0c0)='devpts\x00', &(0x7f0000000100)='security&vmnet0\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000040)='-{\x00', &(0x7f0000000080)='\xc6!*].\'~\x00', 0x0) 20:00:06 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) lstat(&(0x7f0000000000)='.\x00', &(0x7f0000000040)) 20:00:06 executing program 3: r0 = fsopen(&(0x7f0000000000)='devpts\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f00000000c0)='devpts\x00', &(0x7f0000000100)='security&vmnet0\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000040)='-{\x00', &(0x7f0000000080)='\xc6!*].\'~\x00', 0x0) 20:00:06 executing program 2: r0 = fsopen(&(0x7f0000000000)='devpts\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f00000000c0)='devpts\x00', &(0x7f0000000100)='security&vmnet0\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000040)='-{\x00', &(0x7f0000000080)='\xc6!*].\'~\x00', 0x0) 20:00:06 executing program 5: socket(0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0xffffffff}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x40) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}, 0xff00}], 0x400000000000107, 0x0) 20:00:06 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000001700)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000080)=0x800, 0x4) write$binfmt_misc(r1, &(0x7f0000000280)=ANY=[], 0x4dca) splice(r0, 0x0, r2, 0x0, 0x1ffe0, 0x0) 20:00:06 executing program 3: r0 = socket$inet(0x2, 0x2, 0x2000000088) bind(r0, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x7c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x8004e20}, 0x10) r2 = dup(r0) recvmmsg(r2, &(0x7f0000001a80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010001, 0x0) [ 283.524050][T16117] loop0: detected capacity change from 0 to 4096 [ 283.555972][T16117] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 20:00:07 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000001700)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000080)=0x800, 0x4) write$binfmt_misc(r1, &(0x7f0000000280)=ANY=[], 0x4dca) splice(r0, 0x0, r2, 0x0, 0x1ffe0, 0x0) 20:00:07 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) set_mempolicy(0x0, &(0x7f0000000080), 0x100) 20:00:07 executing program 3: r0 = socket$inet(0x2, 0x2, 0x2000000088) bind(r0, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x7c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x8004e20}, 0x10) r2 = dup(r0) recvmmsg(r2, &(0x7f0000001a80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010001, 0x0) 20:00:07 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2000000088) bind(r0, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x7c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x8004e20}, 0x10) r2 = dup(r0) recvmmsg(r2, &(0x7f0000001a80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010001, 0x0) 20:00:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000a, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)={0x19c, 0x0, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@NL80211_ATTR_REG_RULES={0x170, 0x22, 0x0, 0x1, [{0x44, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0xffff7fff}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0xe000000}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x8}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x1f}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x2}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x81}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x7f}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0xd0}]}, {0x34, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x26f5}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x7}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x1}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0xff}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x6b5a63a2}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x400}]}, {0x24, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x80}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x3ff}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0xde3}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0xe79}]}, {0x2c, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x8}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x4}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x16ef}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x72f}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x4}]}, {0xc, 0x0, 0x0, 0x1, [@NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x7fff}]}, {0xc, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x280}]}, {0x24, 0x0, 0x0, 0x1, [@NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x1000}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x2}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0xf2}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x2}]}, {0x2c, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x6}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x6}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x1}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x81}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x5}]}, {0x3c, 0x0, 0x0, 0x1, [@NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x7f}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x3315a704}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x7d1c}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x9}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x3}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x5}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x1}]}]}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x8}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_REG_ALPHA2={0x6, 0x21, 'b\x00'}]}, 0x19c}, 0x1, 0x0, 0x0, 0x1c800}, 0x10) clone(0x10000, &(0x7f0000000040)="27edab8d8a1970e8f04956ccb20316", &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000a000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r1, 0x0, 0x0) 20:00:07 executing program 5: socket(0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0xffffffff}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x40) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}, 0xff00}], 0x400000000000107, 0x0) [ 283.576118][T16089] EXT4-fs error (device loop0): ext4_readdir:260: inode #2: block 16: comm syz-executor.0: path /root/syzkaller-testdir626893984/syzkaller.bhLE6G/420/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=4096 fake=0 20:00:07 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2000000088) bind(r0, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x7c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x8004e20}, 0x10) r2 = dup(r0) recvmmsg(r2, &(0x7f0000001a80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010001, 0x0) 20:00:07 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000001700)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000080)=0x800, 0x4) write$binfmt_misc(r1, &(0x7f0000000280)=ANY=[], 0x4dca) splice(r0, 0x0, r2, 0x0, 0x1ffe0, 0x0) 20:00:07 executing program 3: r0 = socket$inet(0x2, 0x2, 0x2000000088) bind(r0, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x7c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x8004e20}, 0x10) r2 = dup(r0) recvmmsg(r2, &(0x7f0000001a80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010001, 0x0) 20:00:07 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000001700)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000080)=0x800, 0x4) write$binfmt_misc(r1, &(0x7f0000000280)=ANY=[], 0x4dca) splice(r0, 0x0, r2, 0x0, 0x1ffe0, 0x0) 20:00:07 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) set_mempolicy(0x0, &(0x7f0000000080), 0x100) 20:00:07 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2000000088) bind(r0, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x7c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x8004e20}, 0x10) r2 = dup(r0) recvmmsg(r2, &(0x7f0000001a80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010001, 0x0) 20:00:07 executing program 5: socket(0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0xffffffff}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x40) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}, 0xff00}], 0x400000000000107, 0x0) [ 283.766684][T16156] loop0: detected capacity change from 0 to 4096 20:00:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000a, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)={0x19c, 0x0, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@NL80211_ATTR_REG_RULES={0x170, 0x22, 0x0, 0x1, [{0x44, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0xffff7fff}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0xe000000}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x8}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x1f}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x2}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x81}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x7f}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0xd0}]}, {0x34, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x26f5}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x7}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x1}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0xff}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x6b5a63a2}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x400}]}, {0x24, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x80}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x3ff}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0xde3}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0xe79}]}, {0x2c, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x8}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x4}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x16ef}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x72f}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x4}]}, {0xc, 0x0, 0x0, 0x1, [@NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x7fff}]}, {0xc, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x280}]}, {0x24, 0x0, 0x0, 0x1, [@NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x1000}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x2}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0xf2}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x2}]}, {0x2c, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x6}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x6}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x1}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x81}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x5}]}, {0x3c, 0x0, 0x0, 0x1, [@NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x7f}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x3315a704}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x7d1c}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x9}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x3}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x5}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x1}]}]}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x8}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_REG_ALPHA2={0x6, 0x21, 'b\x00'}]}, 0x19c}, 0x1, 0x0, 0x0, 0x1c800}, 0x10) clone(0x10000, &(0x7f0000000040)="27edab8d8a1970e8f04956ccb20316", &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000a000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r1, 0x0, 0x0) 20:00:07 executing program 3: r0 = socket$inet(0x2, 0x2, 0x2000000088) bind(r0, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x7c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x8004e20}, 0x10) r2 = dup(r0) recvmmsg(r2, &(0x7f0000001a80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010001, 0x0) 20:00:07 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) set_mempolicy(0x0, &(0x7f0000000080), 0x100) [ 283.829757][T16156] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 20:00:07 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) set_mempolicy(0x0, &(0x7f0000000080), 0x100) 20:00:07 executing program 5: socket(0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0xffffffff}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x40) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}, 0xff00}], 0x400000000000107, 0x0) 20:00:07 executing program 1: socket(0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0xffffffff}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x40) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}, 0xff00}], 0x400000000000107, 0x0) 20:00:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000a, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)={0x19c, 0x0, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@NL80211_ATTR_REG_RULES={0x170, 0x22, 0x0, 0x1, [{0x44, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0xffff7fff}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0xe000000}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x8}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x1f}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x2}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x81}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x7f}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0xd0}]}, {0x34, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x26f5}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x7}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x1}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0xff}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x6b5a63a2}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x400}]}, {0x24, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x80}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x3ff}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0xde3}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0xe79}]}, {0x2c, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x8}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x4}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x16ef}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x72f}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x4}]}, {0xc, 0x0, 0x0, 0x1, [@NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x7fff}]}, {0xc, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x280}]}, {0x24, 0x0, 0x0, 0x1, [@NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x1000}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x2}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0xf2}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x2}]}, {0x2c, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x6}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x6}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x1}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x81}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x5}]}, {0x3c, 0x0, 0x0, 0x1, [@NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x7f}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x3315a704}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x7d1c}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x9}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x3}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x5}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x1}]}]}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x8}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_REG_ALPHA2={0x6, 0x21, 'b\x00'}]}, 0x19c}, 0x1, 0x0, 0x0, 0x1c800}, 0x10) clone(0x10000, &(0x7f0000000040)="27edab8d8a1970e8f04956ccb20316", &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000a000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r1, 0x0, 0x0) 20:00:07 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000001700)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000080)=0x800, 0x4) write$binfmt_misc(r1, &(0x7f0000000280)=ANY=[], 0x4dca) splice(r0, 0x0, r2, 0x0, 0x1ffe0, 0x0) 20:00:07 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000001700)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000080)=0x800, 0x4) write$binfmt_misc(r1, &(0x7f0000000280)=ANY=[], 0x4dca) splice(r0, 0x0, r2, 0x0, 0x1ffe0, 0x0) 20:00:07 executing program 2: prlimit64(0x0, 0xe, &(0x7f00000000c0)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) add_key(&(0x7f0000000100)='user\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000180)='@', 0x1, 0xffffffffffffffff) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, 0x0) [ 284.025501][T16182] loop4: detected capacity change from 0 to 4096 [ 284.047630][T16182] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 20:00:07 executing program 1: socket(0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0xffffffff}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x40) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}, 0xff00}], 0x400000000000107, 0x0) [ 284.105002][T16179] EXT4-fs error (device loop4): ext4_readdir:260: inode #2: block 16: comm syz-executor.4: path /root/syzkaller-testdir455415024/syzkaller.05NSzk/384/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=4096 fake=0 20:00:07 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000001700)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000080)=0x800, 0x4) write$binfmt_misc(r1, &(0x7f0000000280)=ANY=[], 0x4dca) splice(r0, 0x0, r2, 0x0, 0x1ffe0, 0x0) 20:00:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000a, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)={0x19c, 0x0, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@NL80211_ATTR_REG_RULES={0x170, 0x22, 0x0, 0x1, [{0x44, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0xffff7fff}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0xe000000}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x8}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x1f}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x2}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x81}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x7f}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0xd0}]}, {0x34, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x26f5}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x7}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x1}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0xff}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x6b5a63a2}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x400}]}, {0x24, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x80}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x3ff}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0xde3}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0xe79}]}, {0x2c, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x8}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x4}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x16ef}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x72f}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x4}]}, {0xc, 0x0, 0x0, 0x1, [@NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x7fff}]}, {0xc, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x280}]}, {0x24, 0x0, 0x0, 0x1, [@NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x1000}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x2}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0xf2}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x2}]}, {0x2c, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x6}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x6}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x1}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x81}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x5}]}, {0x3c, 0x0, 0x0, 0x1, [@NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x7f}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x3315a704}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x7d1c}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x9}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x3}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x5}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x1}]}]}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x8}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_REG_ALPHA2={0x6, 0x21, 'b\x00'}]}, 0x19c}, 0x1, 0x0, 0x0, 0x1c800}, 0x10) clone(0x10000, &(0x7f0000000040)="27edab8d8a1970e8f04956ccb20316", &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000a000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r1, 0x0, 0x0) 20:00:07 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x7ff, 0x5) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x20, 0x1, 0x1, 0x201, 0x9000000, 0x0, {}, [@CTA_NAT_SRC={0x4, 0x19}, @CTA_ZONE={0x6}]}, 0x20}}, 0x0) 20:00:07 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x4000000000000200, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) recvfrom$packet(r0, &(0x7f0000000680)=""/4096, 0x1000, 0x0, 0x0, 0x0) [ 284.459033][T16205] loop0: detected capacity change from 0 to 4096 [ 284.486808][T16205] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 284.569761][T16228] loop4: detected capacity change from 0 to 4096 [ 284.597071][T16228] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 20:00:08 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000a, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)={0x19c, 0x0, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@NL80211_ATTR_REG_RULES={0x170, 0x22, 0x0, 0x1, [{0x44, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0xffff7fff}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0xe000000}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x8}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x1f}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x2}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x81}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x7f}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0xd0}]}, {0x34, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x26f5}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x7}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x1}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0xff}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x6b5a63a2}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x400}]}, {0x24, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x80}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x3ff}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0xde3}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0xe79}]}, {0x2c, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x8}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x4}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x16ef}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x72f}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x4}]}, {0xc, 0x0, 0x0, 0x1, [@NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x7fff}]}, {0xc, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x280}]}, {0x24, 0x0, 0x0, 0x1, [@NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x1000}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x2}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0xf2}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x2}]}, {0x2c, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x6}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x6}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x1}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x81}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x5}]}, {0x3c, 0x0, 0x0, 0x1, [@NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x7f}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x3315a704}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x7d1c}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x9}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x3}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x5}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x1}]}]}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x8}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_REG_ALPHA2={0x6, 0x21, 'b\x00'}]}, 0x19c}, 0x1, 0x0, 0x0, 0x1c800}, 0x10) clone(0x10000, &(0x7f0000000040)="27edab8d8a1970e8f04956ccb20316", &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000a000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r1, 0x0, 0x0) 20:00:08 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x4000000000000200, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) recvfrom$packet(r0, &(0x7f0000000680)=""/4096, 0x1000, 0x0, 0x0, 0x0) 20:00:08 executing program 1: socket(0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0xffffffff}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x40) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}, 0xff00}], 0x400000000000107, 0x0) 20:00:08 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x7ff, 0x5) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x20, 0x1, 0x1, 0x201, 0x9000000, 0x0, {}, [@CTA_NAT_SRC={0x4, 0x19}, @CTA_ZONE={0x6}]}, 0x20}}, 0x0) 20:00:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000a, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)={0x19c, 0x0, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@NL80211_ATTR_REG_RULES={0x170, 0x22, 0x0, 0x1, [{0x44, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0xffff7fff}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0xe000000}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x8}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x1f}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x2}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x81}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x7f}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0xd0}]}, {0x34, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x26f5}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x7}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x1}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0xff}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x6b5a63a2}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x400}]}, {0x24, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x80}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x3ff}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0xde3}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0xe79}]}, {0x2c, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x8}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x4}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x16ef}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x72f}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x4}]}, {0xc, 0x0, 0x0, 0x1, [@NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x7fff}]}, {0xc, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x280}]}, {0x24, 0x0, 0x0, 0x1, [@NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x1000}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x2}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0xf2}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x2}]}, {0x2c, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x6}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x6}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x1}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x81}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x5}]}, {0x3c, 0x0, 0x0, 0x1, [@NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x7f}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x3315a704}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x7d1c}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x9}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x3}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x5}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x1}]}]}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x8}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_REG_ALPHA2={0x6, 0x21, 'b\x00'}]}, 0x19c}, 0x1, 0x0, 0x0, 0x1c800}, 0x10) clone(0x10000, &(0x7f0000000040)="27edab8d8a1970e8f04956ccb20316", &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000a000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r1, 0x0, 0x0) [ 