e0592e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c29802c008c0000000000000000faa58b7692891653b11d7432701a2f82f06b18a20130d453c246286888c9c4241f20d61156ec82364f7c3bb3ead7b5fa581c1eaa3108ed05d20547e0a55db6c38213aa99eb678003aa97d23ab8ddd94473b98483844c3070c0b013df198fdf03e138773c5ef05b13c439df99c96322f13a063761f74fd0626717baab71906a9b3f5780c1152aa4585b17d19bf250b8bea7cfddcbd7acdf150b6ddfcbad20f5abcbeac782d9449101ef494c6213b33b3a4c2b9a762e9634"]) 09:37:19 executing program 1: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x200, "c6f933c624a43d13926bac933835b768735cbe6b0030c57867b8c39de0ffdff8", 0x1, 0x8, 0x100, 0x6, 0x8, 0x1, 0x6, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3}, 0x20) r1 = syz_open_procfs(0x0, 0x0) r2 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r2, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x4, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000300)) r3 = syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) sendmsg$TIPC_NL_MEDIA_GET(r3, &(0x7f00000009c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000980)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000340)={@remote, @multicast2}, &(0x7f0000000380)=0xc) 09:37:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000300)) syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x151801) 09:37:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x80000000b9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f00000002c0), 0x0) socket$nl_route(0x10, 0x3, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 09:37:20 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce39", 0x5, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x80000000b9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f00000002c0), 0x0) socket$nl_route(0x10, 0x3, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 09:37:20 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x4, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c66736d616769633d3078303030303030303030303030303030302c736d61636b66737472616e736d7574653d2f73656c696e002c737d61636b6673646566fc6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e0592e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c29802c008c0000000000000000faa58b7692891653b11d7432701a2f82f06b18a20130d453c246286888c9c4241f20d61156ec82364f7c3bb3ead7b5fa581c1eaa3108ed05d20547e0a55db6c38213aa99eb678003aa97d23ab8ddd94473b98483844c3070c0b013df198fdf03e138773c5ef05b13c439df99c96322f13a063761f74fd0626717baab71906a9b3f5780c1152aa4585b17d19bf250b8bea7cfddcbd7acdf150b6ddfcbad20f5abcbeac782d9449101ef494c6213b33b3a4c2b9a762e9634"]) 09:37:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x57) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffff01) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) unshare(0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0xffffffffffffffdd) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1be6c3ea78c4cdc3) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7fdd7b8ba2960f2194765aca0000804876525dc45a330d4bd6a859704a3b864122281e2accb897c96f7f8db93debd49b334e9ba8e9e96e8951b847017e329a0401e5e3547450efc1a9ab"], 0xf) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xef) 09:37:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x80000000b9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f00000002c0), 0x0) socket$nl_route(0x10, 0x3, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 09:37:20 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x4, &(0x7f0000003880)=[{&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932db97", 0xa, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="2c686173682c66736d616769633d3078303030303030303030303030303030302c736d61636b66737472616e736d7574653d2f73656c696e002c737d61636b6673646566fc6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e0592e2277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c29802c008c0000000000000000faa58b7692891653b11d7432701a2f82f06b18a20130d453c246286888c9c4241f20d61156ec82364f7c3bb3ead7b5fa581c1eaa3108ed05d20547e0a55db6c38213aa99eb678003aa97d23ab8ddd94473b98483844c3070c0b013df198fdf03e138773c5ef05b13c439df99c96322f13a063761f74fd0626717baab71906a9b3f5780c1152aa4585b17d19bf250b8bea7cfddcbd7acdf150b6ddfcbad20f5abcbeac782d9449101ef494c6213b33b3a4c2b9a762e9634"]) 09:37:20 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001f00)='nbd\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000001400)='msdos\x00', &(0x7f00000014c0)='./file0\x00', 