284.624554][T16228] EXT4-fs error (device loop4): ext4_readdir:260: inode #2: block 16: comm syz-executor.4: path /root/syzkaller-testdir455415024/syzkaller.05NSzk/385/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=4096 fake=0 20:00:08 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x4000000000000200, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) recvfrom$packet(r0, &(0x7f0000000680)=""/4096, 0x1000, 0x0, 0x0, 0x0) [ 284.781582][T16253] loop4: detected capacity change from 0 to 4096 [ 284.826853][T16253] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 284.916823][T16259] loop0: detected capacity change from 0 to 4096 [ 284.933922][T16259] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 284.958113][T16252] EXT4-fs error (device loop0): ext4_readdir:260: inode #2: block 16: comm syz-executor.0: path /root/syzkaller-testdir626893984/syzkaller.bhLE6G/423/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=4096 fake=0 20:00:08 executing program 2: prlimit64(0x0, 0xe, &(0x7f00000000c0)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) add_key(&(0x7f0000000100)='user\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000180)='@', 0x1, 0xffffffffffffffff) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, 0x0) 20:00:08 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x7ff, 0x5) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x20, 0x1, 0x1, 0x201, 0x9000000, 0x0, {}, [@CTA_NAT_SRC={0x4, 0x19}, @CTA_ZONE={0x6}]}, 0x20}}, 0x0) 20:00:08 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x4000000000000200, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) recvfrom$packet(r0, &(0x7f0000000680)=""/4096, 0x1000, 0x0, 0x0, 0x0) 20:00:08 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x4000000000000200, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) recvfrom$packet(r0, &(0x7f0000000680)=""/4096, 0x1000, 0x0, 0x0, 0x0) 20:00:08 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$sock(r0, &(0x7f0000000fc0)=[{{&(0x7f0000000bc0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, 0x0}}], 0x2, 0x20004050) 20:00:08 executing program 0: creat(&(0x7f0000000580)='./bus\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000004180)='./bus\x00', 0x20000509) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x0) writev(r1, &(0x7f00000003c0)=[{&(0x7f0000000040)='!', 0x1}], 0x1) 20:00:08 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x4000000000000200, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) recvfrom$packet(r0, &(0x7f0000000680)=""/4096, 0x1000, 0x0, 0x0, 0x0) 20:00:08 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$sock(r0, &(0x7f0000000fc0)=[{{&(0x7f0000000bc0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, 0x0}}], 0x2, 0x20004050) 20:00:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mknod(&(0x7f0000001040)='./file0\x00', 0x800, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) truncate(&(0x7f0000001080)='./file0\x00', 0x0) 20:00:08 executing program 3: set_mempolicy(0x2, &(0x7f00000000c0)=0x7ff, 0x5) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x20, 0x1, 0x1, 0x201, 0x9000000, 0x0, {}, [@CTA_NAT_SRC={0x4, 0x19}, @CTA_ZONE={0x6}]}, 0x20}}, 0x0) 20:00:08 executing program 0: creat(&(0x7f0000000580)='./bus\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000004180)='./bus\x00', 0x20000509) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x0) writev(r1, &(0x7f00000003c0)=[{&(0x7f0000000040)='!', 0x1}], 0x1) 20:00:08 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x4000000000000200, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) recvfrom$packet(r0, &(0x7f0000000680)=""/4096, 0x1000, 0x0, 0x0, 0x0) 20:00:09 executing program 2: prlimit64(0x0, 0xe, &(0x7f00000000c0)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) add_key(&(0x7f0000000100)='user\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000180)='@', 0x1, 0xffffffffffffffff) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, 0x0) 20:00:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mknod(&(0x7f0000001040)='./file0\x00', 0x800, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) truncate(&(0x7f0000001080)='./file0\x00', 0x0) 20:00:09 executing program 3: creat(&(0x7f0000000580)='./bus\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000004180)='./bus\x00', 0x20000509) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x0) writev(r1, &(0x7f00000003c0)=[{&(0x7f0000000040)='!', 0x1}], 0x1) 20:00:09 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$sock(r0, &(0x7f0000000fc0)=[{{&(0x7f0000000bc0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, 0x0}}], 0x2, 0x20004050) 20:00:09 executing program 0: creat(&(0x7f0000000580)='./bus\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000004180)='./bus\x00', 0x20000509) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x0) writev(r1, &(0x7f00000003c0)=[{&(0x7f0000000040)='!', 0x1}], 0x1) 20:00:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000600)={0x0, &(0x7f00000002c0), &(0x7f0000000400), &(0x7f00000006c0), {}, &(0x7f0000000480)=""/76, 0x4c, &(0x7f0000000500)=""/145, &(0x7f00000005c0), 0x5}, 0xfec6) 20:00:09 executing program 0: creat(&(0x7f0000000580)='./bus\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000004180)='./bus\x00', 0x20000509) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x0) writev(r1, &(0x7f00000003c0)=[{&(0x7f0000000040)='!', 0x1}], 0x1) 20:00:09 executing program 3: creat(&(0x7f0000000580)='./bus\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000004180)='./bus\x00', 0x20000509) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x0) writev(r1, &(0x7f00000003c0)=[{&(0x7f0000000040)='!', 0x1}], 0x1) 20:00:09 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300000020005000002000000000000040000000000008000000", 0x3ffd2}], 0x2) 20:00:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mknod(&(0x7f0000001040)='./file0\x00', 0x800, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) truncate(&(0x7f0000001080)='./file0\x00', 0x0) 20:00:09 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300000020005000002000000000000040000000000008000000", 0x3ffd2}], 0x2) 20:00:09 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$sock(r0, &(0x7f0000000fc0)=[{{&(0x7f0000000bc0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, 0x0}}], 0x2, 0x20004050) 20:00:10 executing program 2: prlimit64(0x0, 0xe, &(0x7f00000000c0)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) add_key(&(0x7f0000000100)='user\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000180)='@', 0x1, 0xffffffffffffffff) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, 0x0) 20:00:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000600)={0x0, &(0x7f00000002c0), &(0x7f0000000400), &(0x7f00000006c0), {}, &(0x7f0000000480)=""/76, 0x4c, &(0x7f0000000500)=""/145, &(0x7f00000005c0), 0x5}, 0xfec6) 20:00:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mknod(&(0x7f0000001040)='./file0\x00', 0x800, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) truncate(&(0x7f0000001080)='./file0\x00', 0x0) 20:00:10 executing program 3: creat(&(0x7f0000000580)='./bus\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000004180)='./bus\x00', 0x20000509) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x0) writev(r1, &(0x7f00000003c0)=[{&(0x7f0000000040)='!', 0x1}], 0x1) 20:00:10 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300000020005000002000000000000040000000000008000000", 0x3ffd2}], 0x2) 20:00:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x60) close(r1) creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 20:00:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000600)={0x0, &(0x7f00000002c0), &(0x7f0000000400), &(0x7f00000006c0), {}, &(0x7f0000000480)=""/76, 0x4c, &(0x7f0000000500)=""/145, &(0x7f00000005c0), 0x5}, 0xfec6) 20:00:10 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040300000020005000002000000000000040000000000008000000", 0x3ffd2}], 0x2) 20:00:10 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000380), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000400)='user\x00', &(0x7f0000000440)='^\x00') 20:00:10 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000000)) ptrace(0x10, r0) ptrace$getregset(0x420e, r0, 0x0, 0x0) 20:00:10 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000380), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000400)='user\x00', &(0x7f0000000440)='^\x00') 20:00:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000600)={0x0, &(0x7f00000002c0), &(0x7f0000000400), &(0x7f00000006c0), {}, &(0x7f0000000480)=""/76, 0x4c, &(0x7f0000000500)=""/145, &(0x7f00000005c0), 0x5}, 0xfec6) 20:00:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x60) close(r1) creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 20:00:11 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000380), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000400)='user\x00', &(0x7f0000000440)='^\x00') 20:00:11 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000380), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000400)='user\x00', &(0x7f0000000440)='^\x00') 20:00:11 executing program 1: mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x2) 20:00:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x60) close(r1) creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 20:00:11 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000380), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000400)='user\x00', &(0x7f0000000440)='^\x00') 20:00:11 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000380), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000400)='user\x00', &(0x7f0000000440)='^\x00') 20:00:11 executing program 1: mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x2) 20:00:11 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000380), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000400)='user\x00', &(0x7f0000000440)='^\x00') 20:00:11 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000000)) ptrace(0x10, r0) ptrace$getregset(0x420e, r0, 0x0, 0x0) 20:00:11 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000000)) ptrace(0x10, r0) ptrace$getregset(0x420e, r0, 0x0, 0x0) 20:00:11 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000000)) ptrace(0x10, r0) ptrace$getregset(0x420e, r0, 0x0, 0x0) 20:00:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x60) close(r1) creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 20:00:11 executing program 1: mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x2) 20:00:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x60) close(r1) creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 20:00:11 executing program 1: mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x2) 20:00:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x60) close(r1) creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 20:00:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x60) close(r1) creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 20:00:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x60) close(r1) creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 20:00:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x60) close(r1) creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 20:00:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x60) close(r1) creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 20:00:12 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000000)) ptrace(0x10, r0) ptrace$getregset(0x420e, r0, 0x0, 0x0) 20:00:12 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000000)) ptrace(0x10, r0) ptrace$getregset(0x420e, r0, 0x0, 0x0) 20:00:12 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000000)) ptrace(0x10, r0) ptrace$getregset(0x420e, r0, 0x0, 0x0) 20:00:12 executing program 2: clone(0x66100d00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_netdev_private(r0, 0x8941, 0x0) clone(0x50002000, 0x0, 0x0, 0x0, 0x0) 20:00:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x60) close(r1) creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 20:00:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x60) close(r1) creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 20:00:12 executing program 2: clone(0x66100d00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_netdev_private(r0, 0x8941, 0x0) clone(0x50002000, 0x0, 0x0, 0x0, 0x0) [ 288.911984][ T25] audit: type=1400 audit(1623355212.341:2069): avc: denied { sys_admin } for pid=16475 comm="syz-executor.2" capability=21 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 20:00:12 executing program 2: clone(0x66100d00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_netdev_private(r0, 0x8941, 0x0) clone(0x50002000, 0x0, 0x0, 0x0, 0x0) 20:00:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x60) close(r1) creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 20:00:12 executing program 2: clone(0x66100d00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_netdev_private(r0, 0x8941, 0x0) clone(0x50002000, 0x0, 0x0, 0x0, 0x0) 20:00:12 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x60040, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 20:00:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae897094e71b0fa1f107000000364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb298802d8f6c1f3b18d6d352407f7018b31a53bad1ec3533c791a753a1fef2c560001000000000000fb8005128e7e4d939955f8ac396203784000400f573fbf000000000000000761f35e769f130dec95128ce7ec033dc0a380543b", 0xa0}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1e) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 20:00:13 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000000)) ptrace(0x10, r0) ptrace$getregset(0x420e, r0, 0x0, 0x0) 20:00:13 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000000)) ptrace(0x10, r0) ptrace$getregset(0x420e, r0, 0x0, 0x0) 20:00:13 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000000)) ptrace(0x10, r0) ptrace$getregset(0x420e, r0, 0x0, 0x0) 20:00:13 executing program 2: r0 = socket(0xa, 0x802, 0x0) setsockopt$inet_int(r0, 0x0, 0x18, &(0x7f0000000080)=0x3, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) 20:00:13 executing program 4: mknod$loop(&(0x7f0000000300)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000500)=ANY=[@ANYRESOCT, @ANYBLOB='c'], &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000380)='trans=tcp,') 20:00:13 executing program 2: r0 = socket(0xa, 0x802, 0x0) setsockopt$inet_int(r0, 0x0, 0x18, &(0x7f0000000080)=0x3, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) 20:00:13 executing program 4: mknod$loop(&(0x7f0000000300)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000500)=ANY=[@ANYRESOCT, @ANYBLOB='c'], &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000380)='trans=tcp,') 20:00:13 executing program 2: r0 = socket(0xa, 0x802, 0x0) setsockopt$inet_int(r0, 0x0, 0x18, &(0x7f0000000080)=0x3, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) 20:00:13 executing program 2: r0 = socket(0xa, 0x802, 0x0) setsockopt$inet_int(r0, 0x0, 0x18, &(0x7f0000000080)=0x3, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) 20:00:13 executing program 4: mknod$loop(&(0x7f0000000300)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000500)=ANY=[@ANYRESOCT, @ANYBLOB='c'], &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000380)='trans=tcp,') 20:00:13 executing program 4: mknod$loop(&(0x7f0000000300)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000500)=ANY=[@ANYRESOCT, @ANYBLOB='c'], &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000380)='trans=tcp,') 20:00:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae897094e71b0fa1f107000000364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb298802d8f6c1f3b18d6d352407f7018b31a53bad1ec3533c791a753a1fef2c560001000000000000fb8005128e7e4d939955f8ac396203784000400f573fbf000000000000000761f35e769f130dec95128ce7ec033dc0a380543b", 0xa0}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1e) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 20:00:15 executing program 2: r0 = socket(0xa, 0x802, 0x0) setsockopt$inet_int(r0, 0x0, 0x18, &(0x7f0000000080)=0x3, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) 20:00:15 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) flock(r0, 0x8) 20:00:15 executing program 5: clock_gettime(0x5, &(0x7f0000000000)) 20:00:15 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$sock(r0, &(0x7f0000002ac0)=[{{0x0, 0x0, &(0x7f0000001300)=[{0x0}, {&(0x7f00000001c0)='j', 0x1}], 0x2}}], 0x1, 0x0) 20:00:15 executing program 0: r0 = memfd_create(&(0x7f00000002c0)='#\'%nod%v\x00\x7f\xe5\xd0ql\x86\xc9\xe6\x14\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x00\x14}\n\x81\xc7\x85|oC\xca\v\xe3\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xab\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF\x13\x9f\xc2\xb7/1\xb9V\xf0*\xcb\xdc\x05n<\xcfi\x02=1\xda\"\xb3\xfe\xf3\x97\xd9\xa5b\xd4\x00Q$\xb2v\\\xa9\xcf*tw\x8a\n_)\x89A\x8f`R\x12zM\a\xc43\xd0d\xee\x13Q', 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000002000)='/', 0x1) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000180)=0x4) sendfile(r0, r0, &(0x7f0000000200), 0x87) 20:00:15 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x5427, 0x0) 20:00:15 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="82bb716f0503c9ca91e9a8687c443fdc0683800c3eb0f365c31c34de8856720000000000000093d5b8c22e287510000000000000002e5d8267491b38ea0b994806ebe884bbd8eaf44a7094b42e82e9095c0568ca600400553c7cc8a7d6a3cf74fa896774e1c35f797ffeeb11cb8261686dcb28449024ecf9ca7d6c54066f6a2cf0997b7bc1bd682b443300ac6e972b142cf3569a02c2cefcd0fb7e6451b8f7741e23e576f0ab554aea009a4611ab5a31d6df6b63ad0a2f76f11c25e64ac2d95950ba6ef958cbea5f2a9abbe525c2136c", 0xd0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x5) 20:00:15 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) flock(r0, 0x8) 20:00:15 executing program 2: r0 = socket(0xa, 0x802, 0x0) setsockopt$inet_int(r0, 0x0, 0x18, &(0x7f0000000080)=0x3, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) 20:00:15 executing program 0: r0 = memfd_create(&(0x7f00000002c0)='#\'%nod%v\x00\x7f\xe5\xd0ql\x86\xc9\xe6\x14\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x00\x14}\n\x81\xc7\x85|oC\xca\v\xe3\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xab\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF\x13\x9f\xc2\xb7/1\xb9V\xf0*\xcb\xdc\x05n<\xcfi\x02=1\xda\"\xb3\xfe\xf3\x97\xd9\xa5b\xd4\x00Q$\xb2v\\\xa9\xcf*tw\x8a\n_)\x89A\x8f`R\x12zM\a\xc43\xd0d\xee\x13Q', 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000002000)='/', 0x1) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000180)=0x4) sendfile(r0, r0, &(0x7f0000000200), 0x87) 20:00:15 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x5427, 0x0) 20:00:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae897094e71b0fa1f107000000364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb298802d8f6c1f3b18d6d352407f7018b31a53bad1ec3533c791a753a1fef2c560001000000000000fb8005128e7e4d939955f8ac396203784000400f573fbf000000000000000761f35e769f130dec95128ce7ec033dc0a380543b", 0xa0}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1e) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 20:00:18 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) flock(r0, 0x8) 20:00:18 executing program 2: r0 = socket(0xa, 0x802, 0x0) setsockopt$inet_int(r0, 0x0, 0x18, &(0x7f0000000080)=0x3, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) 20:00:18 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x5427, 0x0) 20:00:18 executing program 0: r0 = memfd_create(&(0x7f00000002c0)='#\'%nod%v\x00\x7f\xe5\xd0ql\x86\xc9\xe6\x14\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x00\x14}\n\x81\xc7\x85|oC\xca\v\xe3\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xab\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF\x13\x9f\xc2\xb7/1\xb9V\xf0*\xcb\xdc\x05n<\xcfi\x02=1\xda\"\xb3\xfe\xf3\x97\xd9\xa5b\xd4\x00Q$\xb2v\\\xa9\xcf*tw\x8a\n_)\x89A\x8f`R\x12zM\a\xc43\xd0d\xee\x13Q', 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000002000)='/', 0x1) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000180)=0x4) sendfile(r0, r0, &(0x7f0000000200), 0x87) 20:00:18 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x5427, 0x0) 20:00:18 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) flock(r0, 0x8) 20:00:18 executing program 5: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffe0}}], 0x300, 0x4000000) sendmmsg(r0, &(0x7f0000004280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x24000800) 20:00:18 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='hugetlbfs\x00', 0x200c40, 0x0) sendfile(r0, r1, 0x0, 0x800000080004103) 20:00:18 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) preadv2(r0, &(0x7f0000000300)=[{&(0x7f00000000c0)=""/61, 0x3d}], 0x1, 0x2a, 0x0, 0x0) 20:00:18 executing program 0: r0 = memfd_create(&(0x7f00000002c0)='#\'%nod%v\x00\x7f\xe5\xd0ql\x86\xc9\xe6\x14\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x00\x14}\n\x81\xc7\x85|oC\xca\v\xe3\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xab\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF\x13\x9f\xc2\xb7/1\xb9V\xf0*\xcb\xdc\x05n<\xcfi\x02=1\xda\"\xb3\xfe\xf3\x97\xd9\xa5b\xd4\x00Q$\xb2v\\\xa9\xcf*tw\x8a\n_)\x89A\x8f`R\x12zM\a\xc43\xd0d\xee\x13Q', 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000002000)='/', 0x1) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000180)=0x4) sendfile(r0, r0, &(0x7f0000000200), 0x87) 20:00:18 executing program 4: rt_sigaction(0xc, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x8, &(0x7f00000001c0)) 20:00:21 executing program 4: rt_sigaction(0xc, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x8, &(0x7f00000001c0)) 20:00:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 20:00:21 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) preadv2(r0, &(0x7f0000000300)=[{&(0x7f00000000c0)=""/61, 0x3d}], 0x1, 0x2a, 0x0, 0x0) 20:00:21 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='hugetlbfs\x00', 0x200c40, 0x0) sendfile(r0, r1, 0x0, 0x800000080004103) 20:00:21 executing program 5: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffe0}}], 0x300, 0x4000000) sendmmsg(r0, &(0x7f0000004280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x24000800) 20:00:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae897094e71b0fa1f107000000364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb298802d8f6c1f3b18d6d352407f7018b31a53bad1ec3533c791a753a1fef2c560001000000000000fb8005128e7e4d939955f8ac396203784000400f573fbf000000000000000761f35e769f130dec95128ce7ec033dc0a380543b", 0xa0}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1e) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 20:00:21 executing program 4: rt_sigaction(0xc, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x8, &(0x7f00000001c0)) 20:00:21 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) preadv2(r0, &(0x7f0000000300)=[{&(0x7f00000000c0)=""/61, 0x3d}], 0x1, 0x2a, 0x0, 0x0) 20:00:21 executing program 4: rt_sigaction(0xc, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x8, &(0x7f00000001c0)) 20:00:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 20:00:21 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='hugetlbfs\x00', 0x200c40, 0x0) sendfile(r0, r1, 0x0, 0x800000080004103) 20:00:21 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) preadv2(r0, &(0x7f0000000300)=[{&(0x7f00000000c0)=""/61, 0x3d}], 0x1, 0x2a, 0x0, 0x0) 20:00:21 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffe0}}], 0x300, 0x4000000) sendmmsg(r0, &(0x7f0000004280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x24000800) 20:00:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 20:00:21 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.cpu_exclusive\x00', 0x2, 0x0) writev(r1, &(0x7f00000002c0)=[{&(0x7f0000000100)='0', 0x1}], 0x1) 20:00:21 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='hugetlbfs\x00', 0x200c40, 0x0) sendfile(r0, r1, 0x0, 0x800000080004103) 20:00:21 executing program 5: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffe0}}], 0x300, 0x4000000) sendmmsg(r0, &(0x7f0000004280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x24000800) [ 298.440478][T16686] new mount options do not match the existing superblock, will be ignored [ 298.478267][T16686] new mount options do not match the existing superblock, will be ignored 20:00:24 executing program 5: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffe0}}], 0x300, 0x4000000) sendmmsg(r0, &(0x7f0000004280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x24000800) 20:00:24 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 20:00:24 executing program 2: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYBLOB="07000000c79b9a19dfec76"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x5) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x1e) 20:00:24 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffe0}}], 0x300, 0x4000000) sendmmsg(r0, &(0x7f0000004280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x24000800) 20:00:24 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.cpu_exclusive\x00', 0x2, 0x0) writev(r1, &(0x7f00000002c0)=[{&(0x7f0000000100)='0', 0x1}], 0x1) 20:00:24 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000500)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 20:00:24 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f00000003c0)={0x48, 0x9, 0x80000000, "8d03cad60bbb4efef9a26290226219c138905190bd73fae661a0632959269cf999f3bff8cc3d6fe7d134123914cf971a0a3a645da664ad5c3e10170a7dfdf1cf30e2726ad6bd2140"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000780)=""/238, 0xee}, {&(0x7f0000000600)=""/180, 0xb4}, {&(0x7f0000000880)=""/154, 0x9a}, {&(0x7f0000000940)=""/195, 0xc3}, {&(0x7f0000000a40)=""/133, 0x85}], 0x6, 0x8, 0x17) r2 = syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x6, &(0x7f00000006c0)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002000000000000000500000025", 0x29, 0x1800}, {&(0x7f0000011100)="ed4100000004000029c4645f29c4645f29c4645f0000000000000200020000000000000003000000ff", 0x29, 0x4000}, {&(0x7f0000011700)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x9400}, {0x0, 0x0, 0x3fbfd}], 0x0, &(0x7f0000000180)=ANY=[]) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x0, 0x7, 0xff, 0x7, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xe9fcf139b1075607, 0x2, 0x0, 0x7, 0x401, 0x80, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0x5, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002100)='./file0\x00', 0x28) unlinkat(r2, &(0x7f0000000100)='./file0\x00', 0x200) symlink(&(0x7f00000000c0)='./file2\x00', &(0x7f0000000300)='./file1\x00') open(0x0, 0x10100, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000002040)) openat(0xffffffffffffffff, &(0x7f0000000500)='./file1\x00', 0x100, 0x0) dup(r2) rename(&(0x7f0000000040)='./file3\x00', &(0x7f0000000340)='./file1\x00') 20:00:24 executing program 2: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYBLOB="07000000c79b9a19dfec76"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x5) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x1e) 20:00:24 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.cpu_exclusive\x00', 0x2, 0x0) writev(r1, &(0x7f00000002c0)=[{&(0x7f0000000100)='0', 0x1}], 0x1) [ 301.253791][T16705] new mount options do not match the existing superblock, will be ignored 20:00:24 executing program 2: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYBLOB="07000000c79b9a19dfec76"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x5) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x1e) [ 301.337995][T16722] new mount options do not match the existing superblock, will be ignored [ 301.346659][T16720] loop0: detected capacity change from 0 to 1019 20:00:24 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffe0}}], 0x300, 0x4000000) sendmmsg(r0, &(0x7f0000004280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x24000800) 20:00:24 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.cpu_exclusive\x00', 0x2, 0x0) writev(r1, &(0x7f00000002c0)=[{&(0x7f0000000100)='0', 0x1}], 0x1) [ 301.400714][T16720] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 301.461174][T16736] new mount options do not match the existing superblock, will be ignored [ 301.472678][T16720] EXT4-fs error (device loop0): ext4_empty_dir:3003: inode #12: block 255: comm syz-executor.0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 301.492469][T16720] EXT4-fs warning (device loop0): ext4_empty_dir:3005: inode #12: comm syz-executor.0: directory missing '.' 20:00:24 executing program 2: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYBLOB="07000000c79b9a19dfec76"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x5) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x1e) 20:00:24 executing program 5: syz_mount_image$vfat(&(0x7f0000001200), &(0x7f0000001240)='./file1\x00', 0x0, 0x2, &(0x7f0000001780)=[{0x0, 0x0, 0x101}, {&(0x7f00000013c0)="0f78464a45dd4013a0bf1c37e2fa", 0xe, 0x8}], 0x0, &(0x7f0000001840)) 20:00:24 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f0000000040)="0100000000000000180100000508000300000000000000002f") 20:00:24 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ftruncate(r0, 0x2000001000000007) [ 301.517265][T16720] EXT4-fs error (device loop0): ext4_validate_block_bitmap:399: comm syz-executor.0: bg 0: block 3: invalid block bitmap [ 301.529975][T16720] EXT4-fs error (device loop0) in ext4_free_blocks:6036: Corrupt filesystem [ 301.546385][T16720] EXT4-fs error (device loop0): ext4_free_inode:353: comm syz-executor.0: bit already cleared for inode 12 20:00:25 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x5452, 0xfffffffffffffffc) [ 301.567878][T16746] loop5: detected capacity change from 0 to 1 [ 301.576334][T16746] FAT-fs (loop5): bogus logical sector size 17738 [ 301.582802][T16746] FAT-fs (loop5): Can't find a valid FAT filesystem [ 301.651917][T16746] loop5: detected capacity change from 0 to 1 [ 301.673332][T16746] FAT-fs (loop5): bogus logical sector size 17738 [ 301.679838][T16746] FAT-fs (loop5): Can't find a valid FAT filesystem 20:00:25 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ftruncate(r0, 0x2000001000000007) 20:00:25 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f0000000040)="0100000000000000180100000508000300000000000000002f") 20:00:25 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x5452, 0xfffffffffffffffc) 20:00:25 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f00000003c0)={0x48, 0x9, 0x80000000, "8d03cad60bbb4efef9a26290226219c138905190bd73fae661a0632959269cf999f3bff8cc3d6fe7d134123914cf971a0a3a645da664ad5c3e10170a7dfdf1cf30e2726ad6bd2140"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000780)=""/238, 0xee}, {&(0x7f0000000600)=""/180, 0xb4}, {&(0x7f0000000880)=""/154, 0x9a}, {&(0x7f0000000940)=""/195, 0xc3}, {&(0x7f0000000a40)=""/133, 0x85}], 0x6, 0x8, 0x17) r2 = syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x6, &(0x7f00000006c0)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002000000000000000500000025", 0x29, 0x1800}, {&(0x7f0000011100)="ed4100000004000029c4645f29c4645f29c4645f0000000000000200020000000000000003000000ff", 0x29, 0x4000}, {&(0x7f0000011700)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x9400}, {0x0, 0x0, 0x3fbfd}], 0x0, &(0x7f0000000180)=ANY=[]) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x0, 0x7, 0xff, 0x7, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xe9fcf139b1075607, 0x2, 0x0, 0x7, 0x401, 0x80, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0x5, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002100)='./file0\x00', 0x28) unlinkat(r2, &(0x7f0000000100)='./file0\x00', 0x200) symlink(&(0x7f00000000c0)='./file2\x00', &(0x7f0000000300)='./file1\x00') open(0x0, 0x10100, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000002040)) openat(0xffffffffffffffff, &(0x7f0000000500)='./file1\x00', 0x100, 0x0) dup(r2) rename(&(0x7f0000000040)='./file3\x00', &(0x7f0000000340)='./file1\x00') 20:00:25 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000500)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 20:00:25 executing program 5: syz_mount_image$vfat(&(0x7f0000001200), &(0x7f0000001240)='./file1\x00', 0x0, 0x2, &(0x7f0000001780)=[{0x0, 0x0, 0x101}, {&(0x7f00000013c0)="0f78464a45dd4013a0bf1c37e2fa", 0xe, 0x8}], 0x0, &(0x7f0000001840)) 20:00:25 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ftruncate(r0, 0x2000001000000007) 20:00:25 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ftruncate(r0, 0x2000001000000007) 20:00:25 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x5452, 0xfffffffffffffffc) [ 302.137704][T16764] loop5: detected capacity change from 0 to 1 [ 302.151924][T16766] loop0: detected capacity change from 0 to 1019 [ 302.176789][T16764] FAT-fs (loop5): bogus logical sector size 17738 20:00:25 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f0000000040)="0100000000000000180100000508000300000000000000002f") 20:00:25 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x5452, 0xfffffffffffffffc) 20:00:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fchown(r1, 0x0, 0x0) 20:00:25 executing program 5: syz_mount_image$vfat(&(0x7f0000001200), &(0x7f0000001240)='./file1\x00', 0x0, 0x2, &(0x7f0000001780)=[{0x0, 0x0, 0x101}, {&(0x7f00000013c0)="0f78464a45dd4013a0bf1c37e2fa", 0xe, 0x8}], 0x0, &(0x7f0000001840)) 20:00:25 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f0000000040)="0100000000000000180100000508000300000000000000002f") [ 302.183347][T16764] FAT-fs (loop5): Can't find a valid FAT filesystem [ 302.207891][T16766] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 20:00:25 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000400)={r3, 0x3, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000180)={r3, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x2, &(0x7f00000003c0)={r3, 0x3, 0x6, @broadcast}, 0x10) [ 302.296010][T16798] loop5: detected capacity change from 0 to 1 [ 302.304084][T16766] EXT4-fs error (device loop0): ext4_empty_dir:3003: inode #12: block 255: comm syz-executor.0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 302.323958][T16766] EXT4-fs warning (device loop0): ext4_empty_dir:3005: inode #12: comm syz-executor.0: directory missing '.' [ 302.335892][T16798] FAT-fs (loop5): bogus logical sector size 17738 [ 302.342359][T16798] FAT-fs (loop5): Can't find a valid FAT filesystem [ 302.348258][T16803] device lo entered promiscuous mode [ 302.353623][T16766] EXT4-fs error (device loop0): ext4_validate_block_bitmap:399: comm syz-executor.0: bg 0: block 3: invalid block bitmap [ 302.354668][T16801] device lo left promiscuous mode [ 302.367171][T16766] EXT4-fs error (device loop0) in ext4_free_blocks:6036: Corrupt filesystem [ 302.381471][T16803] device lo entered promiscuous mode 20:00:25 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f00000003c0)={0x48, 0x9, 0x80000000, "8d03cad60bbb4efef9a26290226219c138905190bd73fae661a0632959269cf999f3bff8cc3d6fe7d134123914cf971a0a3a645da664ad5c3e10170a7dfdf1cf30e2726ad6bd2140"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000780)=""/238, 0xee}, {&(0x7f0000000600)=""/180, 0xb4}, {&(0x7f0000000880)=""/154, 0x9a}, {&(0x7f0000000940)=""/195, 0xc3}, {&(0x7f0000000a40)=""/133, 0x85}], 0x6, 0x8, 0x17) r2 = syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x6, &(0x7f00000006c0)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002000000000000000500000025", 0x29, 0x1800}, {&(0x7f0000011100)="ed4100000004000029c4645f29c4645f29c4645f0000000000000200020000000000000003000000ff", 0x29, 0x4000}, {&(0x7f0000011700)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x9400}, {0x0, 0x0, 0x3fbfd}], 0x0, &(0x7f0000000180)=ANY=[]) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x0, 0x7, 0xff, 0x7, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xe9fcf139b1075607, 0x2, 0x0, 0x7, 0x401, 0x80, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0x5, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002100)='./file0\x00', 0x28) unlinkat(r2, &(0x7f0000000100)='./file0\x00', 0x200) symlink(&(0x7f00000000c0)='./file2\x00', &(0x7f0000000300)='./file1\x00') open(0x0, 0x10100, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000002040)) openat(0xffffffffffffffff, &(0x7f0000000500)='./file1\x00', 0x100, 0x0) dup(r2) rename(&(0x7f0000000040)='./file3\x00', &(0x7f0000000340)='./file1\x00') [ 302.381678][T16766] EXT4-fs error (device loop0): ext4_free_inode:353: comm syz-executor.0: bit already cleared for inode 12 [ 302.386924][T16801] device lo left promiscuous mode [ 302.497035][T16807] loop0: detected capacity change from 0 to 1019 [ 302.511965][T16807] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 302.524870][T16807] EXT4-fs error (device loop0): ext4_empty_dir:3003: inode #12: block 255: comm syz-executor.0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 302.544659][T16807] EXT4-fs warning (device loop0): ext4_empty_dir:3005: inode #12: comm syz-executor.0: directory missing '.' [ 302.556690][T16807] EXT4-fs error (device loop0): ext4_validate_block_bitmap:399: comm syz-executor.0: bg 0: block 3: invalid block bitmap [ 302.569392][T16807] EXT4-fs error (device loop0) in ext4_free_blocks:6036: Corrupt filesystem [ 302.578249][T16807] EXT4-fs error (device loop0): ext4_free_inode:353: comm syz-executor.0: bit already cleared for inode 12 20:00:26 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000500)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 20:00:26 executing program 2: r0 = getpgid(0x0) move_pages(r0, 0x0, 0x0, &(0x7f0000000240), 0x0, 0x0) 20:00:26 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fchown(r1, 0x0, 0x0) 20:00:26 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000400)={r3, 0x3, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000180)={r3, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x2, &(0x7f00000003c0)={r3, 0x3, 0x6, @broadcast}, 0x10) 20:00:26 executing program 5: syz_mount_image$vfat(&(0x7f0000001200), &(0x7f0000001240)='./file1\x00', 0x0, 0x2, &(0x7f0000001780)=[{0x0, 0x0, 0x101}, {&(0x7f00000013c0)="0f78464a45dd4013a0bf1c37e2fa", 0xe, 0x8}], 0x0, &(0x7f0000001840)) 20:00:26 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f00000003c0)={0x48, 0x9, 0x80000000, "8d03cad60bbb4efef9a26290226219c138905190bd73fae661a0632959269cf999f3bff8cc3d6fe7d134123914cf971a0a3a645da664ad5c3e10170a7dfdf1cf30e2726ad6bd2140"}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000780)=""/238, 0xee}, {&(0x7f0000000600)=""/180, 0xb4}, {&(0x7f0000000880)=""/154, 0x9a}, {&(0x7f0000000940)=""/195, 0xc3}, {&(0x7f0000000a40)=""/133, 0x85}], 0x6, 0x8, 0x17) r2 = syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x6, &(0x7f00000006c0)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002000000000000000500000025", 0x29, 0x1800}, {&(0x7f0000011100)="ed4100000004000029c4645f29c4645f29c4645f0000000000000200020000000000000003000000ff", 0x29, 0x4000}, {&(0x7f0000011700)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x9400}, {0x0, 0x0, 0x3fbfd}], 0x0, &(0x7f0000000180)=ANY=[]) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x0, 0x7, 0xff, 0x7, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xe9fcf139b1075607, 0x2, 0x0, 0x7, 0x401, 0x80, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0x5, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002100)='./file0\x00', 0x28) unlinkat(r2, &(0x7f0000000100)='./file0\x00', 0x200) symlink(&(0x7f00000000c0)='./file2\x00', &(0x7f0000000300)='./file1\x00') open(0x0, 0x10100, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000002040)) openat(0xffffffffffffffff, &(0x7f0000000500)='./file1\x00', 0x100, 0x0) dup(r2) rename(&(0x7f0000000040)='./file3\x00', &(0x7f0000000340)='./file1\x00') 20:00:26 executing program 2: r0 = getpgid(0x0) move_pages(r0, 0x0, 0x0, &(0x7f0000000240), 0x0, 0x0) 20:00:26 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fchown(r1, 0x0, 0x0) 20:00:26 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000400)={r3, 0x3, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000180)={r3, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x2, &(0x7f00000003c0)={r3, 0x3, 0x6, @broadcast}, 0x10) [ 303.020010][T16820] device lo entered promiscuous mode [ 303.027121][T16816] device lo left promiscuous mode [ 303.028901][T16825] loop5: detected capacity change from 0 to 1 [ 303.037703][T16823] loop0: detected capacity change from 0 to 1019 [ 303.044797][T16825] FAT-fs (loop5): bogus logical sector size 17738 [ 303.051265][T16825] FAT-fs (loop5): Can't find a valid FAT filesystem 20:00:26 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fchown(r1, 0x0, 0x0) 20:00:26 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000400)={r3, 0x3, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000180)={r3, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x2, &(0x7f00000003c0)={r3, 0x3, 0x6, @broadcast}, 0x10) 20:00:26 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000400)={r3, 0x3, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000180)={r3, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x2, &(0x7f00000003c0)={r3, 0x3, 0x6, @broadcast}, 0x10) [ 303.086279][T16835] device lo entered promiscuous mode [ 303.088325][T16823] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 303.099995][T16831] device lo left promiscuous mode [ 303.159175][T16844] device lo entered promiscuous mode [ 303.169627][T16845] device lo entered promiscuous mode [ 303.175509][T16840] device lo left promiscuous mode [ 303.185048][T16841] device lo left promiscuous mode [ 303.197911][T16823] EXT4-fs error (device loop0): ext4_empty_dir:3003: inode #12: block 255: comm syz-executor.0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 303.217591][T16823] EXT4-fs warning (device loop0): ext4_empty_dir:3005: inode #12: comm syz-executor.0: directory missing '.' [ 303.233021][T16823] EXT4-fs error (device loop0): ext4_validate_block_bitmap:399: comm syz-executor.0: bg 0: block 3: invalid block bitmap [ 303.245699][T16823] EXT4-fs error (device loop0) in ext4_free_blocks:6036: Corrupt filesystem [ 303.254741][T16823] EXT4-fs error (device loop0): ext4_free_inode:353: comm syz-executor.0: bit already cleared for inode 12 20:00:27 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000500)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 20:00:27 executing program 2: r0 = getpgid(0x0) move_pages(r0, 0x0, 0x0, &(0x7f0000000240), 0x0, 0x0) 20:00:27 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000400)={r3, 0x3, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000180)={r3, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x2, &(0x7f00000003c0)={r3, 0x3, 0x6, @broadcast}, 0x10) 20:00:27 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000400)={r3, 0x3, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000180)={r3, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x2, &(0x7f00000003c0)={r3, 0x3, 0x6, @broadcast}, 0x10) 20:00:27 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000004c0), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000500)={0x58, r1, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_TAGLST={0x34, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0xb}, {0x5}]}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x58}}, 0x0) 20:00:27 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000100)=""/241, 0x18) getdents(r0, &(0x7f0000000240)=""/143, 0x8f) 20:00:27 executing program 2: r0 = getpgid(0x0) move_pages(r0, 0x0, 0x0, &(0x7f0000000240), 0x0, 0x0) [ 303.893177][T16858] device lo entered promiscuous mode [ 303.898914][T16856] device lo entered promiscuous mode [ 303.900328][T16859] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 303.912284][T16859] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 303.913646][T16852] device lo left promiscuous mode [ 303.926429][T16862] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 20:00:27 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000100)=""/241, 0x18) getdents(r0, &(0x7f0000000240)=""/143, 0x8f) 20:00:27 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000400)={r3, 0x3, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000180)={r3, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x2, &(0x7f00000003c0)={r3, 0x3, 0x6, @broadcast}, 0x10) 20:00:27 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000400)={r3, 0x3, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000180)={r3, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x2, &(0x7f00000003c0)={r3, 0x3, 0x6, @broadcast}, 0x10) 20:00:27 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000004c0), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000500)={0x58, r1, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_TAGLST={0x34, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0xb}, {0x5}]}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x58}}, 0x0) [ 303.934625][T16862] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 303.958494][T16849] device lo left promiscuous mode 20:00:27 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000100)=""/241, 0x18) getdents(r0, &(0x7f0000000240)=""/143, 0x8f) [ 304.013805][T16873] device lo entered promiscuous mode [ 304.019847][T16875] device lo entered promiscuous mode [ 304.025809][T16876] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 304.030968][T16869] device lo left promiscuous mode [ 304.033978][T16876] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 304.056597][T16870] device lo left promiscuous mode 20:00:28 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{}, {0x64}, {0x6}]}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, 0x0) 20:00:28 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000100)=""/241, 0x18) getdents(r0, &(0x7f0000000240)=""/143, 0x8f) 20:00:28 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000100)=""/241, 0x18) getdents(r0, &(0x7f0000000240)=""/143, 0x8f) 20:00:28 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000400)={r3, 0x3, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000180)={r3, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x2, &(0x7f00000003c0)={r3, 0x3, 0x6, @broadcast}, 0x10) 20:00:28 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000004c0), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000500)={0x58, r1, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_TAGLST={0x34, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0xb}, {0x5}]}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x58}}, 0x0) 20:00:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0xfd06) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x56) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f00000001c0)=ANY=[@ANYBLOB="001e"], 0xf8) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000040), 0x8) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4) [ 304.764653][T16887] device lo entered promiscuous mode [ 304.780314][T16884] device lo left promiscuous mode [ 304.788945][T16890] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 304.797070][T16890] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 20:00:28 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000100)=""/241, 0x18) getdents(r0, &(0x7f0000000240)=""/143, 0x8f) 20:00:28 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x2, &(0x7f0000000000)=0x7ff, 0x7) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 20:00:28 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000100)=""/241, 0x18) getdents(r0, &(0x7f0000000240)=""/143, 0x8f) 20:00:28 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000004c0), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000500)={0x58, r1, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_TAGLST={0x34, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0xb}, {0x5}]}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x58}}, 0x0) [ 304.806378][ T25] audit: type=1326 audit(1623355228.222:2070): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16881 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 20:00:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0xfd06) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x56) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f00000001c0)=ANY=[@ANYBLOB="001e"], 0xf8) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000040), 0x8) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4) 20:00:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0xfd06) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x56) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f00000001c0)=ANY=[@ANYBLOB="001e"], 0xf8) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000040), 0x8) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4) [ 304.888150][T16904] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 304.896312][T16904] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 305.617550][ T25] audit: type=1326 audit(1623355229.042:2071): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16881 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 20:00:29 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{}, {0x64}, {0x6}]}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, 0x0) 20:00:29 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800004, 0x12, r0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x2) getsockopt$inet6_opts(r1, 0x29, 0x19, 0x0, &(0x7f00000014c0)) 20:00:29 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x2, &(0x7f0000000000)=0x7ff, 0x7) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 20:00:29 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae897094e7b126b097eaa769be6d28c41bd34e677d114b655ef5f0166391c68f72e44e260f82e8", 0x2b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:00:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0xfd06) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x56) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f00000001c0)=ANY=[@ANYBLOB="001e"], 0xf8) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000040), 0x8) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4) 20:00:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0xfd06) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x56) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f00000001c0)=ANY=[@ANYBLOB="001e"], 0xf8) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000040), 0x8) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4) 20:00:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0xfd06) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x56) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f00000001c0)=ANY=[@ANYBLOB="001e"], 0xf8) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000040), 0x8) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4) 20:00:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0xfd06) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x56) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f00000001c0)=ANY=[@ANYBLOB="001e"], 0xf8) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000040), 0x8) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4) 20:00:29 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800004, 0x12, r0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x2) getsockopt$inet6_opts(r1, 0x29, 0x19, 0x0, &(0x7f00000014c0)) 20:00:29 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x2, &(0x7f0000000000)=0x7ff, 0x7) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 305.719517][ T25] audit: type=1326 audit(1623355229.152:2072): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16921 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 20:00:29 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{}, {0x64}, {0x6}]}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, 0x0) 20:00:29 executing program 0: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x2, 0x0, r3, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r5, 0x0) io_uring_enter(r0, 0x6196, 0x0, 0x0, 0x0, 0x0) [ 305.841848][ T25] audit: type=1326 audit(1623355229.272:2073): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16945 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 20:00:29 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800004, 0x12, r0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x2) getsockopt$inet6_opts(r1, 0x29, 0x19, 0x0, &(0x7f00000014c0)) 20:00:29 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{}, {0x64}, {0x6}]}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, 0x0) 20:00:29 executing program 0: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x2, 0x0, r3, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r5, 0x0) io_uring_enter(r0, 0x6196, 0x0, 0x0, 0x0, 0x0) [ 306.585336][ T25] audit: type=1326 audit(1623355230.012:2074): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16958 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 20:00:32 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae897094e7b126b097eaa769be6d28c41bd34e677d114b655ef5f0166391c68f72e44e260f82e8", 0x2b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:00:32 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) set_mempolicy(0x2, &(0x7f0000000000)=0x7ff, 0x7) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 20:00:32 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800004, 0x12, r0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x2) getsockopt$inet6_opts(r1, 0x29, 0x19, 0x0, &(0x7f00000014c0)) 20:00:32 executing program 0: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x2, 0x0, r3, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r5, 0x0) io_uring_enter(r0, 0x6196, 0x0, 0x0, 0x0, 0x0) 20:00:32 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{}, {0x64}, {0x6}]}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, 0x0) 20:00:32 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{}, {0x64}, {0x6}]}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, 0x0) 20:00:32 executing program 2: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00@\b@'], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe69}, {0x0}, {&(0x7f00000193c0)=""/102385, 0x6fe4}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x1e) [ 308.723675][ T25] audit: type=1326 audit(1623355232.152:2075): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16971 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 20:00:32 executing program 0: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x2, 0x0, r3, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r5, 0x0) io_uring_enter(r0, 0x6196, 0x0, 0x0, 0x0, 0x0) 20:00:32 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x9effffff}, 0x0) [ 308.768702][ T25] audit: type=1326 audit(1623355232.202:2076): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16970 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 20:00:32 executing program 2: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00@\b@'], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe69}, {0x0}, {&(0x7f00000193c0)=""/102385, 0x6fe4}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x1e) 20:00:32 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xc5, &(0x7f0000000440)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689c9c6a47312334c2a97ac2b7f0fb4aabebae8dc5dffbcd48a70502173d6efa56b60f48cf0c9d0989ecbbfc220bd2b39df9ad8d6b14910f4a869863009780dd6e673a02f7ed829932929af9dffb1fa2cd7328202ac55f4f5dbb8494120f79d5f60958691a8a3fcf561c33f46ab89803f47d97e04f7bf9cafb006ae29480408c8380cf060dd72462ccc5b7d195a113bc539df6591cd57"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 20:00:32 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x9effffff}, 0x0) 20:00:35 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae897094e7b126b097eaa769be6d28c41bd34e677d114b655ef5f0166391c68f72e44e260f82e8", 0x2b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:00:35 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x9effffff}, 0x0) 20:00:35 executing program 2: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00@\b@'], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe69}, {0x0}, {&(0x7f00000193c0)=""/102385, 