0x0, 0x5, &(0x7f0000003880)=[{0x0}, {&(0x7f0000001680), 0x0, 0x9}, {&(0x7f0000001780), 0x0, 0x2}, {0x0, 0x0, 0x539}, {&(0x7f0000003840)="b932afce3973a932", 0x8, 0x35}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6f646f74732c6e6f636840828b722dc5d3775f7574696d653d30303030303030303030303030303030303030303031312c726f6f74636f6e746578743d726f6f742c7569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:37:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x80000000b9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f00000002c0), 0x0) socket$nl_route(0x10, 0x3, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) [ 950.240350] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 950.240482] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 960.480371] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 1144.800447] INFO: task syz-executor.5:15421 blocked for more than 140 seconds. [ 1144.807871] Not tainted 4.14.151 #0 [ 1144.814960] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1144.823073] syz-executor.5 D28528 15421 24313 0x00000004 [ 1144.828729] Call Trace: [ 1144.831500] __schedule+0x7b8/0x1cd0 [ 1144.835225] ? pci_mmcfg_check_reserved+0x150/0x150 [ 1144.840336] schedule+0x92/0x1c0 [ 1144.843698] schedule_timeout+0x93b/0xe10 [ 1144.847826] ? wait_for_completion+0x274/0x420 [ 1144.852455] ? find_held_lock+0x35/0x130 [ 1144.856583] ? usleep_range+0x130/0x130 [ 1144.860583] ? wait_for_completion+0x274/0x420 [ 1144.865162] ? _raw_spin_unlock_irq+0x28/0x90 [ 1144.869639] ? trace_hardirqs_on_caller+0x400/0x590 [ 1144.874736] wait_for_completion+0x27c/0x420 [ 1144.879139] ? try_to_wake_up+0xa8/0xf90 [ 1144.883243] ? wait_for_completion_interruptible+0x490/0x490 [ 1144.889046] ? wake_up_q+0xf0/0xf0 [ 1144.892636] kthread_stop+0xda/0x650 [ 1144.896398] vivid_stop_generating_vid_cap+0x1b9/0x664 [ 1144.901716] vid_cap_stop_streaming+0x7c/0xd0 [ 1144.906217] ? vid_cap_buf_queue+0x230/0x230 [ 1144.910719] __vb2_queue_cancel+0xa3/0x890 [ 1144.914961] ? lock_downgrade+0x740/0x740 [ 1144.919094] vb2_core_streamoff+0x52/0x110 [ 1144.923458] __vb2_cleanup_fileio+0x78/0x150 [ 1144.927863] vb2_core_queue_release+0x1d/0x80 [ 1144.932456] _vb2_fop_release+0x1cf/0x2a0 [ 1144.936602] vb2_fop_release+0x75/0xc0 [ 1144.940946] vivid_fop_release+0x180/0x3f0 [ 1144.945197] ? vivid_remove+0x3d0/0x3d0 [ 1144.949207] ? dev_debug_store+0xe0/0xe0 [ 1144.953311] v4l2_release+0xf9/0x190 [ 1144.957048] __fput+0x275/0x7a0 [ 1144.960571] ____fput+0x16/0x20 [ 1144.964038] task_work_run+0x114/0x190 [ 1144.968045] exit_to_usermode_loop+0x1da/0x220 [ 1144.972707] do_syscall_64+0x4bc/0x640 [ 1144.976596] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1144.981494] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1144.986694] RIP: 0033:0x413ae1 [ 1144.989865] RSP: 002b:00007ffdbdd517a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 1144.997601] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000413ae1 [ 1145.004897] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 1145.012204] RBP: 0000000000000001 R08: 000000006e783fbb R09: 000000006e783fbf [ 1145.019468] R10: 00007ffdbdd51880 R11: 0000000000000293 R12: 000000000075bf20 [ 1145.026829] R13: 00000000000dcbed R14: 0000000000760d00 R15: 000000000075bf2c [ 1145.034134] [ 1145.034134] Showing all locks held in the system: [ 1145.040488] 1 lock held by khungtaskd/1015: [ 1145.045053] #0: (tasklist_lock){.+.+}, at: [] debug_show_all_locks+0x7f/0x21f [ 1145.054137] 2 locks held by getty/6850: [ 1145.058094] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 1145.066812] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 1145.076251] 2 locks held by getty/6851: [ 1145.080254] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 1145.089685] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 1145.099060] 2 locks held by getty/6852: [ 1145.103044] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 1145.111765] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 1145.121124] 2 locks held by getty/6853: [ 1145.125076] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 1145.133779] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 1145.143090] 2 locks held by getty/6854: [ 1145.147062] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 1145.155827] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 1145.165137] 2 locks held by getty/6855: [ 1145.169107] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 1145.177820] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 1145.187131] 2 locks held by getty/6856: [ 1145.191136] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 1145.199828] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 1145.209239] 1 lock held by syz-executor.2/3787: [ 1145.213938] #0: (&pipe->mutex/1){+.