0x6fe4}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x1e) 20:00:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xc5, &(0x7f0000000440)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689c9c6a47312334c2a97ac2b7f0fb4aabebae8dc5dffbcd48a70502173d6efa56b60f48cf0c9d0989ecbbfc220bd2b39df9ad8d6b14910f4a869863009780dd6e673a02f7ed829932929af9dffb1fa2cd7328202ac55f4f5dbb8494120f79d5f60958691a8a3fcf561c33f46ab89803f47d97e04f7bf9cafb006ae29480408c8380cf060dd72462ccc5b7d195a113bc539df6591cd57"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 20:00:35 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{}, {0x64}, {0x6}]}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, 0x0) 20:00:35 executing program 5: r0 = epoll_create1(0x0) r1 = syz_io_uring_setup(0x240b, &(0x7f0000001740), &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000140), &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f00000001c0)) 20:00:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xc5, &(0x7f0000000440)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689c9c6a47312334c2a97ac2b7f0fb4aabebae8dc5dffbcd48a70502173d6efa56b60f48cf0c9d0989ecbbfc220bd2b39df9ad8d6b14910f4a869863009780dd6e673a02f7ed829932929af9dffb1fa2cd7328202ac55f4f5dbb8494120f79d5f60958691a8a3fcf561c33f46ab89803f47d97e04f7bf9cafb006ae29480408c8380cf060dd72462ccc5b7d195a113bc539df6591cd57"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 20:00:35 executing program 5: r0 = epoll_create1(0x0) r1 = syz_io_uring_setup(0x240b, &(0x7f0000001740), &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000140), &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f00000001c0)) 20:00:35 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x9effffff}, 0x0) [ 311.740295][ T25] audit: type=1326 audit(1623355235.173:2077): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17011 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 20:00:35 executing program 2: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00@\b@'], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe69}, {0x0}, {&(0x7f00000193c0)=""/102385, 0x6fe4}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x1e) 20:00:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xc5, &(0x7f0000000440)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689c9c6a47312334c2a97ac2b7f0fb4aabebae8dc5dffbcd48a70502173d6efa56b60f48cf0c9d0989ecbbfc220bd2b39df9ad8d6b14910f4a869863009780dd6e673a02f7ed829932929af9dffb1fa2cd7328202ac55f4f5dbb8494120f79d5f60958691a8a3fcf561c33f46ab89803f47d97e04f7bf9cafb006ae29480408c8380cf060dd72462ccc5b7d195a113bc539df6591cd57"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 20:00:35 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x802, 0x0) epoll_create1(0x80000) write$binfmt_elf64(r0, &(0x7f0000000880)=ANY=[@ANYBLOB="7f454c469efb00200000210200000000000040000000000000003600000000000000d90900000900380000000900d00000000100000008000000010000800000000001040000000000000100010000000000ffff00000000000005000000000000009600000000000000a74aefa6ae322bd2c90a8c39a8e102213765d982a69a4a8b7b7b06159ae5f0a06d04dc57730fd181baae533cb38128e4ba71ace2058bf377fdee126d50e047e7b4c35026b94ca2f3597047992d9b3ca19c38232b047cf81df2e0161f49d41669157ec38c1bef0fc681a5737a8fbdaa851986f8ab86ac7389f96aaa0c9b71e0e5a25ba51a3084bf5e87a8ab8937bbc4e3b234e2bfed011a344498fb50e377331b32abeda6983c8cb0e48a73be76719dafea3c57557474f306d07f06c2cd0342bb7a4817cc1d7e13d57015a4694ddea9c55184a89c6207699bcf708a337c3e0135a050f172b762e5e13cb07a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006338000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006f00"/1052], 0x763) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000180)=""/221, 0xdd}, {&(0x7f0000000380)=""/229, 0xe5}], 0x2, 0x3, 0x8000) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7ffff000) 20:00:38 executing program 2: unshare(0x20000400) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x1, &(0x7f0000000080)="1334dfec2b8de633a796da91d174fbc8", 0x10) 20:00:38 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae897094e7b126b097eaa769be6d28c41bd34e677d114b655ef5f0166391c68f72e44e260f82e8", 0x2b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:00:38 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x3, &(0x7f0000000000)={{{@in6=@private0, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@local}, 0x0, @in6=@remote}}, 0xe8) 20:00:38 executing program 5: r0 = epoll_create1(0x0) r1 = syz_io_uring_setup(0x240b, &(0x7f0000001740), &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000140), &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f00000001c0)) 20:00:38 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) set_mempolicy(0x1, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f00000029c0)=[{{&(0x7f0000000000)={0x2, 0x4e21, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000002680)=[@ip_retopts={{0x10}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @remote}}}], 0x30}}], 0x1, 0x0) 20:00:38 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000340)=0x1, 0x4) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000180)=ANY=[], 0x120) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 20:00:38 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000340)=0x1, 0x4) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000180)=ANY=[], 0x120) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 20:00:38 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) set_mempolicy(0x1, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f00000029c0)=[{{&(0x7f0000000000)={0x2, 0x4e21, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000002680)=[@ip_retopts={{0x10}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @remote}}}], 0x30}}], 0x1, 0x0) 20:00:38 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = socket$inet(0x2, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x7c) dup3(r1, r0, 0x0) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) 20:00:38 executing program 2: unshare(0x20000400) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x1, &(0x7f0000000080)="1334dfec2b8de633a796da91d174fbc8", 0x10) 20:00:38 executing program 5: r0 = epoll_create1(0x0) r1 = syz_io_uring_setup(0x240b, &(0x7f0000001740), &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000140), &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f00000001c0)) 20:00:38 executing program 2: unshare(0x20000400) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x1, &(0x7f0000000080)="1334dfec2b8de633a796da91d174fbc8", 0x10) 20:00:38 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000340)=0x1, 0x4) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000180)=ANY=[], 0x120) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 20:00:41 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000340)=0x1, 0x4) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000180)=ANY=[], 0x120) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 20:00:41 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) set_mempolicy(0x1, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f00000029c0)=[{{&(0x7f0000000000)={0x2, 0x4e21, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000002680)=[@ip_retopts={{0x10}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @remote}}}], 0x30}}], 0x1, 0x0) 20:00:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = socket$inet(0x2, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x7c) dup3(r1, r0, 0x0) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) 20:00:41 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) 20:00:41 executing program 2: unshare(0x20000400) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x1, &(0x7f0000000080)="1334dfec2b8de633a796da91d174fbc8", 0x10) 20:00:41 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x0, 0x11, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000000)=""/80, 0x50}], 0x1, 0x8, 0x3) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240), 0x4) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee00) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x0, 0xea60}, 0x10) madvise(&(0x7f000000a000/0x1000)=nil, 0x1002, 0x15) sendmsg$NFT_MSG_GETOBJ_RESET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c000000150a0000b79b57476200000000000011000700000908000340000000020900010073797a3100000100000400000000ff040900020073797a"], 0x3c}, 0x1, 0x0, 0x0, 0x20000800}, 0x40004) [ 317.782614][T17094] ------------[ cut here ]------------ [ 317.788149][T17094] trying to isolate tail page [ 317.788321][T17094] WARNING: CPU: 0 PID: 17094 at mm/vmscan.c:1960 isolate_lru_page+0x360/0x370 [ 317.802052][T17094] Modules linked in: [ 317.805929][T17094] CPU: 0 PID: 17094 Comm: syz-executor.4 Not tainted 5.13.0-rc5-syzkaller #0 [ 317.814792][T17094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.824962][T17094] RIP: 0010:isolate_lru_page+0x360/0x370 20:00:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = socket$inet(0x2, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x7c) dup3(r1, r0, 0x0) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) 20:00:41 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) set_mempolicy(0x1, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f00000029c0)=[{{&(0x7f0000000000)={0x2, 0x4e21, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000002680)=[@ip_retopts={{0x10}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @remote}}}], 0x30}}], 0x1, 0x0) 20:00:41 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000001b40), 0x0, 0x0) read(r0, 0x0, 0x0) [ 317.830662][T17094] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 8e 1d f2 ff 48 c7 c7 cf 20 3b 83 31 c0 e8 a0 57 da ff <0f> 0b e9 01 fd ff ff e8 74 1d f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 317.850301][T17094] RSP: 0018:ffffc9000059bb08 EFLAGS: 00010246 [ 317.856364][T17094] RAX: d42b8d683f4d9400 RBX: 0000000000000001 RCX: 0000000000040000 [ 317.864341][T17094] RDX: ffffc9000dd39000 RSI: 0000000000000a60 RDI: 0000000000000a61 [ 317.872329][T17094] RBP: ffffea0004af4c00 R08: ffffffff81299b8c R09: 0001c9000059b8b7 20:00:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = socket$inet(0x2, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x7c) dup3(r1, r0, 0x0) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) [ 317.880495][T17094] R10: 0000000000000002 R11: ffff88812c4b5000 R12: ffffea0004af4c80 [ 317.888487][T17094] R13: ffff88812bbfc050 R14: ffffea0004af4c88 R15: 000000002000a000 [ 317.896502][T17094] FS: 00007ff0fccc8700(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 317.905442][T17094] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 317.912123][T17094] CR2: 0000000020000100 CR3: 0000000107988000 CR4: 00000000001506f0 [ 317.920108][T17094] Call Trace: [ 317.923373][T17094] madvise_cold_or_pageout_pte_range+0x4b1/0x690 20:00:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)="11", 0x1, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000180)="f7ba089ca7bb05f79231ca46bd54c240ae3caede98793878fa431d751dcf36b0bfe5b2a0683d43fb1a74b9348009b9db48d2b3409d2cddcb44669565b0af53683c56b843f68ce3b9ea3a9688a4e03cfd831c5f57d27a33e9c6a2baff70227082dc52dd6d37c25b9b8fc7808b82bee924351f71bcded0efb1a48afdd62105162bbff331701c6f17efcd734e895472914154b9c74fe76d613d2ee3388730312ffc9c4ea0ba974de308090f6622567c5062174153b7c7ea91d6c96f050649f8a752", 0xc0, 0x0, 0x0, 0x0) recvfrom$inet(r0, &(0x7f0000001440)=""/4094, 0xc1, 0x40008142, 0x0, 0x0) [ 317.929731][T17094] ? swapin_walk_pmd_entry+0x320/0x320 [ 317.935184][T17094] __walk_page_range+0x93f/0x10e0 [ 317.940229][T17094] walk_page_range+0x111/0x2e0 [ 317.945089][T17094] do_madvise+0x84e/0x1050 [ 317.949521][T17094] ? __schedule+0x427/0x5b0 [ 317.954016][T17094] ? __fpregs_load_activate+0x103/0x1b0 [ 317.959714][T17094] __x64_sys_madvise+0x5d/0x70 [ 317.964476][T17094] do_syscall_64+0x4a/0x90 [ 317.968927][T17094] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 317.974825][T17094] RIP: 0033:0x4665d9 20:00:41 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='cpu<\n\n00\n\x02\x00\xc8 \xf4\xb3\xca\f\x90|\x1ff\xf0\xd2\x9ba\xdd\xba\x93\xf3\xa2\x97e\xd7\xa37\xc0\xae$\xef\x1f\x1feq*\xeb\x00\xffx\x7fV-W\xeb\x9c\xf5\xe5!d\x99]\x17~\x9e\\\xac\x1f\x93\x00\x00\x00\x80T\"\x00\x00\x00\x00\x05\x00'/89) [ 317.978729][T17094] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 317.998483][T17094] RSP: 002b:00007ff0fccc8188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 318.006888][T17094] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 318.014869][T17094] RDX: 0000000000000015 RSI: 0000000000001002 RDI: 000000002000a000 [ 318.022863][T17094] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 20:00:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)="11", 0x1, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000180)="f7ba089ca7bb05f79231ca46bd54c240ae3caede98793878fa431d751dcf36b0bfe5b2a0683d43fb1a74b9348009b9db48d2b3409d2cddcb44669565b0af53683c56b843f68ce3b9ea3a9688a4e03cfd831c5f57d27a33e9c6a2baff70227082dc52dd6d37c25b9b8fc7808b82bee924351f71bcded0efb1a48afdd62105162bbff331701c6f17efcd734e895472914154b9c74fe76d613d2ee3388730312ffc9c4ea0ba974de308090f6622567c5062174153b7c7ea91d6c96f050649f8a752", 0xc0, 0x0, 0x0, 0x0) recvfrom$inet(r0, &(0x7f0000001440)=""/4094, 0xc1, 0x40008142, 0x0, 0x0) 20:00:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)="11", 0x1, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000180)="f7ba089ca7bb05f79231ca46bd54c240ae3caede98793878fa431d751dcf36b0bfe5b2a0683d43fb1a74b9348009b9db48d2b3409d2cddcb44669565b0af53683c56b843f68ce3b9ea3a9688a4e03cfd831c5f57d27a33e9c6a2baff70227082dc52dd6d37c25b9b8fc7808b82bee924351f71bcded0efb1a48afdd62105162bbff331701c6f17efcd734e895472914154b9c74fe76d613d2ee3388730312ffc9c4ea0ba974de308090f6622567c5062174153b7c7ea91d6c96f050649f8a752", 0xc0, 0x0, 0x0, 0x0) recvfrom$inet(r0, &(0x7f0000001440)=""/4094, 0xc1, 0x40008142, 0x0, 0x0) [ 318.030857][T17094] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 318.038862][T17094] R13: 00007ffc3e3d747f R14: 00007ff0fccc8300 R15: 0000000000022000 [ 318.046826][T17094] ---[ end trace 89978b70e20977f4 ]--- [ 318.052362][T17094] ------------[ cut here ]------------ [ 318.057812][T17094] trying to isolate tail page [ 318.057963][T17094] WARNING: CPU: 0 PID: 17094 at mm/vmscan.c:1960 isolate_lru_page+0x360/0x370 [ 318.071505][T17094] Modules linked in: 20:00:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)="11", 0x1, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000180)="f7ba089ca7bb05f79231ca46bd54c240ae3caede98793878fa431d751dcf36b0bfe5b2a0683d43fb1a74b9348009b9db48d2b3409d2cddcb44669565b0af53683c56b843f68ce3b9ea3a9688a4e03cfd831c5f57d27a33e9c6a2baff70227082dc52dd6d37c25b9b8fc7808b82bee924351f71bcded0efb1a48afdd62105162bbff331701c6f17efcd734e895472914154b9c74fe76d613d2ee3388730312ffc9c4ea0ba974de308090f6622567c5062174153b7c7ea91d6c96f050649f8a752", 0xc0, 0x0, 0x0, 0x0) recvfrom$inet(r0, &(0x7f0000001440)=""/4094, 0xc1, 0x40008142, 0x0, 0x0) [ 318.075390][T17094] CPU: 0 PID: 17094 Comm: syz-executor.4 Tainted: G W 5.13.0-rc5-syzkaller #0 [ 318.085584][T17094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.095684][T17094] RIP: 0010:isolate_lru_page+0x360/0x370 [ 318.101330][T17094] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 8e 1d f2 ff 48 c7 c7 cf 20 3b 83 31 c0 e8 a0 57 da ff <0f> 0b e9 01 fd ff ff e8 74 1d f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 318.120979][T17094] RSP: 0018:ffffc9000059bb08 EFLAGS: 00010246 [ 318.127130][T17094] RAX: d42b8d683f4d9400 RBX: 0000000000000001 RCX: 0000000000040000 [ 318.135121][T17094] RDX: ffffc9000dd39000 RSI: 0000000000020b7f RDI: 0000000000020b80 [ 318.143102][T17094] RBP: ffffea0004af4c00 R08: ffffffff81299b8c R09: 0001c9000059b8b7 [ 318.151093][T17094] R10: 0000000000000002 R11: ffff88812c4b5000 R12: ffffea0004af4cc0 [ 318.159086][T17094] R13: ffff88812bbfc058 R14: ffffea0004af4cc8 R15: 000000002000b000 [ 318.167068][T17094] FS: 00007ff0fccc8700(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 318.176046][T17094] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 318.182696][T17094] CR2: 0000000020000100 CR3: 0000000107988000 CR4: 00000000001506f0 [ 318.190670][T17094] Call Trace: [ 318.193935][T17094] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 318.200333][T17094] ? swapin_walk_pmd_entry+0x320/0x320 [ 318.205851][T17094] __walk_page_range+0x93f/0x10e0 [ 318.210947][T17094] walk_page_range+0x111/0x2e0 [ 318.215744][T17094] do_madvise+0x84e/0x1050 [ 318.220158][T17094] ? __schedule+0x427/0x5b0 [ 318.224716][T17094] ? __fpregs_load_activate+0x103/0x1b0 [ 318.230285][T17094] __x64_sys_madvise+0x5d/0x70 [ 318.235067][T17094] do_syscall_64+0x4a/0x90 [ 318.239491][T17094] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 318.245381][T17094] RIP: 0033:0x4665d9 [ 318.249279][T17094] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 318.268942][T17094] RSP: 002b:00007ff0fccc8188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 318.277363][T17094] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 318.285411][T17094] RDX: 0000000000000015 RSI: 0000000000001002 RDI: 000000002000a000 [ 318.293395][T17094] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 318.301411][T17094] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 318.309389][T17094] R13: 00007ffc3e3d747f R14: 00007ff0fccc8300 R15: 0000000000022000 [ 318.317351][T17094] ---[ end trace 89978b70e20977f5 ]--- 20:00:41 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) 20:00:41 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12a}], 0x1000009e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x37, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() tkill(r1, 0x40) [ 318.338838][T17094] ------------[ cut here ]------------ [ 318.344345][T17094] trying to isolate tail page [ 318.344411][T17094] WARNING: CPU: 0 PID: 17094 at mm/vmscan.c:1960 isolate_lru_page+0x360/0x370 [ 318.357982][T17094] Modules linked in: [ 318.361900][T17094] CPU: 0 PID: 17094 Comm: syz-executor.4 Tainted: G W 5.13.0-rc5-syzkaller #0 [ 318.372058][T17094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.382170][T17094] RIP: 0010:isolate_lru_page+0x360/0x370 [ 318.387831][T17094] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 8e 1d f2 ff 48 c7 c7 cf 20 3b 83 31 c0 e8 a0 57 da ff <0f> 0b e9 01 fd ff ff e8 74 1d f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 318.407604][T17094] RSP: 0018:ffffc9000059bb08 EFLAGS: 00010246 [ 318.413714][T17094] RAX: d42b8d683f4d9400 RBX: 0000000000000001 RCX: 0000000000040000 [ 318.421701][T17094] RDX: ffffc9000dd39000 RSI: 0000000000000a3a RDI: 0000000000000a3b [ 318.429688][T17094] RBP: ffffea0004af4c00 R08: ffffffff81299b8c R09: 0001c9000059b8b7 [ 318.437656][T17094] R10: 0000000000000002 R11: ffff88812c4b5000 R12: ffffea0004af4c80 [ 318.445653][T17094] R13: ffff88812bbfc050 R14: ffffea0004af4c88 R15: 000000002000a000 [ 318.453689][T17094] FS: 00007ff0fccc8700(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 318.462671][T17094] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 318.469283][T17094] CR2: 0000000020000100 CR3: 0000000107988000 CR4: 00000000001506f0 [ 318.477255][T17094] Call Trace: [ 318.480536][T17094] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 318.486934][T17094] ? swapin_walk_pmd_entry+0x320/0x320 [ 318.492418][T17094] __walk_page_range+0x93f/0x10e0 [ 318.497560][T17094] walk_page_range+0x111/0x2e0 [ 318.502325][T17094] do_madvise+0x84e/0x1050 [ 318.506742][T17094] ? sock_setsockopt+0x17b/0x2090 [ 318.511764][T17094] ? __fpregs_load_activate+0x8f/0x1b0 [ 318.517225][T17094] __x64_sys_madvise+0x5d/0x70 [ 318.521987][T17094] do_syscall_64+0x4a/0x90 [ 318.526452][T17094] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 318.532455][T17094] RIP: 0033:0x4665d9 [ 318.536354][T17094] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 318.555959][T17094] RSP: 002b:00007ff0fccc8188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 318.564424][T17094] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 318.572416][T17094] RDX: 0000000000000015 RSI: 0000000000001002 RDI: 000000002000a000 [ 318.580421][T17094] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 318.588399][T17094] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 318.596354][T17094] R13: 00007ffc3e3d747f R14: 00007ff0fccc8300 R15: 0000000000022000 [ 318.604327][T17094] ---[ end trace 89978b70e20977f6 ]--- [ 318.609788][T17094] ------------[ cut here ]------------ [ 318.615232][T17094] trying to isolate tail page [ 318.615318][T17094] WARNING: CPU: 0 PID: 17094 at mm/vmscan.c:1960 isolate_lru_page+0x360/0x370 [ 318.628854][T17094] Modules linked in: [ 318.632787][T17094] CPU: 0 PID: 17094 Comm: syz-executor.4 Tainted: G W 5.13.0-rc5-syzkaller #0 [ 318.643031][T17094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.653113][T17094] RIP: 0010:isolate_lru_page+0x360/0x370 [ 318.658768][T17094] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 8e 1d f2 ff 48 c7 c7 cf 20 3b 83 31 c0 e8 a0 57 da ff <0f> 0b e9 01 fd ff ff e8 74 1d f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 318.678664][T17094] RSP: 0018:ffffc9000059bb08 EFLAGS: 00010246 [ 318.684795][T17094] RAX: d42b8d683f4d9400 RBX: 0000000000000001 RCX: 0000000000040000 [ 318.692760][T17094] RDX: ffffc9000dd39000 RSI: 000000000002316e RDI: 000000000002316f [ 318.700759][T17094] RBP: ffffea0004af4c00 R08: ffffffff81299b8c R09: 0001c9000059b8b7 [ 318.708735][T17094] R10: 0000000000000002 R11: ffff88812c4b5000 R12: ffffea0004af4cc0 [ 318.716697][T17094] R13: ffff88812bbfc058 R14: ffffea0004af4cc8 R15: 000000002000b000 [ 318.724674][T17094] FS: 00007ff0fccc8700(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 318.733632][T17094] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 318.740256][T17094] CR2: 0000000020000100 CR3: 0000000107988000 CR4: 00000000001506f0 [ 318.748261][T17094] Call Trace: [ 318.751560][T17094] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 318.758030][T17094] ? swapin_walk_pmd_entry+0x320/0x320 [ 318.763490][T17094] __walk_page_range+0x93f/0x10e0 [ 318.768523][T17094] walk_page_range+0x111/0x2e0 [ 318.773283][T17094] do_madvise+0x84e/0x1050 [ 318.777701][T17094] ? sock_setsockopt+0x17b/0x2090 [ 318.782748][T17094] ? __fpregs_load_activate+0x8f/0x1b0 [ 318.788248][T17094] __x64_sys_madvise+0x5d/0x70 [ 318.793004][T17094] do_syscall_64+0x4a/0x90 [ 318.797485][T17094] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 318.803461][T17094] RIP: 0033:0x4665d9 [ 318.807353][T17094] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 318.826967][T17094] RSP: 002b:00007ff0fccc8188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c 20:00:42 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x0, 0x11, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000000)=""/80, 0x50}], 0x1, 0x8, 0x3) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240), 0x4) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee00) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x0, 0xea60}, 0x10) madvise(&(0x7f000000a000/0x1000)=nil, 0x1002, 0x15) sendmsg$NFT_MSG_GETOBJ_RESET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c000000150a0000b79b57476200000000000011000700000908000340000000020900010073797a3100000100000400000000ff040900020073797a"], 0x3c}, 0x1, 0x0, 0x0, 0x20000800}, 0x40004) 20:00:42 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000200)) 20:00:42 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='cpu<\n\n00\n\x02\x00\xc8 \xf4\xb3\xca\f\x90|\x1ff\xf0\xd2\x9ba\xdd\xba\x93\xf3\xa2\x97e\xd7\xa37\xc0\xae$\xef\x1f\x1feq*\xeb\x00\xffx\x7fV-W\xeb\x9c\xf5\xe5!d\x99]\x17~\x9e\\\xac\x1f\x93\x00\x00\x00\x80T\"\x00\x00\x00\x00\x05\x00'/89) 20:00:42 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000001b40), 0x0, 0x0) read(r0, 0x0, 0x0) 20:00:42 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) 20:00:42 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) [ 318.835470][T17094] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 318.843475][T17094] RDX: 0000000000000015 RSI: 0000000000001002 RDI: 000000002000a000 [ 318.851458][T17094] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 318.859476][T17094] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 318.867436][T17094] R13: 00007ffc3e3d747f R14: 00007ff0fccc8300 R15: 0000000000022000 [ 318.875421][T17094] ---[ end trace 89978b70e20977f7 ]--- 20:00:42 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000001b40), 0x0, 0x0) read(r0, 0x0, 0x0) [ 318.941942][T17152] ------------[ cut here ]------------ [ 318.947456][T17152] trying to isolate tail page [ 318.947589][T17152] WARNING: CPU: 1 PID: 17152 at mm/vmscan.c:1960 isolate_lru_page+0x360/0x370 [ 318.961531][T17152] Modules linked in: [ 318.965538][T17152] CPU: 1 PID: 17152 Comm: syz-executor.4 Tainted: G W 5.13.0-rc5-syzkaller #0 [ 318.975821][T17152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.985888][T17152] RIP: 0010:isolate_lru_page+0x360/0x370 [ 318.991547][T17152] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 8e 1d f2 ff 48 c7 c7 cf 20 3b 83 31 c0 e8 a0 57 da ff <0f> 0b e9 01 fd ff ff e8 74 1d f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 319.011288][T17152] RSP: 0018:ffffc90000b13b08 EFLAGS: 00010246 [ 319.017351][T17152] RAX: 656b52a58e434100 RBX: 0000000000000001 RCX: 0000000000040000 [ 319.025342][T17152] RDX: ffffc9000dd39000 RSI: 0000000000000a52 RDI: 0000000000000a53 [ 319.033324][T17152] RBP: ffffea0004abee00 R08: ffffffff81299b8c R09: 0001c90000b138b7 [ 319.041304][T17152] R10: 0000000000000002 R11: ffff888107676000 R12: ffffea0004abee80 [ 319.049283][T17152] R13: ffff888155a44050 R14: ffffea0004abee88 R15: 000000002000a000 [ 319.057328][T17152] FS: 00007ff0fccc8700(0000) GS:ffff888237d00000(0000) knlGS:0000000000000000 [ 319.066340][T17152] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 319.073114][T17152] CR2: 0000000020000100 CR3: 0000000150ad6000 CR4: 00000000001506e0 [ 319.081105][T17152] Call Trace: [ 319.084377][T17152] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 319.090709][T17152] ? swapin_walk_pmd_entry+0x320/0x320 [ 319.096190][T17152] __walk_page_range+0x93f/0x10e0 [ 319.101225][T17152] walk_page_range+0x111/0x2e0 [ 319.106005][T17152] do_madvise+0x84e/0x1050 [ 319.110577][T17152] ? __schedule+0x427/0x5b0 [ 319.115076][T17152] ? __fpregs_load_activate+0x103/0x1b0 [ 319.120653][T17152] __x64_sys_madvise+0x5d/0x70 [ 319.125465][T17152] do_syscall_64+0x4a/0x90 [ 319.130002][T17152] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 319.135897][T17152] RIP: 0033:0x4665d9 [ 319.139805][T17152] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 319.159608][T17152] RSP: 002b:00007ff0fccc8188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 319.168050][T17152] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 319.176117][T17152] RDX: 0000000000000015 RSI: 0000000000001002 RDI: 000000002000a000 [ 319.184092][T17152] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 319.192155][T17152] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 319.200161][T17152] R13: 00007ffc3e3d747f R14: 00007ff0fccc8300 R15: 0000000000022000 [ 319.208146][T17152] ---[ end trace 89978b70e20977f8 ]--- [ 319.213594][T17152] ------------[ cut here ]------------ [ 319.219054][T17152] trying to isolate tail page [ 319.219185][T17152] WARNING: CPU: 1 PID: 17152 at mm/vmscan.c:1960 isolate_lru_page+0x360/0x370 [ 319.232757][T17152] Modules linked in: [ 319.236643][T17152] CPU: 1 PID: 17152 Comm: syz-executor.4 Tainted: G W 5.13.0-rc5-syzkaller #0 [ 319.246835][T17152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.257002][T17152] RIP: 0010:isolate_lru_page+0x360/0x370 [ 319.262652][T17152] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 8e 1d f2 ff 48 c7 c7 cf 20 3b 83 31 c0 e8 a0 57 da ff <0f> 0b e9 01 fd ff ff e8 74 1d f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 319.282352][T17152] RSP: 0018:ffffc90000b13b08 EFLAGS: 00010246 [ 319.288428][T17152] RAX: 656b52a58e434100 RBX: 0000000000000001 RCX: 0000000000040000 [ 319.296395][T17152] RDX: ffffc9000dd39000 RSI: 0000000000022b94 RDI: 0000000000022b95 [ 319.304448][T17152] RBP: ffffea0004abee00 R08: ffffffff81299b8c R09: 0001c90000b138b7 [ 319.312432][T17152] R10: 0000000000000002 R11: ffff888107676000 R12: ffffea0004abeec0 [ 319.320453][T17152] R13: ffff888155a44058 R14: ffffea0004abeec8 R15: 000000002000b000 [ 319.328438][T17152] FS: 00007ff0fccc8700(0000) GS:ffff888237d00000(0000) knlGS:0000000000000000 [ 319.337375][T17152] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 319.343973][T17152] CR2: 0000000020000100 CR3: 0000000150ad6000 CR4: 00000000001506e0 [ 319.351984][T17152] Call Trace: [ 319.355283][T17152] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 319.361637][T17152] ? swapin_walk_pmd_entry+0x320/0x320 [ 319.367100][T17152] __walk_page_range+0x93f/0x10e0 [ 319.372146][T17152] walk_page_range+0x111/0x2e0 [ 319.376908][T17152] do_madvise+0x84e/0x1050 [ 319.381341][T17152] ? __schedule+0x427/0x5b0 [ 319.385908][T17152] ? __fpregs_load_activate+0x103/0x1b0 [ 319.391505][T17152] __x64_sys_madvise+0x5d/0x70 [ 319.396270][T17152] do_syscall_64+0x4a/0x90 [ 319.400723][T17152] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 319.406619][T17152] RIP: 0033:0x4665d9 [ 319.410516][T17152] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 319.430151][T17152] RSP: 002b:00007ff0fccc8188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c 20:00:42 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000001b40), 0x0, 0x0) read(r0, 0x0, 0x0) 20:00:42 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) [ 319.438575][T17152] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 319.446577][T17152] RDX: 0000000000000015 RSI: 0000000000001002 RDI: 000000002000a000 [ 319.454585][T17152] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 319.462598][T17152] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 319.470672][T17152] R13: 00007ffc3e3d747f R14: 00007ff0fccc8300 R15: 0000000000022000 [ 319.478722][T17152] ---[ end trace 89978b70e20977f9 ]--- 20:00:42 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) 20:00:42 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='cpu<\n\n00\n\x02\x00\xc8 \xf4\xb3\xca\f\x90|\x1ff\xf0\xd2\x9ba\xdd\xba\x93\xf3\xa2\x97e\xd7\xa37\xc0\xae$\xef\x1f\x1feq*\xeb\x00\xffx\x7fV-W\xeb\x9c\xf5\xe5!d\x99]\x17~\x9e\\\xac\x1f\x93\x00\x00\x00\x80T\"\x00\x00\x00\x00\x05\x00'/89) 20:00:43 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x0, 0x11, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000000)=""/80, 0x50}], 0x1, 0x8, 0x3) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240), 0x4) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee00) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x0, 0xea60}, 0x10) madvise(&(0x7f000000a000/0x1000)=nil, 0x1002, 0x15) sendmsg$NFT_MSG_GETOBJ_RESET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c000000150a0000b79b57476200000000000011000700000908000340000000020900010073797a3100000100000400000000ff040900020073797a"], 0x3c}, 0x1, 0x0, 0x0, 0x20000800}, 0x40004) 20:00:43 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x0, 0x11, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000000)=""/80, 0x50}], 0x1, 0x8, 0x3) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240), 0x4) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee00) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x0, 0xea60}, 0x10) madvise(&(0x7f000000a000/0x1000)=nil, 0x1002, 0x15) sendmsg$NFT_MSG_GETOBJ_RESET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c000000150a0000b79b57476200000000000011000700000908000340000000020900010073797a3100000100000400000000ff040900020073797a"], 0x3c}, 0x1, 0x0, 0x0, 0x20000800}, 0x40004) [ 319.624633][T17175] ------------[ cut here ]------------ [ 319.624633][T17174] ------------[ cut here ]------------ [ 319.630219][T17175] trying to isolate tail page [ 319.630439][T17175] WARNING: CPU: 1 PID: 17175 at mm/vmscan.c:1960 isolate_lru_page+0x360/0x370 [ 319.635767][T17174] trying to isolate tail page [ 319.635833][T17174] WARNING: CPU: 0 PID: 17174 at mm/vmscan.c:1960 isolate_lru_page+0x360/0x370 [ 319.640447][T17175] Modules linked in: [ 319.640456][T17175] CPU: 1 PID: 17175 Comm: syz-executor.4 Tainted: G W 5.13.0-rc5-syzkaller #0 [ 319.649299][T17174] Modules linked in: [ 319.649307][T17174] CPU: 0 PID: 17174 Comm: syz-executor.1 Tainted: G W 5.13.0-rc5-syzkaller #0 [ 319.653957][T17175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.662825][T17174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.666777][T17175] RIP: 0010:isolate_lru_page+0x360/0x370 [ 319.676937][T17174] RIP: 0010:isolate_lru_page+0x360/0x370 [ 319.680833][T17175] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 8e 1d f2 ff 48 c7 c7 cf 20 3b 83 31 c0 e8 a0 57 da ff <0f> 0b e9 01 fd ff ff e8 74 1d f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 319.691069][T17174] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 8e 1d f2 ff 48 c7 c7 cf 20 3b 83 31 c0 e8 a0 57 da ff <0f> 0b e9 01 fd ff ff e8 74 1d f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 319.701108][T17175] RSP: 0018:ffffc90000b13b08 EFLAGS: 00010246 [ 319.711166][T17174] RSP: 0018:ffffc90000b5bb08 EFLAGS: 00010246 [ 319.716773][T17175] RAX: 96aad714eb016d00 RBX: 0000000000000001 RCX: 0000000000040000 [ 319.722396][T17174] [ 319.722400][T17174] RAX: cda4ddd8f99f5a00 RBX: 0000000000000001 RCX: 0000000000040000 [ 319.742076][T17175] RDX: ffffc9000dd39000 RSI: 0000000000000b36 RDI: 0000000000000b37 [ 319.742089][T17175] RBP: ffffea0004b14600 R08: ffffffff81299b8c R09: 0001ffff83a3259f [ 319.761687][T17174] RDX: ffffc90000375000 RSI: 000000000001663e RDI: 000000000001663f [ 319.767757][T17175] R10: 0001ffffffffffff R11: ffff88812e11d000 R12: ffffea0004b146c0 [ 319.773810][T17174] RBP: ffffea00041ebc00 R08: ffffffff81299b8c R09: 0001ffff83a3259f [ 319.781777][T17175] R13: ffff888155a20058 R14: ffffea0004b146c8 R15: 000000002000b000 [ 319.781788][T17175] FS: 00007ff0fccc8700(0000) GS:ffff888237d00000(0000) knlGS:0000000000000000 [ 319.784091][T17174] R10: 0001ffffffffffff R11: ffff888145fbd080 R12: ffffea00041ebc80 [ 319.784101][T17174] R13: ffff88812bd46050 R14: ffffea00041ebc88 R15: 000000002000a000 [ 319.784109][T17174] FS: 00007fd148dc9700(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 319.784120][T17174] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 319.792184][T17175] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 319.800122][T17174] CR2: 0000000020000100 CR3: 000000012ca39000 CR4: 00000000001506f0 [ 319.808252][T17175] CR2: 0000000020000100 CR3: 0000000144337000 CR4: 00000000001506e0 [ 319.816227][T17174] Call Trace: [ 319.816235][T17174] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 319.824192][T17175] Call Trace: [ 319.832146][T17174] ? swapin_walk_pmd_entry+0x320/0x320 [ 319.840124][T17175] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 319.849054][T17174] __walk_page_range+0x93f/0x10e0 [ 319.849075][T17174] walk_page_range+0x111/0x2e0 [ 319.857017][T17175] ? swapin_walk_pmd_entry+0x320/0x320 [ 319.864984][T17174] do_madvise+0x84e/0x1050 [ 319.874005][T17175] __walk_page_range+0x93f/0x10e0 [ 319.874024][T17175] walk_page_range+0x111/0x2e0 [ 319.880587][T17174] ? sock_setsockopt+0x17b/0x2090 [ 319.887148][T17175] do_madvise+0x84e/0x1050 [ 319.895109][T17174] ? __fpregs_load_activate+0x103/0x1b0 [ 319.903119][T17175] ? sock_setsockopt+0x17b/0x2090 [ 319.906326][T17174] __x64_sys_madvise+0x5d/0x70 [ 319.912637][T17175] ? __fpregs_load_activate+0x103/0x1b0 [ 319.915893][T17174] do_syscall_64+0x4a/0x90 [ 319.921349][T17175] __x64_sys_madvise+0x5d/0x70 [ 319.927662][T17174] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 319.932668][T17175] do_syscall_64+0x4a/0x90 [ 319.932683][T17175] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 319.937433][T17174] RIP: 0033:0x4665d9 [ 319.942876][T17175] RIP: 0033:0x4665d9 [ 319.947274][T17174] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 319.952277][T17175] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 319.957009][T17174] RSP: 002b:00007fd148dc9188 EFLAGS: 00000246 [ 319.962022][T17175] RSP: 002b:00007ff0fccc8188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c 20:00:43 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000200)) 20:00:43 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='cpu<\n\n00\n\x02\x00\xc8 \xf4\xb3\xca\f\x90|\x1ff\xf0\xd2\x9ba\xdd\xba\x93\xf3\xa2\x97e\xd7\xa37\xc0\xae$\xef\x1f\x1feq*\xeb\x00\xffx\x7fV-W\xeb\x9c\xf5\xe5!d\x99]\x17~\x9e\\\xac\x1f\x93\x00\x00\x00\x80T\"\x00\x00\x00\x00\x05\x00'/89) 20:00:43 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) 20:00:43 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x0, 0x11, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000000)=""/80, 0x50}], 0x1, 0x8, 0x3) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240), 0x4) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee00) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x0, 0xea60}, 0x10) madvise(&(0x7f000000a000/0x1000)=nil, 0x1002, 0x15) sendmsg$NFT_MSG_GETOBJ_RESET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c000000150a0000b79b57476200000000000011000700000908000340000000020900010073797a3100000100000400000000ff040900020073797a"], 0x3c}, 0x1, 0x0, 0x0, 0x20000800}, 0x40004) [ 319.962038][T17175] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 319.962046][T17175] RDX: 0000000000000015 RSI: 0000000000001002 RDI: 000000002000a000 [ 319.966458][T17174] ORIG_RAX: 000000000000001c [ 319.966465][T17174] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 319.971987][T17175] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 319.976982][T17174] RDX: 0000000000000015 RSI: 0000000000001002 RDI: 000000002000a000 [ 319.981724][T17175] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 319.987244][T17174] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 319.991647][T17175] R13: 00007ffc3e3d747f R14: 00007ff0fccc8300 R15: 0000000000022000 [ 319.996380][T17174] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 320.002251][T17175] ---[ end trace 89978b70e20977fa ]--- [ 320.156163][T17174] R13: 00007ffc1f46453f R14: 00007fd148dc9300 R15: 0000000000022000 [ 320.164272][T17174] ---[ end trace 89978b70e20977fb ]--- [ 320.169760][T17174] ------------[ cut here ]------------ [ 320.175198][T17174] trying to isolate tail page [ 320.175321][T17174] WARNING: CPU: 0 PID: 17174 at mm/vmscan.c:1960 isolate_lru_page+0x360/0x370 [ 320.188895][T17174] Modules linked in: [ 320.192802][T17174] CPU: 0 PID: 17174 Comm: syz-executor.1 Tainted: G W 5.13.0-rc5-syzkaller #0 [ 320.203041][T17174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.213178][T17174] RIP: 0010:isolate_lru_page+0x360/0x370 [ 320.218872][T17174] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 8e 1d f2 ff 48 c7 c7 cf 20 3b 83 31 c0 e8 a0 57 da ff <0f> 0b e9 01 fd ff ff e8 74 1d f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 320.238499][T17174] RSP: 0018:ffffc90000b5bb08 EFLAGS: 00010246 [ 320.244571][T17174] RAX: cda4ddd8f99f5a00 RBX: 0000000000000001 RCX: 0000000000040000 [ 320.252540][T17174] RDX: ffffc90000375000 RSI: 000000000003ffff RDI: 0000000000040000 [ 320.260551][T17174] RBP: ffffea00041ebc00 R08: ffffffff81299b8c R09: 0001c90000b5b8b7 [ 320.268544][T17174] R10: 0000000000000002 R11: ffff888145fbd080 R12: ffffea00041ebcc0 [ 320.276560][T17174] R13: ffff88812bd46058 R14: ffffea00041ebcc8 R15: 000000002000b000 [ 320.284550][T17174] FS: 00007fd148dc9700(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 320.293526][T17174] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 320.300171][T17174] CR2: 0000000020000100 CR3: 000000012ca39000 CR4: 00000000001506f0 [ 320.308154][T17174] Call Trace: [ 320.311438][T17174] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 320.317839][T17174] ? swapin_walk_pmd_entry+0x320/0x320 [ 320.323404][T17174] __walk_page_range+0x93f/0x10e0 [ 320.328428][T17174] walk_page_range+0x111/0x2e0 [ 320.333222][T17174] do_madvise+0x84e/0x1050 [ 320.337626][T17174] ? sock_setsockopt+0x17b/0x2090 [ 320.342697][T17174] ? __fpregs_load_activate+0x103/0x1b0 [ 320.348415][T17174] __x64_sys_madvise+0x5d/0x70 [ 320.353173][T17174] do_syscall_64+0x4a/0x90 [ 320.357625][T17174] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 320.363536][T17174] RIP: 0033:0x4665d9 [ 320.367418][T17174] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 320.387083][T17174] RSP: 002b:00007fd148dc9188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 320.395516][T17174] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 320.403510][T17174] RDX: 0000000000000015 RSI: 0000000000001002 RDI: 000000002000a000 [ 320.411503][T17174] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 320.419479][T17174] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 20:00:43 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x0, 0x11, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000000)=""/80, 0x50}], 0x1, 0x8, 0x3) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240), 0x4) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee00) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x0, 0xea60}, 0x10) madvise(&(0x7f000000a000/0x1000)=nil, 0x1002, 0x15) sendmsg$NFT_MSG_GETOBJ_RESET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c000000150a0000b79b57476200000000000011000700000908000340000000020900010073797a3100000100000400000000ff040900020073797a"], 0x3c}, 0x1, 0x0, 0x0, 0x20000800}, 0x40004) 20:00:43 executing program 0: r0 = syz_io_uring_setup(0x5d7, &(0x7f00000002c0), &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000340), &(0x7f0000000380)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x2, 0x0, 0x0) 20:00:43 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x0, 0x11, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000000)=""/80, 0x50}], 0x1, 0x8, 0x3) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240), 0x4) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee00) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x0, 0xea60}, 0x10) madvise(&(0x7f000000a000/0x1000)=nil, 0x1002, 0x15) sendmsg$NFT_MSG_GETOBJ_RESET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c000000150a0000b79b57476200000000000011000700000908000340000000020900010073797a3100000100000400000000ff040900020073797a"], 0x3c}, 0x1, 0x0, 0x0, 0x20000800}, 0x40004) [ 320.427442][T17174] R13: 00007ffc1f46453f R14: 00007fd148dc9300 R15: 0000000000022000 [ 320.435421][T17174] ---[ end trace 89978b70e20977fc ]--- 20:00:43 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x0, 0x11, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000000)=""/80, 0x50}], 0x1, 0x8, 0x3) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240), 0x4) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee00) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x0, 0xea60}, 0x10) madvise(&(0x7f000000a000/0x1000)=nil, 0x1002, 0x15) sendmsg$NFT_MSG_GETOBJ_RESET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c000000150a0000b79b57476200000000000011000700000908000340000000020900010073797a3100000100000400000000ff040900020073797a"], 0x3c}, 0x1, 0x0, 0x0, 0x20000800}, 0x40004) 20:00:43 executing program 0: r0 = syz_io_uring_setup(0x5d7, &(0x7f00000002c0), &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000340), &(0x7f0000000380)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x2, 0x0, 0x0) [ 320.512745][T17197] ------------[ cut here ]------------ [ 320.518264][T17197] trying to isolate tail page [ 320.518449][T17197] WARNING: CPU: 1 PID: 17197 at mm/vmscan.c:1960 isolate_lru_page+0x360/0x370 [ 320.532013][T17197] Modules linked in: [ 320.535901][T17197] CPU: 1 PID: 17197 Comm: syz-executor.4 Tainted: G W 5.13.0-rc5-syzkaller #0 [ 320.546138][T17197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.556222][T17197] RIP: 0010:isolate_lru_page+0x360/0x370 20:00:44 executing program 0: r0 = syz_io_uring_setup(0x5d7, &(0x7f00000002c0), &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000340), &(0x7f0000000380)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x2, 0x0, 0x0) 20:00:44 executing program 0: r0 = syz_io_uring_setup(0x5d7, &(0x7f00000002c0), &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000340), &(0x7f0000000380)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x2, 0x0, 0x0) [ 320.561872][T17197] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 8e 1d f2 ff 48 c7 c7 cf 20 3b 83 31 c0 e8 a0 57 da ff <0f> 0b e9 01 fd ff ff e8 74 1d f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 320.581595][T17197] RSP: 0018:ffffc90000c37b08 EFLAGS: 00010246 [ 320.587658][T17197] RAX: 3f391e91fac5c900 RBX: 0000000000000001 RCX: 0000000000040000 [ 320.595650][T17197] RDX: ffffc9000dd39000 RSI: 0000000000000a56 RDI: 0000000000000a57 [ 320.603628][T17197] RBP: ffffea0004abee00 R08: ffffffff81299b8c R09: 0001c90000c378b7 [ 320.611611][T17197] R10: 0000000000000002 R11: ffff88812cee7040 R12: ffffea0004abee80 [ 320.619593][T17197] R13: ffff88812c5a8050 R14: ffffea0004abee88 R15: 000000002000a000 [ 320.627559][T17197] FS: 00007ff0fccc8700(0000) GS:ffff888237d00000(0000) knlGS:0000000000000000 [ 320.636499][T17197] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 320.643097][T17197] CR2: 0000000020000100 CR3: 000000010767c000 CR4: 00000000001506e0 [ 320.651084][T17197] Call Trace: [ 320.654372][T17197] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 320.660744][T17197] ? swapin_walk_pmd_entry+0x320/0x320 [ 320.666280][T17197] __walk_page_range+0x93f/0x10e0 [ 320.671309][T17197] walk_page_range+0x111/0x2e0 [ 320.676069][T17197] do_madvise+0x84e/0x1050 [ 320.680629][T17197] ? sock_setsockopt+0x17b/0x2090 [ 320.685766][T17197] ? __fpregs_load_activate+0x103/0x1b0 [ 320.691333][T17197] __x64_sys_madvise+0x5d/0x70 [ 320.696094][T17197] do_syscall_64+0x4a/0x90 [ 320.700565][T17197] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 320.706490][T17197] RIP: 0033:0x4665d9 [ 320.710438][T17197] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 320.730121][T17197] RSP: 002b:00007ff0fccc8188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 320.738585][T17197] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 320.746546][T17197] RDX: 0000000000000015 RSI: 0000000000001002 RDI: 000000002000a000 [ 320.754576][T17197] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 20:00:44 executing program 3: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000640)='\x06\n\x00\xfd\xbe\x00t\xc6m4Hx\n\xed\x19\x01\xbe\x14\xb5\n>\xddW\x14\xd1\xc3\xe1S\xb5\x95w\xb5\x96Mk\xc5*}\x81\xfac\n\xbf\x16\x82\xa3\x99LO%\x9cC\x9f\x1b\xcb\'\xa0\xeb\xc04\x97d\xf2\x93\xf5J\x95\x8a\x15\x02\xf4\xd3\x03\xa6\xe9\xbf\xe4H\x10\xb3JT\xf2]\xa1\xf9\xb6\x9c\xdd\xbaVI6/\xa8G%\x88\xc2\xad\xebY\xef\xdf\xdcu{\x05EN\xd77$\xc1\x009\xabK\xa9\xf9\xc0>(\x9cjR\x0e*\xed\x9fVH\x1f\x8dr\xbe\r0\xff\xa5yA\x03\x02\xb8\xba8\xb0\x8a\x98(\xb2+4\x85\xfb\xc5fu\xb7\xae\x01n\xa5\xc4\xe4\xd8*ZY\xf9Bg9Yu\xb2\xd1\xb5s+\x14\xbd\x05\xdaw\xa4\xbb\x90e\xc0\x92', 0x0) fallocate(r2, 0x0, 0x0, 0x44a) splice(r2, 0x0, r1, 0x0, 0x8ec3, 0x0) read(r0, &(0x7f0000000200)=""/214, 0xd6) [ 320.762554][T17197] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 320.770530][T17197] R13: 00007ffc3e3d747f R14: 00007ff0fccc8300 R15: 0000000000022000 [ 320.778576][T17197] ---[ end trace 89978b70e20977fd ]--- 20:00:44 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000200)) 20:00:44 executing program 0: set_mempolicy(0x1, 0x0, 0x0) symlink(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='./file0\x00') symlink(&(0x7f0000000100)='./file0/file0\x00', &(0x7f00000008c0)='./file1\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x38, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0xfffffdef}}], 0x2, 0x0) 20:00:44 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x0, 0x11, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000000)=""/80, 0x50}], 0x1, 0x8, 0x3) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240), 0x4) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee00) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x0, 0xea60}, 0x10) madvise(&(0x7f000000a000/0x1000)=nil, 0x1002, 0x15) sendmsg$NFT_MSG_GETOBJ_RESET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c000000150a0000b79b57476200000000000011000700000908000340000000020900010073797a3100000100000400000000ff040900020073797a"], 0x3c}, 0x1, 0x0, 0x0, 0x20000800}, 0x40004) 20:00:44 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x8, 0x181902) pwritev(r0, &(0x7f0000001580)=[{0x0}, {&(0x7f0000001140)='7', 0x1}, {0x0}, {&(0x7f0000001280)="d1", 0x1}], 0x4, 0x0, 0x0) 20:00:44 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x0, 0x11, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000000)=""/80, 0x50}], 0x1, 0x8, 0x3) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240), 0x4) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee00) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x0, 0xea60}, 0x10) madvise(&(0x7f000000a000/0x1000)=nil, 0x1002, 0x15) sendmsg$NFT_MSG_GETOBJ_RESET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c000000150a0000b79b57476200000000000011000700000908000340000000020900010073797a3100000100000400000000ff040900020073797a"], 0x3c}, 0x1, 0x0, 0x0, 0x20000800}, 0x40004) 20:00:44 executing program 3: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000640)='\x06\n\x00\xfd\xbe\x00t\xc6m4Hx\n\xed\x19\x01\xbe\x14\xb5\n>\xddW\x14\xd1\xc3\xe1S\xb5\x95w\xb5\x96Mk\xc5*}\x81\xfac\n\xbf\x16\x82\xa3\x99LO%\x9cC\x9f\x1b\xcb\'\xa0\xeb\xc04\x97d\xf2\x93\xf5J\x95\x8a\x15\x02\xf4\xd3\x03\xa6\xe9\xbf\xe4H\x10\xb3JT\xf2]\xa1\xf9\xb6\x9c\xdd\xbaVI6/\xa8G%\x88\xc2\xad\xebY\xef\xdf\xdcu{\x05EN\xd77$\xc1\x009\xabK\xa9\xf9\xc0>(\x9cjR\x0e*\xed\x9fVH\x1f\x8dr\xbe\r0\xff\xa5yA\x03\x02\xb8\xba8\xb0\x8a\x98(\xb2+4\x85\xfb\xc5fu\xb7\xae\x01n\xa5\xc4\xe4\xd8*ZY\xf9Bg9Yu\xb2\xd1\xb5s+\x14\xbd\x05\xdaw\xa4\xbb\x90e\xc0\x92', 0x0) fallocate(r2, 0x0, 0x0, 0x44a) splice(r2, 0x0, r1, 0x0, 0x8ec3, 0x0) read(r0, &(0x7f0000000200)=""/214, 0xd6) 20:00:44 executing program 3: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000640)='\x06\n\x00\xfd\xbe\x00t\xc6m4Hx\n\xed\x19\x01\xbe\x14\xb5\n>\xddW\x14\xd1\xc3\xe1S\xb5\x95w\xb5\x96Mk\xc5*}\x81\xfac\n\xbf\x16\x82\xa3\x99LO%\x9cC\x9f\x1b\xcb\'\xa0\xeb\xc04\x97d\xf2\x93\xf5J\x95\x8a\x15\x02\xf4\xd3\x03\xa6\xe9\xbf\xe4H\x10\xb3JT\xf2]\xa1\xf9\xb6\x9c\xdd\xbaVI6/\xa8G%\x88\xc2\xad\xebY\xef\xdf\xdcu{\x05EN\xd77$\xc1\x009\xabK\xa9\xf9\xc0>(\x9cjR\x0e*\xed\x9fVH\x1f\x8dr\xbe\r0\xff\xa5yA\x03\x02\xb8\xba8\xb0\x8a\x98(\xb2+4\x85\xfb\xc5fu\xb7\xae\x01n\xa5\xc4\xe4\xd8*ZY\xf9Bg9Yu\xb2\xd1\xb5s+\x14\xbd\x05\xdaw\xa4\xbb\x90e\xc0\x92', 0x0) fallocate(r2, 0x0, 0x0, 0x44a) splice(r2, 0x0, r1, 0x0, 0x8ec3, 0x0) read(r0, &(0x7f0000000200)=""/214, 0xd6) 20:00:44 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000640)='\x06\n\x00\xfd\xbe\x00t\xc6m4Hx\n\xed\x19\x01\xbe\x14\xb5\n>\xddW\x14\xd1\xc3\xe1S\xb5\x95w\xb5\x96Mk\xc5*}\x81\xfac\n\xbf\x16\x82\xa3\x99LO%\x9cC\x9f\x1b\xcb\'\xa0\xeb\xc04\x97d\xf2\x93\xf5J\x95\x8a\x15\x02\xf4\xd3\x03\xa6\xe9\xbf\xe4H\x10\xb3JT\xf2]\xa1\xf9\xb6\x9c\xdd\xbaVI6/\xa8G%\x88\xc2\xad\xebY\xef\xdf\xdcu{\x05EN\xd77$\xc1\x009\xabK\xa9\xf9\xc0>(\x9cjR\x0e*\xed\x9fVH\x1f\x8dr\xbe\r0\xff\xa5yA\x03\x02\xb8\xba8\xb0\x8a\x98(\xb2+4\x85\xfb\xc5fu\xb7\xae\x01n\xa5\xc4\xe4\xd8*ZY\xf9Bg9Yu\xb2\xd1\xb5s+\x14\xbd\x05\xdaw\xa4\xbb\x90e\xc0\x92', 0x0) fallocate(r2, 0x0, 0x0, 0x44a) splice(r2, 0x0, r1, 0x0, 0x8ec3, 0x0) read(r0, &(0x7f0000000200)=""/214, 0xd6) 20:00:44 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x11, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) 20:00:44 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x60, 0x0, 0x2, 0x401, 0x0, 0x0, {0x2}, [@CTA_EXPECT_TUPLE={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x24, 0x3, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0xc, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0x8, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASTER={0x4}]}, 0x60}}, 0x0) 20:00:44 executing program 0: set_mempolicy(0x1, 0x0, 0x0) symlink(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='./file0\x00') symlink(&(0x7f0000000100)='./file0/file0\x00', &(0x7f00000008c0)='./file1\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x38, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0xfffffdef}}], 0x2, 0x0) 20:00:44 executing program 3: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000640)='\x06\n\x00\xfd\xbe\x00t\xc6m4Hx\n\xed\x19\x01\xbe\x14\xb5\n>\xddW\x14\xd1\xc3\xe1S\xb5\x95w\xb5\x96Mk\xc5*}\x81\xfac\n\xbf\x16\x82\xa3\x99LO%\x9cC\x9f\x1b\xcb\'\xa0\xeb\xc04\x97d\xf2\x93\xf5J\x95\x8a\x15\x02\xf4\xd3\x03\xa6\xe9\xbf\xe4H\x10\xb3JT\xf2]\xa1\xf9\xb6\x9c\xdd\xbaVI6/\xa8G%\x88\xc2\xad\xebY\xef\xdf\xdcu{\x05EN\xd77$\xc1\x009\xabK\xa9\xf9\xc0>(\x9cjR\x0e*\xed\x9fVH\x1f\x8dr\xbe\r0\xff\xa5yA\x03\x02\xb8\xba8\xb0\x8a\x98(\xb2+4\x85\xfb\xc5fu\xb7\xae\x01n\xa5\xc4\xe4\xd8*ZY\xf9Bg9Yu\xb2\xd1\xb5s+\x14\xbd\x05\xdaw\xa4\xbb\x90e\xc0\x92', 0x0) fallocate(r2, 0x0, 0x0, 0x44a) splice(r2, 0x0, r1, 0x0, 0x8ec3, 0x0) read(r0, &(0x7f0000000200)=""/214, 0xd6) [ 321.124240][T17244] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 321.133498][T17244] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 321.142701][T17244] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 20:00:45 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000200)) 20:00:45 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000640)='\x06\n\x00\xfd\xbe\x00t\xc6m4Hx\n\xed\x19\x01\xbe\x14\xb5\n>\xddW\x14\xd1\xc3\xe1S\xb5\x95w\xb5\x96Mk\xc5*}\x81\xfac\n\xbf\x16\x82\xa3\x99LO%\x9cC\x9f\x1b\xcb\'\xa0\xeb\xc04\x97d\xf2\x93\xf5J\x95\x8a\x15\x02\xf4\xd3\x03\xa6\xe9\xbf\xe4H\x10\xb3JT\xf2]\xa1\xf9\xb6\x9c\xdd\xbaVI6/\xa8G%\x88\xc2\xad\xebY\xef\xdf\xdcu{\x05EN\xd77$\xc1\x009\xabK\xa9\xf9\xc0>(\x9cjR\x0e*\xed\x9fVH\x1f\x8dr\xbe\r0\xff\xa5yA\x03\x02\xb8\xba8\xb0\x8a\x98(\xb2+4\x85\xfb\xc5fu\xb7\xae\x01n\xa5\xc4\xe4\xd8*ZY\xf9Bg9Yu\xb2\xd1\xb5s+\x14\xbd\x05\xdaw\xa4\xbb\x90e\xc0\x92', 0x0) fallocate(r2, 0x0, 0x0, 0x44a) splice(r2, 0x0, r1, 0x0, 0x8ec3, 0x0) read(r0, &(0x7f0000000200)=""/214, 0xd6) 20:00:45 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x31, &(0x7f00000002c0)="f47970da7c2fd541e0656c5762306aa606a0c2a76e59b65fa78fb184da006cabbd58564cf09dcac54f6d212e05d23391ff"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:00:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x11, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) 20:00:45 executing program 0: set_mempolicy(0x1, 0x0, 0x0) symlink(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='./file0\x00') symlink(&(0x7f0000000100)='./file0/file0\x00', &(0x7f00000008c0)='./file1\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x38, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0xfffffdef}}], 0x2, 0x0) 20:00:45 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x60, 0x0, 0x2, 0x401, 0x0, 0x0, {0x2}, [@CTA_EXPECT_TUPLE={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x24, 0x3, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0xc, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0x8, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASTER={0x4}]}, 0x60}}, 0x0) 20:00:45 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000640)='\x06\n\x00\xfd\xbe\x00t\xc6m4Hx\n\xed\x19\x01\xbe\x14\xb5\n>\xddW\x14\xd1\xc3\xe1S\xb5\x95w\xb5\x96Mk\xc5*}\x81\xfac\n\xbf\x16\x82\xa3\x99LO%\x9cC\x9f\x1b\xcb\'\xa0\xeb\xc04\x97d\xf2\x93\xf5J\x95\x8a\x15\x02\xf4\xd3\x03\xa6\xe9\xbf\xe4H\x10\xb3JT\xf2]\xa1\xf9\xb6\x9c\xdd\xbaVI6/\xa8G%\x88\xc2\xad\xebY\xef\xdf\xdcu{\x05EN\xd77$\xc1\x009\xabK\xa9\xf9\xc0>(\x9cjR\x0e*\xed\x9fVH\x1f\x8dr\xbe\r0\xff\xa5yA\x03\x02\xb8\xba8\xb0\x8a\x98(\xb2+4\x85\xfb\xc5fu\xb7\xae\x01n\xa5\xc4\xe4\xd8*ZY\xf9Bg9Yu\xb2\xd1\xb5s+\x14\xbd\x05\xdaw\xa4\xbb\x90e\xc0\x92', 0x0) fallocate(r2, 0x0, 0x0, 0x44a) splice(r2, 0x0, r1, 0x0, 0x8ec3, 0x0) read(r0, &(0x7f0000000200)=""/214, 0xd6) 20:00:45 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x60, 0x0, 0x2, 0x401, 0x0, 