+.}, at: [] pipe_lock+0x63/0x80 [ 1145.222154] [ 1145.223780] ============================================= [ 1145.223780] [ 1145.231508] NMI backtrace for cpu 0 [ 1145.235143] CPU: 0 PID: 1015 Comm: khungtaskd Not tainted 4.14.151 #0 [ 1145.241739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1145.251093] Call Trace: [ 1145.253753] dump_stack+0x138/0x197 [ 1145.257412] nmi_cpu_backtrace.cold+0x57/0x94 [ 1145.261896] ? irq_force_complete_move.cold+0x7d/0x7d [ 1145.267167] nmi_trigger_cpumask_backtrace+0x141/0x189 [ 1145.272439] arch_trigger_cpumask_backtrace+0x14/0x20 [ 1145.277622] watchdog+0x5e7/0xb90 [ 1145.281063] kthread+0x319/0x430 [ 1145.284412] ? hungtask_pm_notify+0x50/0x50 [ 1145.288711] ? kthread_create_on_node+0xd0/0xd0 [ 1145.293372] ret_from_fork+0x24/0x30 [ 1145.297137] Sending NMI from CPU 0 to CPUs 1: [ 1145.301937] NMI backtrace for cpu 1 [ 1145.301940] CPU: 1 PID: 6887 Comm: syz-fuzzer Not tainted 4.14.151 #0 [ 1145.301944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1145.301946] task: ffff888089092080 task.stack: ffff8880880e8000 [ 1145.301948] RIP: 0010:do_futex+0x172/0x19e0 [ 1145.301950] RSP: 0018:ffff8880880efc20 EFLAGS: 00000286 [ 1145.301955] RAX: ffffed101101df99 RBX: 00000000ffffffff RCX: 0000000000000000 [ 1145.301958] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000001 [ 1145.301961] RBP: ffff8880880efe10 R08: ffff888089092080 R09: 0000000000000000 [ 1145.301963] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000001 [ 1145.301966] R13: ffffffffffffff92 R14: 0000000000000000 R15: ffff8880880efde8 [ 1145.301969] FS: 000000c42029b890(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 1145.301971] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1145.301974] CR2: 000000c420459000 CR3: 00000000a852e000 CR4: 00000000001426e0 [ 1145.301976] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1145.301979] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1145.301981] Call Trace: [ 1145.301983] ? trace_hardirqs_on+0x10/0x10 [ 1145.301984] ? save_trace+0x290/0x290 [ 1145.301986] ? save_trace+0x290/0x290 [ 1145.301988] ? exit_robust_list+0x230/0x230 [ 1145.301990] ? SyS_futex+0x29f/0x302 [ 1145.301992] ? kvm_clock_read+0x23/0x40 [ 1145.301994] ? kvm_clock_get_cycles+0x9/0x10 [ 1145.301995] ? ktime_get+0x1ba/0x2c0 [ 1145.301997] SyS_futex+0x215/0x302 [ 1145.301999] ? do_futex+0x19e0/0x19e0 [ 1145.302001] ? do_syscall_64+0x53/0x640 [ 1145.302003] ? do_futex+0x19e0/0x19e0 [ 1145.302004] do_syscall_64+0x1e8/0x640 [ 1145.302006] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1145.302009] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1145.302010] RIP: 0033:0x45b153 [ 1145.302012] RSP: 002b:000000c42003eea0 EFLAGS: 00000202 ORIG_RAX: 00000000000000ca [ 1145.302017] RAX: ffffffffffffffda RBX: 000000003b96f9f7 RCX: 000000000045b153 [ 1145.302019] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001896aa0 [ 1145.302022] RBP: 000000c42003eee8 R08: 0000000000000000 R09: 0000000000000000 [ 1145.302024] R10: 000000c42003eed8 R11: 0000000000000202 R12: 000000e001b58ef9 [ 1145.302027] R13: 0000000000000001 R14: 000000c4203d2de0 R15: 0000000000000001 [ 1145.302028] Code: c5 ff ff 4c 63 e8 e8 be 45 09 00 48 b8 00 00 00 00 00 fc ff df 48 03 85 a8 fe ff ff 48 c7 00 00 00 00 00 48 c7 40 08 00 00 00 00 <48> c7 40 10 00 00 00 00 48 c7 40 18 00 00 00 00 c7 40 20 00 00 [ 1145.302681] Kernel panic - not syncing: hung_task: blocked tasks [ 1145.545035] CPU: 0 PID: 1015 Comm: khungtaskd Not tainted 4.14.151 #0 [ 1145.551610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1145.560959] Call Trace: [ 1145.563536] dump_stack+0x138/0x197 [ 1145.567145] panic+0x1f9/0x42d [ 1145.570321] ? add_taint.cold+0x16/0x16 [ 1145.574289] ? irq_force_complete_move.cold+0x7d/0x7d [ 1145.579463] watchdog+0x5f8/0xb90 [ 1145.582908] kthread+0x319/0x430 [ 1145.586262] ? hungtask_pm_notify+0x50/0x50 [ 1145.590567] ? kthread_create_on_node+0xd0/0xd0 [ 1145.595245] ret_from_fork+0x24/0x30 [ 1145.600461] Kernel Offset: disabled [ 1145.604109] Rebooting in 86400 seconds..