0x0, {0x2}, [@CTA_EXPECT_TUPLE={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x24, 0x3, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0xc, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0x8, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASTER={0x4}]}, 0x60}}, 0x0) [ 321.908909][T17260] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 321.918163][T17260] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 321.927351][T17260] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 20:00:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x11, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) 20:00:45 executing program 0: set_mempolicy(0x1, 0x0, 0x0) symlink(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='./file0\x00') symlink(&(0x7f0000000100)='./file0/file0\x00', &(0x7f00000008c0)='./file1\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x38, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0xfffffdef}}], 0x2, 0x0) 20:00:45 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x802, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'sit0\x00'}) sendmmsg$inet6(r0, 0x0, 0x0, 0x0) 20:00:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x11, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) [ 321.983716][T17275] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 321.992950][T17275] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 322.002202][T17275] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 20:00:46 executing program 0: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000040)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0}}], 0x1, 0x0) r0 = socket$inet(0x2, 0x2000000000003, 0x2) setsockopt$inet_int(r0, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) 20:00:46 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x3, &(0x7f0000000000)=0x3, 0x8, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f00002fc000/0x400000)=nil, 0x3) 20:00:48 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x31, &(0x7f00000002c0)="f47970da7c2fd541e0656c5762306aa606a0c2a76e59b65fa78fb184da006cabbd58564cf09dcac54f6d212e05d23391ff"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:00:48 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x60, 0x0, 0x2, 0x401, 0x0, 0x0, {0x2}, [@CTA_EXPECT_TUPLE={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x24, 0x3, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0xc, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0x8, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASTER={0x4}]}, 0x60}}, 0x0) 20:00:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)={[{@nolazytime}]}) 20:00:48 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000680)={0x1, &(0x7f0000000640)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xd9, &(0x7f0000000140)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689c9c6a47312334c2a97ac2b7f0fb4aabebae8dc5dff502173d6efa56b60f48cf0c9d0989ecbbfc220bd2b39df9ad8d6b14910f4a869863009780dd6e673a02f7ed829932929af9dffb1fa2cd7328202ac55f4f5dbb8494120f79d5f60958691a8a3fcf5687becdaf850add44fbf4360069722a8855095d7a0e9653c150d94027426468bb8d5ba59ea427d1bbf1e577fbe07b08216d3476eb83ba1960f030168192540699867cddd9ee6"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 20:00:48 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x3, &(0x7f0000000000)=0x3, 0x8, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f00002fc000/0x400000)=nil, 0x3) 20:00:48 executing program 0: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000040)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0}}], 0x1, 0x0) r0 = socket$inet(0x2, 0x2000000000003, 0x2) setsockopt$inet_int(r0, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) 20:00:48 executing program 0: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000040)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0}}], 0x1, 0x0) r0 = socket$inet(0x2, 0x2000000000003, 0x2) setsockopt$inet_int(r0, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) 20:00:48 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x3, &(0x7f0000000000)=0x3, 0x8, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f00002fc000/0x400000)=nil, 0x3) 20:00:48 executing program 0: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000040)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0}}], 0x1, 0x0) r0 = socket$inet(0x2, 0x2000000000003, 0x2) setsockopt$inet_int(r0, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) 20:00:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)={[{@nolazytime}]}) 20:00:48 executing program 5: r0 = getpid() ioprio_set$pid(0x2, r0, 0x0) 20:00:48 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x3, &(0x7f0000000000)=0x3, 0x8, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f00002fc000/0x400000)=nil, 0x3) [ 324.943368][T17309] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 324.956315][T17311] loop1: detected capacity change from 0 to 4 [ 324.971051][T17311] EXT4-fs (loop1): Can't read superblock on 2nd try [ 325.071635][T17330] loop1: detected capacity change from 0 to 4 [ 325.080773][T17330] EXT4-fs (loop1): Can't read superblock on 2nd try 20:00:51 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0xb005}, 0x4) openat2(0xffffffffffffffff, 0x0, &(0x7f0000000100)={0x80402}, 0x18) r1 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r1, &(0x7f0000001d80)=[{{&(0x7f0000000100)=@nfc_llcp={0x27, 0x2, 0x0, 0x0, 0x0, 0x0, "fd5bb8cc44320623b1988a924b30d7139d11ab6ee2227d3b90206d9e0c5522e28f5d9aae3be72558e84a6eef098d76aecbf2b20e3df6701d1385537129779d"}, 0x80, 0x0}}], 0x1, 0x0) 20:00:51 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x31, &(0x7f00000002c0)="f47970da7c2fd541e0656c5762306aa606a0c2a76e59b65fa78fb184da006cabbd58564cf09dcac54f6d212e05d23391ff"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:00:51 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000d40)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @remote}, 0x1c, 0x0}}, {{&(0x7f0000000540)={0xa, 0x4e21, 0x0, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000000800)=[@hopopts_2292={{0x18}}, @rthdr_2292={{0x12, 0x29, 0xb}}], 0x30}}], 0x2, 0x0) 20:00:51 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000680)={0x1, &(0x7f0000000640)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xd9, &(0x7f0000000140)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689c9c6a47312334c2a97ac2b7f0fb4aabebae8dc5dff502173d6efa56b60f48cf0c9d0989ecbbfc220bd2b39df9ad8d6b14910f4a869863009780dd6e673a02f7ed829932929af9dffb1fa2cd7328202ac55f4f5dbb8494120f79d5f60958691a8a3fcf5687becdaf850add44fbf4360069722a8855095d7a0e9653c150d94027426468bb8d5ba59ea427d1bbf1e577fbe07b08216d3476eb83ba1960f030168192540699867cddd9ee6"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 20:00:51 executing program 5: r0 = getpid() ioprio_set$pid(0x2, r0, 0x0) 20:00:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)={[{@nolazytime}]}) 20:00:51 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000d40)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @remote}, 0x1c, 0x0}}, {{&(0x7f0000000540)={0xa, 0x4e21, 0x0, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000000800)=[@hopopts_2292={{0x18}}, @rthdr_2292={{0x12, 0x29, 0xb}}], 0x30}}], 0x2, 0x0) 20:00:51 executing program 5: r0 = getpid() ioprio_set$pid(0x2, r0, 0x0) 20:00:51 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0xb005}, 0x4) openat2(0xffffffffffffffff, 0x0, &(0x7f0000000100)={0x80402}, 0x18) r1 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r1, &(0x7f0000001d80)=[{{&(0x7f0000000100)=@nfc_llcp={0x27, 0x2, 0x0, 0x0, 0x0, 0x0, "fd5bb8cc44320623b1988a924b30d7139d11ab6ee2227d3b90206d9e0c5522e28f5d9aae3be72558e84a6eef098d76aecbf2b20e3df6701d1385537129779d"}, 0x80, 0x0}}], 0x1, 0x0) 20:00:51 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000680)={0x1, &(0x7f0000000640)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xd9, &(0x7f0000000140)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689c9c6a47312334c2a97ac2b7f0fb4aabebae8dc5dff502173d6efa56b60f48cf0c9d0989ecbbfc220bd2b39df9ad8d6b14910f4a869863009780dd6e673a02f7ed829932929af9dffb1fa2cd7328202ac55f4f5dbb8494120f79d5f60958691a8a3fcf5687becdaf850add44fbf4360069722a8855095d7a0e9653c150d94027426468bb8d5ba59ea427d1bbf1e577fbe07b08216d3476eb83ba1960f030168192540699867cddd9ee6"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 327.973360][T17342] loop1: detected capacity change from 0 to 4 [ 327.989687][T17342] EXT4-fs (loop1): Can't read superblock on 2nd try 20:00:51 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000d40)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @remote}, 0x1c, 0x0}}, {{&(0x7f0000000540)={0xa, 0x4e21, 0x0, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000000800)=[@hopopts_2292={{0x18}}, @rthdr_2292={{0x12, 0x29, 0xb}}], 0x30}}], 0x2, 0x0) 20:00:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)={[{@nolazytime}]}) 20:00:51 executing program 5: r0 = getpid() ioprio_set$pid(0x2, r0, 0x0) [ 328.135398][T17370] loop1: detected capacity change from 0 to 4 [ 328.143948][T17370] EXT4-fs (loop1): Can't read superblock on 2nd try 20:00:54 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x31, &(0x7f00000002c0)="f47970da7c2fd541e0656c5762306aa606a0c2a76e59b65fa78fb184da006cabbd58564cf09dcac54f6d212e05d23391ff"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:00:54 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0xb005}, 0x4) openat2(0xffffffffffffffff, 0x0, &(0x7f0000000100)={0x80402}, 0x18) r1 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r1, &(0x7f0000001d80)=[{{&(0x7f0000000100)=@nfc_llcp={0x27, 0x2, 0x0, 0x0, 0x0, 0x0, "fd5bb8cc44320623b1988a924b30d7139d11ab6ee2227d3b90206d9e0c5522e28f5d9aae3be72558e84a6eef098d76aecbf2b20e3df6701d1385537129779d"}, 0x80, 0x0}}], 0x1, 0x0) 20:00:54 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000680)={0x1, &(0x7f0000000640)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xd9, &(0x7f0000000140)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689c9c6a47312334c2a97ac2b7f0fb4aabebae8dc5dff502173d6efa56b60f48cf0c9d0989ecbbfc220bd2b39df9ad8d6b14910f4a869863009780dd6e673a02f7ed829932929af9dffb1fa2cd7328202ac55f4f5dbb8494120f79d5f60958691a8a3fcf5687becdaf850add44fbf4360069722a8855095d7a0e9653c150d94027426468bb8d5ba59ea427d1bbf1e577fbe07b08216d3476eb83ba1960f030168192540699867cddd9ee6"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 20:00:54 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000d40)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @remote}, 0x1c, 0x0}}, {{&(0x7f0000000540)={0xa, 0x4e21, 0x0, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000000800)=[@hopopts_2292={{0x18}}, @rthdr_2292={{0x12, 0x29, 0xb}}], 0x30}}], 0x2, 0x0) 20:00:54 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0xb005}, 0x4) openat2(0xffffffffffffffff, 0x0, &(0x7f0000000100)={0x80402}, 0x18) r1 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r1, &(0x7f0000001d80)=[{{&(0x7f0000000100)=@nfc_llcp={0x27, 0x2, 0x0, 0x0, 0x0, 0x0, "fd5bb8cc44320623b1988a924b30d7139d11ab6ee2227d3b90206d9e0c5522e28f5d9aae3be72558e84a6eef098d76aecbf2b20e3df6701d1385537129779d"}, 0x80, 0x0}}], 0x1, 0x0) 20:00:54 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x1276, 0x0) 20:00:54 executing program 1: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 20:00:54 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b5877341e0e1dcc2025aa18c9228103b66e1d49d31d322", 0x7d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:00:54 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0xb005}, 0x4) openat2(0xffffffffffffffff, 0x0, &(0x7f0000000100)={0x80402}, 0x18) r1 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r1, &(0x7f0000001d80)=[{{&(0x7f0000000100)=@nfc_llcp={0x27, 0x2, 0x0, 0x0, 0x0, 0x0, "fd5bb8cc44320623b1988a924b30d7139d11ab6ee2227d3b90206d9e0c5522e28f5d9aae3be72558e84a6eef098d76aecbf2b20e3df6701d1385537129779d"}, 0x80, 0x0}}], 0x1, 0x0) 20:00:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f0000000080)=0xf5ffffff, 0x20000084) 20:00:54 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0xb005}, 0x4) openat2(0xffffffffffffffff, 0x0, &(0x7f0000000100)={0x80402}, 0x18) r1 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r1, &(0x7f0000001d80)=[{{&(0x7f0000000100)=@nfc_llcp={0x27, 0x2, 0x0, 0x0, 0x0, 0x0, "fd5bb8cc44320623b1988a924b30d7139d11ab6ee2227d3b90206d9e0c5522e28f5d9aae3be72558e84a6eef098d76aecbf2b20e3df6701d1385537129779d"}, 0x80, 0x0}}], 0x1, 0x0) 20:00:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f00000000c0)=[{0x84}, {0x6}]}) [ 331.071483][ T25] audit: type=1326 audit(1623355254.504:2078): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17407 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 20:00:57 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f00000000c0)=[{0x84}, {0x6}]}) 20:00:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f0000000080)=0xf5ffffff, 0x20000084) 20:00:57 executing program 4: unshare(0x400) capset(&(0x7f0000000080)={0x19980330}, &(0x7f0000000040)) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_PIE_ON(r0, 0x7005) 20:00:57 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0xb005}, 0x4) openat2(0xffffffffffffffff, 0x0, &(0x7f0000000100)={0x80402}, 0x18) r1 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r1, &(0x7f0000001d80)=[{{&(0x7f0000000100)=@nfc_llcp={0x27, 0x2, 0x0, 0x0, 0x0, 0x0, "fd5bb8cc44320623b1988a924b30d7139d11ab6ee2227d3b90206d9e0c5522e28f5d9aae3be72558e84a6eef098d76aecbf2b20e3df6701d1385537129779d"}, 0x80, 0x0}}], 0x1, 0x0) 20:00:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000100)="8199ee7e19ff010000008107008d2300000000a440f03562e3493c00005536b560000001040000000000604d6c7d00000000545c4d8810a49792055f000855aa", 0x40, 0x1c0}, {&(0x7f0000000000)="6bea5ed8d837dfaebbe56514f0f4d2a428d30caa601485bb573dcd7ffb3c5152ae1dafeaa9b6dc6e8a15fdaf052f4986daf5f3101065935b703d74fc3ebfb72d8d55c632e4ef1fce5e3bcbb7cbf8f1d25d3cda87b0e9d5de4dfeeb96d07b95654fcb835f05777d6ce590d612b03e99c0c0258439a389895a8bb4c33884f6cedbc72489b45fe594a8c3f78ee8c2431963ca31010073c28fd0e5b480404db854cefb50047c27ec5fbaf0bd7a75ba3d", 0xae, 0x111}, {&(0x7f00000002c0)="f7aecd5d469ef2e32255dacf1e7cf0f8", 0x10, 0x6}]) 20:00:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f0000000080)=0xf5ffffff, 0x20000084) 20:00:57 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b5877341e0e1dcc2025aa18c9228103b66e1d49d31d322", 0x7d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:00:57 executing program 4: unshare(0x400) capset(&(0x7f0000000080)={0x19980330}, &(0x7f0000000040)) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_PIE_ON(r0, 0x7005) 20:00:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f0000000080)=0xf5ffffff, 0x20000084) 20:00:57 executing program 5: unshare(0x400) capset(&(0x7f0000000080)={0x19980330}, &(0x7f0000000040)) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_PIE_ON(r0, 0x7005) 20:00:57 executing program 4: unshare(0x400) capset(&(0x7f0000000080)={0x19980330}, &(0x7f0000000040)) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_PIE_ON(r0, 0x7005) 20:00:57 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f00000000c0)=[{0x84}, {0x6}]}) [ 334.044239][ T25] audit: type=1326 audit(1623355257.474:2079): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17419 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 334.078097][T17423] loop3: detected capacity change from 0 to 1 20:00:57 executing program 2: unshare(0x400) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000)=0x2, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x15, 0x0, &(0x7f0000000340)) 20:00:57 executing program 5: unshare(0x400) capset(&(0x7f0000000080)={0x19980330}, &(0x7f0000000040)) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_PIE_ON(r0, 0x7005) 20:00:57 executing program 4: unshare(0x400) capset(&(0x7f0000000080)={0x19980330}, &(0x7f0000000040)) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_PIE_ON(r0, 0x7005) 20:00:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000100)="8199ee7e19ff010000008107008d2300000000a440f03562e3493c00005536b560000001040000000000604d6c7d00000000545c4d8810a49792055f000855aa", 0x40, 0x1c0}, {&(0x7f0000000000)="6bea5ed8d837dfaebbe56514f0f4d2a428d30caa601485bb573dcd7ffb3c5152ae1dafeaa9b6dc6e8a15fdaf052f4986daf5f3101065935b703d74fc3ebfb72d8d55c632e4ef1fce5e3bcbb7cbf8f1d25d3cda87b0e9d5de4dfeeb96d07b95654fcb835f05777d6ce590d612b03e99c0c0258439a389895a8bb4c33884f6cedbc72489b45fe594a8c3f78ee8c2431963ca31010073c28fd0e5b480404db854cefb50047c27ec5fbaf0bd7a75ba3d", 0xae, 0x111}, {&(0x7f00000002c0)="f7aecd5d469ef2e32255dacf1e7cf0f8", 0x10, 0x6}]) [ 334.147315][T17423] loop3: 20:00:57 executing program 2: unshare(0x400) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000)=0x2, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x15, 0x0, &(0x7f0000000340)) 20:00:57 executing program 5: unshare(0x400) capset(&(0x7f0000000080)={0x19980330}, &(0x7f0000000040)) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_PIE_ON(r0, 0x7005) [ 334.176684][ T25] audit: type=1326 audit(1623355257.604:2080): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17447 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 334.245665][T17463] loop3: detected capacity change from 0 to 1 [ 334.268751][T17463] loop3: 20:01:00 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0xffff, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x541b, 0x0) 20:01:00 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b5877341e0e1dcc2025aa18c9228103b66e1d49d31d322", 0x7d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:01:00 executing program 2: unshare(0x400) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000)=0x2, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x15, 0x0, &(0x7f0000000340)) 20:01:00 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f00000000c0)=[{0x84}, {0x6}]}) 20:01:00 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="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", 0x1b7}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 20:01:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000100)="8199ee7e19ff010000008107008d2300000000a440f03562e3493c00005536b560000001040000000000604d6c7d00000000545c4d8810a49792055f000855aa", 0x40, 0x1c0}, {&(0x7f0000000000)="6bea5ed8d837dfaebbe56514f0f4d2a428d30caa601485bb573dcd7ffb3c5152ae1dafeaa9b6dc6e8a15fdaf052f4986daf5f3101065935b703d74fc3ebfb72d8d55c632e4ef1fce5e3bcbb7cbf8f1d25d3cda87b0e9d5de4dfeeb96d07b95654fcb835f05777d6ce590d612b03e99c0c0258439a389895a8bb4c33884f6cedbc72489b45fe594a8c3f78ee8c2431963ca31010073c28fd0e5b480404db854cefb50047c27ec5fbaf0bd7a75ba3d", 0xae, 0x111}, {&(0x7f00000002c0)="f7aecd5d469ef2e32255dacf1e7cf0f8", 0x10, 0x6}]) 20:01:00 executing program 2: unshare(0x400) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000)=0x2, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x15, 0x0, &(0x7f0000000340)) 20:01:00 executing program 4: ioprio_set$uid(0x3, 0xffffffffffffffff, 0x0) [ 337.064362][ T25] audit: type=1326 audit(1623355260.494:2081): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17466 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 20:01:00 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000000)=@allocspi={0x204, 0x16, 0x1, 0x0, 0x0, {{{@in6=@empty, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x6c}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x70bd26, 0x0, 0x2}, 0x0, 0x2}, [@migrate={0x9c, 0x11, [{@in=@dev={0xac, 0x14, 0x14, 0x27}, @in=@multicast1, @in6=@dev={0xfe, 0x80, '\x00', 0x2f}, @in=@multicast2, 0x3c, 0x4, 0x0, 0x3506, 0x2, 0x2}, {@in=@empty, @in6=@ipv4={'\x00', '\xff\xff', @loopback}, @in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @in=@empty, 0x3c, 0x3, 0x0, 0x0, 0xa, 0x2}]}, @policy_type={0xa, 0x10, {0x1}}, @etimer_thresh={0x8, 0xc, 0x1ff}, @algo_comp={0x4f, 0x3, {{'lzs\x00'}, 0x38, "22a791e66e3584"}}, @mark={0xc, 0x15, {0x35075b, 0x800}}]}, 0x204}}, 0x0) 20:01:00 executing program 1: clone(0x20016406dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='projid_map\x00') ppoll(0x0, 0x0, 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000100)=""/135, 0x87}], 0x1, 0x22e6, 0x0) [ 337.114812][T17474] loop3: detected capacity change from 0 to 1 20:01:00 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000000)=@allocspi={0x204, 0x16, 0x1, 0x0, 0x0, {{{@in6=@empty, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x6c}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x70bd26, 0x0, 0x2}, 0x0, 0x2}, [@migrate={0x9c, 0x11, [{@in=@dev={0xac, 0x14, 0x14, 0x27}, @in=@multicast1, @in6=@dev={0xfe, 0x80, '\x00', 0x2f}, @in=@multicast2, 0x3c, 0x4, 0x0, 0x3506, 0x2, 0x2}, {@in=@empty, @in6=@ipv4={'\x00', '\xff\xff', @loopback}, @in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @in=@empty, 0x3c, 0x3, 0x0, 0x0, 0xa, 0x2}]}, @policy_type={0xa, 0x10, {0x1}}, @etimer_thresh={0x8, 0xc, 0x1ff}, @algo_comp={0x4f, 0x3, {{'lzs\x00'}, 0x38, "22a791e66e3584"}}, @mark={0xc, 0x15, {0x35075b, 0x800}}]}, 0x204}}, 0x0) 20:01:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x80000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400028001000240000004f80100200040000000000000000000800029c76292f153595a4b414c4c4552202046415431322020200e1fbe5b7cac22c0740b56b40ebb0700cd105eebf032e4cd16cd19ebfe54686973206973206e6f74206120626f6f7461626c65206469736b2e2020506c6561736520696e73657274206120626f6f7461626c6520666c6f70707920616e640d0a707265737320616e79206b657920746f2074727920616761696e202e2e2e200d0a00", 0xc0}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ffff00f0ffffffffffffff00"/64, 0x40, 0x1e0}, {&(0x7f0000010200)="f8ffff00f0ffffffffffffff00"/32, 0x20, 0x400}, {&(0x7f0000010300)="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", 0x120, 0x600}, {&(0x7f0000010500)="2e20202020202020202020100098ea70325132510000ea7032510300000000002e2e202020202020202020100098ea70325132510000ea70325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020200098ea70325132510000ea70325104001a040000", 0x80, 0x10e00}, {&(0x7f0000010600)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x20e00}, {&(0x7f0000010b00)='syzkallers\x00'/32, 0x20, 0x30e00}, {&(0x7f0000010c00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x50e00}], 0x0, &(0x7f0000010d00)) 20:01:00 executing program 4: ioprio_set$uid(0x3, 0xffffffffffffffff, 0x0) [ 337.159630][T17474] loop3: [ 337.243735][T17501] loop2: detected capacity change from 0 to 1294 20:01:03 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b5877341e0e1dcc2025aa18c9228103b66e1d49d31d322", 0x7d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:01:03 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000000)=@allocspi={0x204, 0x16, 0x1, 0x0, 0x0, {{{@in6=@empty, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x6c}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x70bd26, 0x0, 0x2}, 0x0, 0x2}, [@migrate={0x9c, 0x11, [{@in=@dev={0xac, 0x14, 0x14, 0x27}, @in=@multicast1, @in6=@dev={0xfe, 0x80, '\x00', 0x2f}, @in=@multicast2, 0x3c, 0x4, 0x0, 0x3506, 0x2, 0x2}, {@in=@empty, @in6=@ipv4={'\x00', '\xff\xff', @loopback}, @in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @in=@empty, 0x3c, 0x3, 0x0, 0x0, 0xa, 0x2}]}, @policy_type={0xa, 0x10, {0x1}}, @etimer_thresh={0x8, 0xc, 0x1ff}, @algo_comp={0x4f, 0x3, {{'lzs\x00'}, 0x38, "22a791e66e3584"}}, @mark={0xc, 0x15, {0x35075b, 0x800}}]}, 0x204}}, 0x0) 20:01:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000100)="8199ee7e19ff010000008107008d2300000000a440f03562e3493c00005536b560000001040000000000604d6c7d00000000545c4d8810a49792055f000855aa", 0x40, 0x1c0}, {&(0x7f0000000000)="6bea5ed8d837dfaebbe56514f0f4d2a428d30caa601485bb573dcd7ffb3c5152ae1dafeaa9b6dc6e8a15fdaf052f4986daf5f3101065935b703d74fc3ebfb72d8d55c632e4ef1fce5e3bcbb7cbf8f1d25d3cda87b0e9d5de4dfeeb96d07b95654fcb835f05777d6ce590d612b03e99c0c0258439a389895a8bb4c33884f6cedbc72489b45fe594a8c3f78ee8c2431963ca31010073c28fd0e5b480404db854cefb50047c27ec5fbaf0bd7a75ba3d", 0xae, 0x111}, {&(0x7f00000002c0)="f7aecd5d469ef2e32255dacf1e7cf0f8", 0x10, 0x6}]) 20:01:03 executing program 4: ioprio_set$uid(0x3, 0xffffffffffffffff, 0x0) 20:01:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') pread64(r0, &(0x7f0000001240)=""/102400, 0x19000, 0xa41c0100) 20:01:03 executing program 1: clone(0x20016406dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='projid_map\x00') ppoll(0x0, 0x0, 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000100)=""/135, 0x87}], 0x1, 0x22e6, 0x0) 20:01:03 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000000)=@allocspi={0x204, 0x16, 0x1, 0x0, 0x0, {{{@in6=@empty, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x6c}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x70bd26, 0x0, 0x2}, 0x0, 0x2}, [@migrate={0x9c, 0x11, [{@in=@dev={0xac, 0x14, 0x14, 0x27}, @in=@multicast1, @in6=@dev={0xfe, 0x80, '\x00', 0x2f}, @in=@multicast2, 0x3c, 0x4, 0x0, 0x3506, 0x2, 0x2}, {@in=@empty, @in6=@ipv4={'\x00', '\xff\xff', @loopback}, @in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @in=@empty, 0x3c, 0x3, 0x0, 0x0, 0xa, 0x2}]}, @policy_type={0xa, 0x10, {0x1}}, @etimer_thresh={0x8, 0xc, 0x1ff}, @algo_comp={0x4f, 0x3, {{'lzs\x00'}, 0x38, "22a791e66e3584"}}, @mark={0xc, 0x15, {0x35075b, 0x800}}]}, 0x204}}, 0x0) 20:01:03 executing program 4: ioprio_set$uid(0x3, 0xffffffffffffffff, 0x0) 20:01:03 executing program 5: r0 = syz_io_uring_setup(0x75ca, &(0x7f0000000300), &(0x7f00003b2000/0x1000)=nil, &(0x7f00006d6000/0x1000)=nil, &(0x7f0000000180)=0x0, &(0x7f00000000c0)=0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd=r3, 0x0, &(0x7f0000000100)=""/53, 0x35}, 0x0) io_uring_enter(r0, 0x4ab0, 0x0, 0x0, 0x0, 0x0) read(r3, &(0x7f0000000400)=""/233, 0xe9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r5, r4) 20:01:03 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001440), 0x0, 0x0) 20:01:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') pread64(r0, &(0x7f0000001240)=""/102400, 0x19000, 0xa41c0100) [ 340.122542][T17516] loop3: detected capacity change from 0 to 1 20:01:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') pread64(r0, &(0x7f0000001240)=""/102400, 0x19000, 0xa41c0100) [ 340.184808][T17516] loop3: 20:01:06 executing program 1: clone(0x20016406dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='projid_map\x00') ppoll(0x0, 0x0, 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000100)=""/135, 0x87}], 0x1, 0x22e6, 0x0) 20:01:06 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0x140, 0x10, 0x713, 0x0, 0x0, {{@in, @in6=@remote}, {@in6=@empty, 0x0, 0x32}, @in6=@empty, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @tfcpad={0x8}]}, 0x140}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) 20:01:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') pread64(r0, &(0x7f0000001240)=""/102400, 0x19000, 0xa41c0100) 20:01:06 executing program 5: r0 = syz_io_uring_setup(0x75ca, &(0x7f0000000300), &(0x7f00003b2000/0x1000)=nil, &(0x7f00006d6000/0x1000)=nil, &(0x7f0000000180)=0x0, &(0x7f00000000c0)=0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd=r3, 0x0, &(0x7f0000000100)=""/53, 0x35}, 0x0) io_uring_enter(r0, 0x4ab0, 0x0, 0x0, 0x0, 0x0) read(r3, &(0x7f0000000400)=""/233, 0xe9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r5, r4) 20:01:06 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001440), 0x0, 0x0) 20:01:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_UPDATE_CONNECT_PARAMS(r0, &(0x7f0000000040)={0x0, 0xfffffe8c, &(0x7f0000000900)={&(0x7f0000000140)={0x164, r1, 0x453c172008cb17e9, 0x0, 0x0, {{0x11}, {@void, @val={0xc}}}, [@NL80211_ATTR_IE={0xe9, 0x2a, [@ssid={0x0, 0x6, @default_ap_ssid}, @challenge, @challenge={0x10, 0x1}, @perr={0x84, 0xbc, {0x0, 0xc, [@ext={{}, @device_b}, @not_ext={{}, @device_b}, @not_ext, @not_ext={{}, @device_b}, @not_ext, @not_ext={{}, @device_b}, @not_ext, @ext={{}, @broadcast, 0x0, @device_b}, @ext={{}, @device_b, 0x0, @device_b}, @not_ext={{}, @device_b}, @not_ext={{}, @device_b}, @ext={{}, @device_a, 0x0, @broadcast}]}}]}, @NL80211_ATTR_IE={0x56, 0x2a, [@rann={0x7e, 0x15, {{}, 0x0, 0x0, @device_b}}, @link_id={0x65, 0x12, {@random="5bf60b706bfb"}}, @mic={0x8c, 0x0, {0x0, "b04ce136ac4b", @short="f99b35b8e29d9186"}}]}]}, 0x164}}, 0x0) 20:01:06 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0xee00, 0x0, 0xee01) getresuid(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000100)=0x0) setresuid(0xee00, r1, 0xee01) ioctl$KDGETMODE(r0, 0x4b70, &(0x7f0000000200)) 20:01:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_UPDATE_CONNECT_PARAMS(r0, &(0x7f0000000040)={0x0, 0xfffffe8c, &(0x7f0000000900)={&(0x7f0000000140)={0x164, r1, 0x453c172008cb17e9, 0x0, 0x0, {{0x11}, {@void, @val={0xc}}}, [@NL80211_ATTR_IE={0xe9, 0x2a, [@ssid={0x0, 0x6, @default_ap_ssid}, @challenge, @challenge={0x10, 0x1}, @perr={0x84, 0xbc, {0x0, 0xc, [@ext={{}, @device_b}, @not_ext={{}, @device_b}, @not_ext, @not_ext={{}, @device_b}, @not_ext, @not_ext={{}, @device_b}, @not_ext, @ext={{}, @broadcast, 0x0, @device_b}, @ext={{}, @device_b, 0x0, @device_b}, @not_ext={{}, @device_b}, @not_ext={{}, @device_b}, @ext={{}, @device_a, 0x0, @broadcast}]}}]}, @NL80211_ATTR_IE={0x56, 0x2a, [@rann={0x7e, 0x15, {{}, 0x0, 0x0, @device_b}}, @link_id={0x65, 0x12, {@random="5bf60b706bfb"}}, @mic={0x8c, 0x0, {0x0, "b04ce136ac4b", @short="f99b35b8e29d9186"}}]}]}, 0x164}}, 0x0) 20:01:06 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0xee00, 0x0, 0xee01) getresuid(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000100)=0x0) setresuid(0xee00, r1, 0xee01) ioctl$KDGETMODE(r0, 0x4b70, &(0x7f0000000200)) 20:01:06 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001440), 0x0, 0x0) 20:01:06 executing program 5: r0 = syz_io_uring_setup(0x75ca, &(0x7f0000000300), &(0x7f00003b2000/0x1000)=nil, &(0x7f00006d6000/0x1000)=nil, &(0x7f0000000180)=0x0, &(0x7f00000000c0)=0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd=r3, 0x0, &(0x7f0000000100)=""/53, 0x35}, 0x0) io_uring_enter(r0, 0x4ab0, 0x0, 0x0, 0x0, 0x0) read(r3, &(0x7f0000000400)=""/233, 0xe9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r5, r4) [ 343.169489][T17557] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=18432 sclass=netlink_xfrm_socket pid=17557 comm=syz-executor.3 [ 343.196326][T17557] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=35144 sclass=netlink_xfrm_socket pid=17557 comm=syz-executor.3 20:01:06 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0xee00, 0x0, 0xee01) getresuid(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000100)=0x0) setresuid(0xee00, r1, 0xee01) ioctl$KDGETMODE(r0, 0x4b70, &(0x7f0000000200)) [ 343.209570][T17557] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=51016 sclass=netlink_xfrm_socket pid=17557 comm=syz-executor.3 [ 343.240157][T17557] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=17766 sclass=netlink_xfrm_socket pid=17557 comm=syz-executor.3 [ 343.257012][T17557] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=3942 sclass=netlink_xfrm_socket pid=17557 comm=syz-executor.3 [ 343.284653][T17557] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=65466 sclass=netlink_xfrm_socket pid=17557 comm=syz-executor.3 [ 343.298447][T17557] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=19456 sclass=netlink_xfrm_socket pid=17557 comm=syz-executor.3 [ 343.325031][T17557] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=34125 sclass=netlink_xfrm_socket pid=17557 comm=syz-executor.3 [ 343.338512][T17557] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=35656 sclass=netlink_xfrm_socket pid=17557 comm=syz-executor.3 [ 343.361468][T17557] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=17557 comm=syz-executor.3 20:01:07 executing program 1: clone(0x20016406dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='projid_map\x00') ppoll(0x0, 0x0, 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000100)=""/135, 0x87}], 0x1, 0x22e6, 0x0) 20:01:07 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_UPDATE_CONNECT_PARAMS(r0, &(0x7f0000000040)={0x0, 0xfffffe8c, &(0x7f0000000900)={&(0x7f0000000140)={0x164, r1, 0x453c172008cb17e9, 0x0, 0x0, {{0x11}, {@void, @val={0xc}}}, [@NL80211_ATTR_IE={0xe9, 0x2a, [@ssid={0x0, 0x6, @default_ap_ssid}, @challenge, @challenge={0x10, 0x1}, @perr={0x84, 0xbc, {0x0, 0xc, [@ext={{}, @device_b}, @not_ext={{}, @device_b}, @not_ext, @not_ext={{}, @device_b}, @not_ext, @not_ext={{}, @device_b}, @not_ext, @ext={{}, @broadcast, 0x0, @device_b}, @ext={{}, @device_b, 0x0, @device_b}, @not_ext={{}, @device_b}, @not_ext={{}, @device_b}, @ext={{}, @device_a, 0x0, @broadcast}]}}]}, @NL80211_ATTR_IE={0x56, 0x2a, [@rann={0x7e, 0x15, {{}, 0x0, 0x0, @device_b}}, @link_id={0x65, 0x12, {@random="5bf60b706bfb"}}, @mic={0x8c, 0x0, {0x0, "b04ce136ac4b", @short="f99b35b8e29d9186"}}]}]}, 0x164}}, 0x0) 20:01:07 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0xee00, 0x0, 0xee01) getresuid(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000100)=0x0) setresuid(0xee00, r1, 0xee01) ioctl$KDGETMODE(r0, 0x4b70, &(0x7f0000000200)) 20:01:07 executing program 5: r0 = syz_io_uring_setup(0x75ca, &(0x7f0000000300), &(0x7f00003b2000/0x1000)=nil, &(0x7f00006d6000/0x1000)=nil, &(0x7f0000000180)=0x0, &(0x7f00000000c0)=0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd=r3, 0x0, &(0x7f0000000100)=""/53, 0x35}, 0x0) io_uring_enter(r0, 0x4ab0, 0x0, 0x0, 0x0, 0x0) read(r3, &(0x7f0000000400)=""/233, 0xe9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r5, r4) 20:01:07 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000001440), 0x0, 0x0) 20:01:07 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0x140, 0x10, 0x713, 0x0, 0x0, {{@in, @in6=@remote}, {@in6=@empty, 0x0, 0x32}, @in6=@empty, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @tfcpad={0x8}]}, 0x140}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) 20:01:07 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_UPDATE_CONNECT_PARAMS(r0, &(0x7f0000000040)={0x0, 0xfffffe8c, &(0x7f0000000900)={&(0x7f0000000140)={0x164, r1, 0x453c172008cb17e9, 0x0, 0x0, {{0x11}, {@void, @val={0xc}}}, [@NL80211_ATTR_IE={0xe9, 0x2a, [@ssid={0x0, 0x6, @default_ap_ssid}, @challenge, @challenge={0x10, 0x1}, @perr={0x84, 0xbc, {0x0, 0xc, [@ext={{}, @device_b}, @not_ext={{}, @device_b}, @not_ext, @not_ext={{}, @device_b}, @not_ext, @not_ext={{}, @device_b}, @not_ext, @ext={{}, @broadcast, 0x0, @device_b}, @ext={{}, @device_b, 0x0, @device_b}, @not_ext={{}, @device_b}, @not_ext={{}, @device_b}, @ext={{}, @device_a, 0x0, @broadcast}]}}]}, @NL80211_ATTR_IE={0x56, 0x2a, [@rann={0x7e, 0x15, {{}, 0x0, 0x0, @device_b}}, @link_id={0x65, 0x12, {@random="5bf60b706bfb"}}, @mic={0x8c, 0x0, {0x0, "b04ce136ac4b", @short="f99b35b8e29d9186"}}]}]}, 0x164}}, 0x0) 20:01:07 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0xee00, 0x0, 0xee01) getresuid(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000100)=0x0) setresuid(0xee00, r1, 0xee01) ioctl$KDGETMODE(r0, 0x4b70, &(0x7f0000000200)) 20:01:07 executing program 0: r0 = perf_event_open(&(0x7f0000000240)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x2) 20:01:07 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0xee00, 0x0, 0xee01) getresuid(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000100)=0x0) setresuid(0xee00, r1, 0xee01) ioctl$KDGETMODE(r0, 0x4b70, &(0x7f0000000200)) 20:01:07 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x4b71, &(0x7f0000000040)) 20:01:07 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8991, &(0x7f0000000140)={'sit0\x00', 0x0}) 20:01:08 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0x140, 0x10, 0x713, 0x0, 0x0, {{@in, @in6=@remote}, {@in6=@empty, 0x0, 0x32}, @in6=@empty, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @tfcpad={0x8}]}, 0x140}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) 20:01:08 executing program 0: r0 = perf_event_open(&(0x7f0000000240)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x2) 20:01:08 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0xee00, 0x0, 0xee01) getresuid(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000100)=0x0) setresuid(0xee00, r1, 0xee01) ioctl$KDGETMODE(r0, 0x4b70, &(0x7f0000000200)) 20:01:08 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8991, &(0x7f0000000140)={'sit0\x00', 0x0}) 20:01:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000004c0)={0x20, r1, 0x305, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x8, 0x2, 0x0, 0x1, [{0x4}]}, @ETHTOOL_A_STRSET_HEADER={0x4}]}, 0x20}}, 0x0) 20:01:08 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x80002) write$sndseq(r0, &(0x7f0000000380)=[{0x0, 0x4, 0x0, 0x0, @time, {}, {}, @quote}], 0x1c) 20:01:08 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8991, &(0x7f0000000140)={'sit0\x00', 0x0}) 20:01:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:01:08 executing program 0: r0 = perf_event_open(&(0x7f0000000240)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x2) 20:01:08 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x80002) write$sndseq(r0, &(0x7f0000000380)=[{0x0, 0x4, 0x0, 0x0, @time, {}, {}, @quote}], 0x1c) 20:01:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000004c0)={0x20, r1, 0x305, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x8, 0x2, 0x0, 0x1, [{0x4}]}, @ETHTOOL_A_STRSET_HEADER={0x4}]}, 0x20}}, 0x0) 20:01:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:01:08 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0x140, 0x10, 0x713, 0x0, 0x0, {{@in, @in6=@remote}, {@in6=@empty, 0x0, 0x32}, @in6=@empty, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @tfcpad={0x8}]}, 0x140}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) 20:01:08 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8991, &(0x7f0000000140)={'sit0\x00', 0x0}) 20:01:08 executing program 0: r0 = perf_event_open(&(0x7f0000000240)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x2) 20:01:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000004c0)={0x20, r1, 0x305, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x8, 0x2, 0x0, 0x1, [{0x4}]}, @ETHTOOL_A_STRSET_HEADER={0x4}]}, 0x20}}, 0x0) 20:01:08 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x80002) write$sndseq(r0, &(0x7f0000000380)=[{0x0, 0x4, 0x0, 0x0, @time, {}, {}, @quote}], 0x1c) 20:01:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:01:08 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/rpc\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) getdents64(r0, &(0x7f0000000040)=""/245, 0xf5) 20:01:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:01:08 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x80002) write$sndseq(r0, &(0x7f0000000380)=[{0x0, 0x4, 0x0, 0x0, @time, {}, {}, @quote}], 0x1c) 20:01:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000004c0)={0x20, r1, 0x305, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x8, 0x2, 0x0, 0x1, [{0x4}]}, @ETHTOOL_A_STRSET_HEADER={0x4}]}, 0x20}}, 0x0) 20:01:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 20:01:08 executing program 2: unshare(0x400) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x248940, 0x0) bind$unix(r0, 0x0, 0x0) [ 345.230633][T17675] loop5: detected capacity change from 0 to 152833 [ 345.267573][T17675] loop5: p1[EZD] p3 [ 345.271566][T17675] loop5: p1 size 11290111 extends beyond EOD, truncated [ 345.279247][T17675] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 345.289912][T17682] loop5: p1[EZD] p3 [ 345.293918][T17682] loop5: p1 size 11290111 extends beyond EOD, truncated [ 345.301625][T17682] loop5: p3 size 1912633224 extends beyond EOD, truncated 20:01:08 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f00000002c0)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c2020202010", 0x2c, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0/file0\x00', 0x141042, 0x0) r1 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x103701, 0x0) write$binfmt_elf64(r1, &(0x7f00000005c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", ['\x00', '\x00']}, 0x278) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$P9_RAUTH(r0, &(0x7f0000000580)={0x14}, 0x14) 20:01:08 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/rpc\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) getdents64(r0, &(0x7f0000000040)=""/245, 0xf5) 20:01:08 executing program 2: unshare(0x400) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x248940, 0x0) bind$unix(r0, 0x0, 0x0) 20:01:08 executing program 4: open(&(0x7f0000000000)='./file1\x00', 0x1750c0, 0x0) setxattr$system_posix_acl(&(0x7f0000000440)='./file1\x00', &(0x7f0000000480)='system.posix_acl_access\x00', &(0x7f0000000680)={{}, {}, [], {}, [{}, {0x8, 0x0, 0xee00}]}, 0x1c, 0x0) 20:01:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 20:01:08 executing program 3: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') r0 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x3, 0x4, 0x1, 0x5, 0x0, 0x7, 0xc0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4a, 0x4, 0x0, 0x15b2, 0x9, 0x20000000, 0x0, 0xa32, 0x10000, 0x3ff}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) r2 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) r3 = epoll_create(0x2) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000200)) r4 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) mq_timedsend(r4, 0x0, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000280)=[{r3}, {r4}, {0xffffffffffffffff, 0x228}, {0xffffffffffffffff, 0xd020}, {r0, 0x402}, {r1, 0x4104}, {0xffffffffffffffff, 0x20}, {0xffffffffffffffff, 0x8000}], 0x8, &(0x7f0000000300)={0x77359400}, &(0x7f0000000340)={[0xfdf]}, 0x8) 20:01:08 executing program 3: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') r0 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x3, 0x4, 0x1, 0x5, 0x0, 0x7, 0xc0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4a, 0x4, 0x0, 0x15b2, 0x9, 0x20000000, 0x0, 0xa32, 0x10000, 0x3ff}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) r2 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) r3 = epoll_create(0x2) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000200)) r4 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) mq_timedsend(r4, 0x0, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000280)=[{r3}, {r4}, {0xffffffffffffffff, 0x228}, {0xffffffffffffffff, 0xd020}, {r0, 0x402}, {r1, 0x4104}, {0xffffffffffffffff, 0x20}, {0xffffffffffffffff, 0x8000}], 0x8, &(0x7f0000000300)={0x77359400}, &(0x7f0000000340)={[0xfdf]}, 0x8) 20:01:08 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/rpc\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) getdents64(r0, &(0x7f0000000040)=""/245, 0xf5) 20:01:08 executing program 4: open(&(0x7f0000000000)='./file1\x00', 0x1750c0, 0x0) setxattr$system_posix_acl(&(0x7f0000000440)='./file1\x00', &(0x7f0000000480)='system.posix_acl_access\x00', &(0x7f0000000680)={{}, {}, [], {}, [{}, {0x8, 0x0, 0xee00}]}, 0x1c, 0x0) 20:01:08 executing program 2: unshare(0x400) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x248940, 0x0) bind$unix(r0, 0x0, 0x0) [ 345.432758][T17695] loop5: detected capacity change from 0 to 152833 [ 345.439431][T17692] loop1: detected capacity change from 0 to 16 20:01:08 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/rpc\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) getdents64(r0, &(0x7f0000000040)=""/245, 0xf5) 20:01:08 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f00000002c0)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c2020202010", 0x2c, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0/file0\x00', 0x141042, 0x0) r1 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x103701, 0x0) write$binfmt_elf64(r1, &(0x7f00000005c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", ['\x00', '\x00']}, 0x278) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$P9_RAUTH(r0, &(0x7f0000000580)={0x14}, 0x14) [ 345.486993][T17695] loop5: p1[EZD] p3 [ 345.491003][T17695] loop5: p1 size 11290111 extends beyond EOD, truncated [ 345.504769][T17695] loop5: p3 size 1912633224 extends beyond EOD, truncated 20:01:08 executing program 3: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') r0 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x3, 0x4, 0x1, 0x5, 0x0, 0x7, 0xc0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4a, 0x4, 0x0, 0x15b2, 0x9, 0x20000000, 0x0, 0xa32, 0x10000, 0x3ff}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) r2 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) r3 = epoll_create(0x2) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000200)) r4 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) mq_timedsend(r4, 0x0, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000280)=[{r3}, {r4}, {0xffffffffffffffff, 0x228}, {0xffffffffffffffff, 0xd020}, {r0, 0x402}, {r1, 0x4104}, {0xffffffffffffffff, 0x20}, {0xffffffffffffffff, 0x8000}], 0x8, &(0x7f0000000300)={0x77359400}, &(0x7f0000000340)={[0xfdf]}, 0x8) 20:01:09 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f00000002c0)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c2020202010", 0x2c, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0/file0\x00', 0x141042, 0x0) r1 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x103701, 0x0) write$binfmt_elf64(r1, &(0x7f00000005c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", ['\x00', '\x00']}, 0x278) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$P9_RAUTH(r0, &(0x7f0000000580)={0x14}, 0x14) 20:01:09 executing program 4: open(&(0x7f0000000000)='./file1\x00', 0x1750c0, 0x0) setxattr$system_posix_acl(&(0x7f0000000440)='./file1\x00', &(0x7f0000000480)='system.posix_acl_access\x00', &(0x7f0000000680)={{}, {}, [], {}, [{}, {0x8, 0x0, 0xee00}]}, 0x1c, 0x0) 20:01:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 20:01:09 executing program 2: unshare(0x400) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x248940, 0x0) bind$unix(r0, 0x0, 0x0) 20:01:09 executing program 3: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') r0 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x3, 0x4, 0x1, 0x5, 0x0, 0x7, 0xc0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4a, 0x4, 0x0, 0x15b2, 0x9, 0x20000000, 0x0, 0xa32, 0x10000, 0x3ff}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) r2 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) r3 = epoll_create(0x2) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000200)) r4 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) mq_timedsend(r4, 0x0, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000280)=[{r3}, {r4}, {0xffffffffffffffff, 0x228}, {0xffffffffffffffff, 0xd020}, {r0, 0x402}, {r1, 0x4104}, {0xffffffffffffffff, 0x20}, {0xffffffffffffffff, 0x8000}], 0x8, &(0x7f0000000300)={0x77359400}, &(0x7f0000000340)={[0xfdf]}, 0x8) 20:01:09 executing program 4: open(&(0x7f0000000000)='./file1\x00', 0x1750c0, 0x0) setxattr$system_posix_acl(&(0x7f0000000440)='./file1\x00', &(0x7f0000000480)='system.posix_acl_access\x00', &(0x7f0000000680)={{}, {}, [], {}, [{}, {0x8, 0x0, 0xee00}]}, 0x1c, 0x0) 20:01:09 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f00000002c0)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c2020202010", 0x2c, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0/file0\x00', 0x141042, 0x0) r1 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x103701, 0x0) write$binfmt_elf64(r1, &(0x7f00000005c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", ['\x00', '\x00']}, 0x278) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$P9_RAUTH(r0, &(0x7f0000000580)={0x14}, 0x14) 20:01:09 executing program 2: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') r0 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x3, 0x4, 0x1, 0x5, 0x0, 0x7, 0xc0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4a, 0x4, 0x0, 0x15b2, 0x9, 0x20000000, 0x0, 0xa32, 0x10000, 0x3ff}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) r2 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) r3 = epoll_create(0x2) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000200)) r4 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) mq_timedsend(r4, 0x0, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000280)=[{r3}, {r4}, {0xffffffffffffffff, 0x228}, {0xffffffffffffffff, 0xd020}, {r0, 0x402}, {r1, 0x4104}, {0xffffffffffffffff, 0x20}, {0xffffffffffffffff, 0x8000}], 0x8, &(0x7f0000000300)={0x77359400}, &(0x7f0000000340)={[0xfdf]}, 0x8) 20:01:09 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f00000002c0)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c2020202010", 0x2c, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0/file0\x00', 0x141042, 0x0) r1 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x103701, 0x0) write$binfmt_elf64(r1, &(0x7f00000005c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", ['\x00', '\x00']}, 0x278) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$P9_RAUTH(r0, &(0x7f0000000580)={0x14}, 0x14) [ 345.632341][T17722] loop5: detected capacity change from 0 to 152833 [ 345.639176][T17724] loop1: detected capacity change from 0 to 16 [ 345.642277][T17725] loop0: detected capacity change from 0 to 16 20:01:09 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f00000002c0)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c2020202010", 0x2c, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0/file0\x00', 0x141042, 0x0) r1 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x103701, 0x0) write$binfmt_elf64(r1, &(0x7f00000005c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", ['\x00', '\x00']}, 0x278) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$P9_RAUTH(r0, &(0x7f0000000580)={0x14}, 0x14) 20:01:09 executing program 4: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') r0 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x3, 0x4, 0x1, 0x5, 0x0, 0x7, 0xc0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4a, 0x4, 0x0, 0x15b2, 0x9, 0x20000000, 0x0, 0xa32, 0x10000, 0x3ff}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) r2 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) r3 = epoll_create(0x2) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000200)) r4 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) mq_timedsend(r4, 0x0, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000280)=[{r3}, {r4}, {0xffffffffffffffff, 0x228}, {0xffffffffffffffff, 0xd020}, {r0, 0x402}, {r1, 0x4104}, {0xffffffffffffffff, 0x20}, {0xffffffffffffffff, 0x8000}], 0x8, &(0x7f0000000300)={0x77359400}, &(0x7f0000000340)={[0xfdf]}, 0x8) 20:01:09 executing program 2: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') r0 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x3, 0x4, 0x1, 0x5, 0x0, 0x7, 0xc0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4a, 0x4, 0x0, 0x15b2, 0x9, 0x20000000, 0x0, 0xa32, 0x10000, 0x3ff}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) r2 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) r3 = epoll_create(0x2) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000200)) r4 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) mq_timedsend(r4, 0x0, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000280)=[{r3}, {r4}, {0xffffffffffffffff, 0x228}, {0xffffffffffffffff, 0xd020}, {r0, 0x402}, {r1, 0x4104}, {0xffffffffffffffff, 0x20}, {0xffffffffffffffff, 0x8000}], 0x8, &(0x7f0000000300)={0x77359400}, &(0x7f0000000340)={[0xfdf]}, 0x8) [ 345.704861][T17722] loop5: p1[EZD] p3 [ 345.711416][T17722] loop5: p1 size 11290111 extends beyond EOD, truncated [ 345.734070][T17722] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 345.744160][T17738] loop3: detected capacity change from 0 to 16 20:01:09 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f00000002c0)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c2020202010", 0x2c, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0/file0\x00', 0x141042, 0x0) r1 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x103701, 0x0) write$binfmt_elf64(r1, &(0x7f00000005c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", ['\x00', '\x00']}, 0x278) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$P9_RAUTH(r0, &(0x7f0000000580)={0x14}, 0x14) [ 345.754001][T17741] loop1: detected capacity change from 0 to 16 20:01:09 executing program 4: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') r0 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x3, 0x4, 0x1, 0x5, 0x0, 0x7, 0xc0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4a, 0x4, 0x0, 0x15b2, 0x9, 0x20000000, 0x0, 0xa32, 0x10000, 0x3ff}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) r2 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) r3 = epoll_create(0x2) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000200)) r4 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) mq_timedsend(r4, 0x0, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000280)=[{r3}, {r4}, {0xffffffffffffffff, 0x228}, {0xffffffffffffffff, 0xd020}, {r0, 0x402}, {r1, 0x4104}, {0xffffffffffffffff, 0x20}, {0xffffffffffffffff, 0x8000}], 0x8, &(0x7f0000000300)={0x77359400}, &(0x7f0000000340)={[0xfdf]}, 0x8) 20:01:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_read_part_table(0x0, 0x2c, &(0x7f0000000280)=[{&(0x7f0000000680)="0201a5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) 20:01:09 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f00000002c0)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c2020202010", 0x2c, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0/file0\x00', 0x141042, 0x0) r1 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x103701, 0x0) write$binfmt_elf64(r1, &(0x7f00000005c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", ['\x00', '\x00']}, 0x278) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$P9_RAUTH(r0, &(0x7f0000000580)={0x14}, 0x14) 20:01:09 executing program 2: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') r0 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x3, 0x4, 0x1, 0x5, 0x0, 0x7, 0xc0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4a, 0x4, 0x0, 0x15b2, 0x9, 0x20000000, 0x0, 0xa32, 0x10000, 0x3ff}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) r2 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) r3 = epoll_create(0x2) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000200)) r4 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) mq_timedsend(r4, 0x0, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000280)=[{r3}, {r4}, {0xffffffffffffffff, 0x228}, {0xffffffffffffffff, 0xd020}, {r0, 0x402}, {r1, 0x4104}, {0xffffffffffffffff, 0x20}, {0xffffffffffffffff, 0x8000}], 0x8, &(0x7f0000000300)={0x77359400}, &(0x7f0000000340)={[0xfdf]}, 0x8) 20:01:09 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f00000002c0)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c2020202010", 0x2c, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0/file0\x00', 0x141042, 0x0) r1 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x103701, 0x0) write$binfmt_elf64(r1, &(0x7f00000005c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", ['\x00', '\x00']}, 0x278) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$P9_RAUTH(r0, &(0x7f0000000580)={0x14}, 0x14) [ 345.822977][T17745] loop0: detected capacity change from 0 to 16 20:01:09 executing program 4: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') r0 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x3, 0x4, 0x1, 0x5, 0x0, 0x7, 0xc0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4a, 0x4, 0x0, 0x15b2, 0x9, 0x20000000, 0x0, 0xa32, 0x10000, 0x3ff}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) r2 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) r3 = epoll_create(0x2) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000200)) r4 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) mq_timedsend(r4, 0x0, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000280)=[{r3}, {r4}, {0xffffffffffffffff, 0x228}, {0xffffffffffffffff, 0xd020}, {r0, 0x402}, {r1, 0x4104}, {0xffffffffffffffff, 0x20}, {0xffffffffffffffff, 0x8000}], 0x8, &(0x7f0000000300)={0x77359400}, &(0x7f0000000340)={[0xfdf]}, 0x8) 20:01:09 executing program 2: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xf2, &(0x7f00000002c0)="f47970da7c2fd541e0656c5762306aa606a0c2a76e59b65fa78fb184da006cabbd58564cf09dcac54f6d212e05d23391ff083d38ff122a776e08af2025580c72249ad2f5366f60b87a982a8066b10f8b85b47e770f548fd2e3c6a8323152fbeebdec6058daee7c23390ee172a191a599fd3d69623481e1af603fc9d42b2f7173f23f843eb6669d9de930445756424b355d08c8786bf6e250deae7a6d8332607f93938fabe2e77eb4ff46d2b6acf3307cc56a31e02e391ddc16c13dc7d29b1066029eb7c8e2104f912e73029259c5bae94591ce8aeee0a0e17619d8bb7afa892dc1eb22fc017336f12d9abd7e295b5149cf96"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:01:09 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv2(r0, &(0x7f0000002380)=[{&(0x7f00000000c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x31) 20:01:09 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f00000002c0)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c2020202010", 0x2c, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0/file0\x00', 0x141042, 0x0) r1 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x103701, 0x0) write$binfmt_elf64(r1, &(0x7f00000005c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", ['\x00', '\x00']}, 0x278) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$P9_RAUTH(r0, &(0x7f0000000580)={0x14}, 0x14) [ 345.911962][T17756] loop1: detected capacity change from 0 to 16 [ 345.918327][T17760] loop3: detected capacity change from 0 to 16 [ 345.924984][T17757] loop5: detected capacity change from 0 to 152833 20:01:09 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv2(r0, &(0x7f0000002380)=[{&(0x7f00000000c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x31) [ 345.997173][T17757] loop5: p1[EZD] p3 [ 346.006018][T17757] loop5: p1 size 11290111 extends beyond EOD, truncated [ 346.013523][T17767] loop0: detected capacity change from 0 to 16 20:01:09 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$sock_int(r0, 0x1, 0x33, &(0x7f0000000000), 0x4) 20:01:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400028020000400000004f80000200040000300000000000000010000000000000002", 0x2d}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aa52526141", 0x24, 0x1e0}, {&(0x7f0000010200)='\x00\x00\x00\x00rrAa', 0x8, 0x3e0}, {0x0}], 0x0, &(0x7f0000011300)) 20:01:09 executing program 0: unshare(0x40000000) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad:\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') [ 346.038298][T17757] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 346.046773][T17775] loop3: detected capacity change from 0 to 16 20:01:09 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv2(r0, &(0x7f0000002380)=[{&(0x7f00000000c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x31) 20:01:09 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$sock_int(r0, 0x1, 0x33, &(0x7f0000000000), 0x4) 20:01:09 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6, 0x0, 0x0, 0x7fff7ffe}]}) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 20:01:09 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$sock_int(r0, 0x1, 0x33, &(0x7f0000000000), 0x4) 20:01:09 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv2(r0, &(0x7f0000002380)=[{&(0x7f00000000c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x31) [ 346.160657][T17785] loop3: detected capacity change from 0 to 3 [ 346.193716][T17785] FAT-fs (loop3): FAT read failed (blocknr 32) 20:01:12 executing program 2: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xf2, &(0x7f00000002c0)="f47970da7c2fd541e0656c5762306aa606a0c2a76e59b65fa78fb184da006cabbd58564cf09dcac54f6d212e05d23391ff083d38ff122a776e08af2025580c72249ad2f5366f60b87a982a8066b10f8b85b47e770f548fd2e3c6a8323152fbeebdec6058daee7c23390ee172a191a599fd3d69623481e1af603fc9d42b2f7173f23f843eb6669d9de930445756424b355d08c8786bf6e250deae7a6d8332607f93938fabe2e77eb4ff46d2b6acf3307cc56a31e02e391ddc16c13dc7d29b1066029eb7c8e2104f912e73029259c5bae94591ce8aeee0a0e17619d8bb7afa892dc1eb22fc017336f12d9abd7e295b5149cf96"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:01:12 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6, 0x0, 0x0, 0x7fff7ffe}]}) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 20:01:12 executing program 0: unshare(0x40000000) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad:\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 20:01:12 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$sock_int(r0, 0x1, 0x33, &(0x7f0000000000), 0x4) 20:01:12 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6, 0x0, 0x0, 0x7fff7ffe}]}) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 20:01:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400028020000400000004f80000200040000300000000000000010000000000000002", 0x2d}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aa52526141", 0x24, 0x1e0}, {&(0x7f0000010200)='\x00\x00\x00\x00rrAa', 0x8, 0x3e0}, {0x0}], 0x0, &(0x7f0000011300)) 20:01:12 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6, 0x0, 0x0, 0x7fff7ffe}]}) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 20:01:12 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6, 0x0, 0x0, 0x7fff7ffe}]}) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 20:01:12 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6, 0x0, 0x0, 0x7fff7ffe}]}) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 20:01:12 executing program 0: unshare(0x40000000) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad:\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') [ 348.963328][T17812] loop3: detected capacity change from 0 to 3 [ 348.988306][T17812] FAT-fs (loop3): FAT read failed (blocknr 32) 20:01:12 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6, 0x0, 0x0, 0x7fff7ffe}]}) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 20:01:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400028020000400000004f80000200040000300000000000000010000000000000002", 0x2d}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aa52526141", 0x24, 0x1e0}, {&(0x7f0000010200)='\x00\x00\x00\x00rrAa', 0x8, 0x3e0}, {0x0}], 0x0, &(0x7f0000011300)) [ 349.094753][T17833] loop3: detected capacity change from 0 to 3 [ 349.108690][T17833] FAT-fs (loop3): FAT read failed (blocknr 32) 20:01:15 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6, 0x0, 0x0, 0x7fff7ffe}]}) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 20:01:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400028020000400000004f80000200040000300000000000000010000000000000002", 0x2d}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aa52526141", 0x24, 0x1e0}, {&(0x7f0000010200)='\x00\x00\x00\x00rrAa', 0x8, 0x3e0}, {0x0}], 0x0, &(0x7f0000011300)) 20:01:15 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6, 0x0, 0x0, 0x7fff7ffe}]}) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 20:01:15 executing program 2: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xf2, &(0x7f00000002c0)="f47970da7c2fd541e0656c5762306aa606a0c2a76e59b65fa78fb184da006cabbd58564cf09dcac54f6d212e05d23391ff083d38ff122a776e08af2025580c72249ad2f5366f60b87a982a8066b10f8b85b47e770f548fd2e3c6a8323152fbeebdec6058daee7c23390ee172a191a599fd3d69623481e1af603fc9d42b2f7173f23f843eb6669d9de930445756424b355d08c8786bf6e250deae7a6d8332607f93938fabe2e77eb4ff46d2b6acf3307cc56a31e02e391ddc16c13dc7d29b1066029eb7c8e2104f912e73029259c5bae94591ce8aeee0a0e17619d8bb7afa892dc1eb22fc017336f12d9abd7e295b5149cf96"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:01:15 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000ec0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="0d06a1a52587274f2f4732082c8da76bf9d66262841ef3954c4866822f48e1bcd9f8a28e7796dd293e8e40d1603c50fc72d64a5b3d3c4f793950e1597dfe725d52c1454e28e9e056c35f02eab4aa31e3f8e440c1fb32556d4faf464ffbd8db55ef59c14ded8916366e397817465036ab31b227b17c860e0c4d6e314e0e8e743b31db47ec353436835f15cfa267c9", 0xc0, r1) keyctl$revoke(0x3, r2) add_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000400)="dee7030022cf9e5e1dbac27b0426fc0299c40800000000000000c894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976ede8860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r0) request_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0) 20:01:15 executing program 0: unshare(0x40000000) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad:\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 20:01:15 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1, 0xfffffffc}, {}, {0x6, 0x0, 0x0, 0x7fff7ffe}]}) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 20:01:15 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000ec0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="0d06a1a52587274f2f4732082c8da76bf9d66262841ef3954c4866822f48e1bcd9f8a28e7796dd293e8e40d1603c50fc72d64a5b3d3c4f793950e1597dfe725d52c1454e28e9e056c35f02eab4aa31e3f8e440c1fb32556d4faf464ffbd8db55ef59c14ded8916366e397817465036ab31b227b17c860e0c4d6e314e0e8e743b31db47ec353436835f15cfa267c9", 0xc0, r1) keyctl$revoke(0x3, r2) add_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000400)="dee7030022cf9e5e1dbac27b0426fc0299c40800000000000000c894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976ede8860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r0) request_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0) 20:01:15 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000ec0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="0d06a1a52587274f2f4732082c8da76bf9d66262841ef3954c4866822f48e1bcd9f8a28e7796dd293e8e40d1603c50fc72d64a5b3d3c4f793950e1597dfe725d52c1454e28e9e056c35f02eab4aa31e3f8e440c1fb32556d4faf464ffbd8db55ef59c14ded8916366e397817465036ab31b227b17c860e0c4d6e314e0e8e743b31db47ec353436835f15cfa267c9", 0xc0, r1) keyctl$revoke(0x3, r2) add_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000400)="dee7030022cf9e5e1dbac27b0426fc0299c40800000000000000c894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976ede8860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r0) request_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0) 20:01:15 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000ec0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="0d06a1a52587274f2f4732082c8da76bf9d66262841ef3954c4866822f48e1bcd9f8a28e7796dd293e8e40d1603c50fc72d64a5b3d3c4f793950e1597dfe725d52c1454e28e9e056c35f02eab4aa31e3f8e440c1fb32556d4faf464ffbd8db55ef59c14ded8916366e397817465036ab31b227b17c860e0c4d6e314e0e8e743b31db47ec353436835f15cfa267c9", 0xc0, r1) keyctl$revoke(0x3, r2) add_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000400)="dee7030022cf9e5e1dbac27b0426fc0299c40800000000000000c894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976ede8860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r0) request_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0) [ 352.009056][T17850] loop3: detected capacity change from 0 to 3 [ 352.030872][T17850] FAT-fs (loop3): FAT read failed (blocknr 32) 20:01:15 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0xc0f85403, &(0x7f0000000000)={{0x1}}) 20:01:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r2 = gettid() process_vm_writev(r2, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) fork() madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) 20:01:18 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000ec0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="0d06a1a52587274f2f4732082c8da76bf9d66262841ef3954c4866822f48e1bcd9f8a28e7796dd293e8e40d1603c50fc72d64a5b3d3c4f793950e1597dfe725d52c1454e28e9e056c35f02eab4aa31e3f8e440c1fb32556d4faf464ffbd8db55ef59c14ded8916366e397817465036ab31b227b17c860e0c4d6e314e0e8e743b31db47ec353436835f15cfa267c9", 0xc0, r1) keyctl$revoke(0x3, r2) add_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000400)="dee7030022cf9e5e1dbac27b0426fc0299c40800000000000000c894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976ede8860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r0) request_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0) 20:01:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r2 = gettid() process_vm_writev(r2, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) fork() madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) 20:01:18 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000ec0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="0d06a1a52587274f2f4732082c8da76bf9d66262841ef3954c4866822f48e1bcd9f8a28e7796dd293e8e40d1603c50fc72d64a5b3d3c4f793950e1597dfe725d52c1454e28e9e056c35f02eab4aa31e3f8e440c1fb32556d4faf464ffbd8db55ef59c14ded8916366e397817465036ab31b227b17c860e0c4d6e314e0e8e743b31db47ec353436835f15cfa267c9", 0xc0, r1) keyctl$revoke(0x3, r2) add_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000400)="dee7030022cf9e5e1dbac27b0426fc0299c40800000000000000c894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976ede8860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r0) request_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0) 20:01:18 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0xc0f85403, &(0x7f0000000000)={{0x1}}) 20:01:18 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000ec0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="0d06a1a52587274f2f4732082c8da76bf9d66262841ef3954c4866822f48e1bcd9f8a28e7796dd293e8e40d1603c50fc72d64a5b3d3c4f793950e1597dfe725d52c1454e28e9e056c35f02eab4aa31e3f8e440c1fb32556d4faf464ffbd8db55ef59c14ded8916366e397817465036ab31b227b17c860e0c4d6e314e0e8e743b31db47ec353436835f15cfa267c9", 0xc0, r1) keyctl$revoke(0x3, r2) add_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000400)="dee7030022cf9e5e1dbac27b0426fc0299c40800000000000000c894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976ede8860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r0) request_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0) 20:01:18 executing program 2: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xf2, &(0x7f00000002c0)="f47970da7c2fd541e0656c5762306aa606a0c2a76e59b65fa78fb184da006cabbd58564cf09dcac54f6d212e05d23391ff083d38ff122a776e08af2025580c72249ad2f5366f60b87a982a8066b10f8b85b47e770f548fd2e3c6a8323152fbeebdec6058daee7c23390ee172a191a599fd3d69623481e1af603fc9d42b2f7173f23f843eb6669d9de930445756424b355d08c8786bf6e250deae7a6d8332607f93938fabe2e77eb4ff46d2b6acf3307cc56a31e02e391ddc16c13dc7d29b1066029eb7c8e2104f912e73029259c5bae94591ce8aeee0a0e17619d8bb7afa892dc1eb22fc017336f12d9abd7e295b5149cf96"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:01:18 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000ec0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="0d06a1a52587274f2f4732082c8da76bf9d66262841ef3954c4866822f48e1bcd9f8a28e7796dd293e8e40d1603c50fc72d64a5b3d3c4f793950e1597dfe725d52c1454e28e9e056c35f02eab4aa31e3f8e440c1fb32556d4faf464ffbd8db55ef59c14ded8916366e397817465036ab31b227b17c860e0c4d6e314e0e8e743b31db47ec353436835f15cfa267c9", 0xc0, r1) keyctl$revoke(0x3, r2) add_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000400)="dee7030022cf9e5e1dbac27b0426fc0299c40800000000000000c894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976ede8860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r0) request_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0) 20:01:18 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000ec0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="0d06a1a52587274f2f4732082c8da76bf9d66262841ef3954c4866822f48e1bcd9f8a28e7796dd293e8e40d1603c50fc72d64a5b3d3c4f793950e1597dfe725d52c1454e28e9e056c35f02eab4aa31e3f8e440c1fb32556d4faf464ffbd8db55ef59c14ded8916366e397817465036ab31b227b17c860e0c4d6e314e0e8e743b31db47ec353436835f15cfa267c9", 0xc0, r1) keyctl$revoke(0x3, r2) add_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000400)="dee7030022cf9e5e1dbac27b0426fc0299c40800000000000000c894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976ede8860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r0) request_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0) 20:01:18 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000ec0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="0d06a1a52587274f2f4732082c8da76bf9d66262841ef3954c4866822f48e1bcd9f8a28e7796dd293e8e40d1603c50fc72d64a5b3d3c4f793950e1597dfe725d52c1454e28e9e056c35f02eab4aa31e3f8e440c1fb32556d4faf464ffbd8db55ef59c14ded8916366e397817465036ab31b227b17c860e0c4d6e314e0e8e743b31db47ec353436835f15cfa267c9", 0xc0, r1) keyctl$revoke(0x3, r2) add_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000400)="dee7030022cf9e5e1dbac27b0426fc0299c40800000000000000c894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976ede8860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r0) request_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0) 20:01:18 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0xc0f85403, &(0x7f0000000000)={{0x1}}) 20:01:18 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0xc0f85403, &(0x7f0000000000)={{0x1}}) 20:01:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r2 = gettid() process_vm_writev(r2, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) fork() madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) 20:01:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 20:01:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r2 = gettid() process_vm_writev(r2, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) fork() madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) 20:01:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r2 = gettid() process_vm_writev(r2, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) fork() madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) 20:01:21 executing program 1: syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_DISALLOCATE(r0, 0x5608) 20:01:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x5, 0x3f, 0x7f, 0x3f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x1f}, 0x400, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc5, 0x0, 0x8}, r0, 0xa, 0xffffffffffffffff, 0x3) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f00000001c0)={0x100004}, 0xfd57) write(r1, &(0x7f0000000380)="1c0000001a00110214f9f4072a09fc03110000000002000000020000", 0x1c) 20:01:21 executing program 2: mknod$loop(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) clone(0x2f802900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fscontext=']) 20:01:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x5, 0x3f, 0x7f, 0x3f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x1f}, 0x400, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc5, 0x0, 0x8}, r0, 0xa, 0xffffffffffffffff, 0x3) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f00000001c0)={0x100004}, 0xfd57) write(r1, &(0x7f0000000380)="1c0000001a00110214f9f4072a09fc03110000000002000000020000", 0x1c) 20:01:21 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x8101) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000080)="fe82c2e605f9e734bc5a2b454f1c4e91baad05cced5024d32dbb430a", 0x1c}], 0x1) [ 358.045287][T17925] SELinux: security_context_str_to_sid() failed for (dev tmpfs, type tmpfs) errno=-22 [ 358.080547][T17937] SELinux: security_context_str_to_sid() failed for (dev tmpfs, type tmpfs) errno=-22 20:01:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r2 = gettid() process_vm_writev(r2, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) fork() madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) 20:01:21 executing program 0: r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGREP(r0, 0x80084503, 0x0) read$char_raw(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x2040, 0x0) syncfs(r1) 20:01:21 executing program 2: mknod$loop(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) clone(0x2f802900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fscontext=']) 20:01:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x5, 0x3f, 0x7f, 0x3f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x1f}, 0x400, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc5, 0x0, 0x8}, r0, 0xa, 0xffffffffffffffff, 0x3) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f00000001c0)={0x100004}, 0xfd57) write(r1, &(0x7f0000000380)="1c0000001a00110214f9f4072a09fc03110000000002000000020000", 0x1c) 20:01:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r2 = gettid() process_vm_writev(r2, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) fork() madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) 20:01:21 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x8101) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000080)="fe82c2e605f9e734bc5a2b454f1c4e91baad05cced5024d32dbb430a", 0x1c}], 0x1) 20:01:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x5, 0x3f, 0x7f, 0x3f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x1f}, 0x400, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc5, 0x0, 0x8}, r0, 0xa, 0xffffffffffffffff, 0x3) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f00000001c0)={0x100004}, 0xfd57) write(r1, &(0x7f0000000380)="1c0000001a00110214f9f4072a09fc03110000000002000000020000", 0x1c) 20:01:21 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, &(0x7f0000000080)='system_u:object_r:fuse_device_t:s0\x00', 0x23, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) setsockopt(r0, 0x0, 0x40, &(0x7f0000000040), 0x0) 20:01:21 executing program 2: mknod$loop(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) clone(0x2f802900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fscontext=']) 20:01:21 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x8101) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000080)="fe82c2e605f9e734bc5a2b454f1c4e91baad05cced5024d32dbb430a", 0x1c}], 0x1) [ 358.205169][T17960] SELinux: security_context_str_to_sid() failed for (dev tmpfs, type tmpfs) errno=-22 20:01:21 executing program 2: mknod$loop(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) clone(0x2f802900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fscontext=']) 20:01:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_GET(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000280)={0x18, r2, 0x205ffd6c087a377d, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), r1) 20:01:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000010, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev, 0x200}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000100)={@mcast1}, 0x14) 20:01:21 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = open(&(0x7f0000000000)='./bus\x00', 0x109842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x15) 20:01:21 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, &(0x7f0000000080)='system_u:object_r:fuse_device_t:s0\x00', 0x23, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) setsockopt(r0, 0x0, 0x40, &(0x7f0000000040), 0x0) 20:01:21 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x8101) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000080)="fe82c2e605f9e734bc5a2b454f1c4e91baad05cced5024d32dbb430a", 0x1c}], 0x1) [ 358.277080][T17971] SELinux: security_context_str_to_sid() failed for (dev tmpfs, type tmpfs) errno=-22 20:01:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000010, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev, 0x200}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000100)={@mcast1}, 0x14) 20:01:21 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='numa_maps\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) 20:01:21 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = eventfd(0x0) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000200)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x6, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x1, r2}]) 20:01:21 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, &(0x7f0000000080)='system_u:object_r:fuse_device_t:s0\x00', 0x23, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) setsockopt(r0, 0x0, 0x40, &(0x7f0000000040), 0x0) [ 358.335739][T17982] SELinux: security_context_str_to_sid() failed for (dev tmpfs, type tmpfs) errno=-22 20:01:21 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='numa_maps\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) 20:01:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_GET(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000280)={0x18, r2, 0x205ffd6c087a377d, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), r1) 20:01:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000010, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev, 0x200}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000100)={@mcast1}, 0x14) 20:01:21 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, &(0x7f0000000080)='system_u:object_r:fuse_device_t:s0\x00', 0x23, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) setsockopt(r0, 0x0, 0x40, &(0x7f0000000040), 0x0) 20:01:21 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='numa_maps\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) 20:01:22 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = open(&(0x7f0000000000)='./bus\x00', 0x109842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x15) 20:01:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000010, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev, 0x200}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000100)={@mcast1}, 0x14) 20:01:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_GET(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000280)={0x18, r2, 0x205ffd6c087a377d, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), r1) 20:01:22 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = eventfd(0x0) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000200)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x6, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x1, r2}]) 20:01:22 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$TIOCSRS485(r0, 0x5409, 0x0) 20:01:22 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='numa_maps\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) 20:01:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x60f2, &(0x7f0000000540), &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000040)) mmap$IORING_OFF_CQ_RING(&(0x7f0000bff000/0x400000)=nil, 0x400000, 0x0, 0x13, r1, 0x8000000) r2 = syz_io_uring_setup(0x60f2, &(0x7f0000000540), &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) mmap$IORING_OFF_CQ_RING(&(0x7f0000e17000/0x3000)=nil, 0x3000, 0x0, 0x100011, r2, 0x8000000) 20:01:22 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000002c0)={@in={{0x2, 0x0, @remote}}, 0x0, 0x0, 0x1a, 0x0, "af701db9c5d8c309826792fcabad8a28c9f0bc84900f22fca7d44102381153397474b47bf7bc4a551e04be0b6d0a1b0b1f9e30f17764c9f519e85eef0f69644631c11ae465f3bc509a66aa8f94fb319f"}, 0xd8) fcntl$setpipe(r0, 0x407, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x14, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) sendto$inet(r2, &(0x7f0000000200)="e1", 0xfea8, 0x0, 0x0, 0x0) splice(r2, 0x0, r1, 0x0, 0x40009, 0x0) 20:01:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_GET(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000280)={0x18, r2, 0x205ffd6c087a377d, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), r1) 20:01:22 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = eventfd(0x0) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000200)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x6, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x1, r2}]) 20:01:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x60f2, &(0x7f0000000540), &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000040)) mmap$IORING_OFF_CQ_RING(&(0x7f0000bff000/0x400000)=nil, 0x400000, 0x0, 0x13, r1, 0x8000000) r2 = syz_io_uring_setup(0x60f2, &(0x7f0000000540), &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) mmap$IORING_OFF_CQ_RING(&(0x7f0000e17000/0x3000)=nil, 0x3000, 0x0, 0x100011, r2, 0x8000000) 20:01:22 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000002c0)={@in={{0x2, 0x0, @remote}}, 0x0, 0x0, 0x1a, 0x0, "af701db9c5d8c309826792fcabad8a28c9f0bc84900f22fca7d44102381153397474b47bf7bc4a551e04be0b6d0a1b0b1f9e30f17764c9f519e85eef0f69644631c11ae465f3bc509a66aa8f94fb319f"}, 0xd8) fcntl$setpipe(r0, 0x407, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x14, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) sendto$inet(r2, &(0x7f0000000200)="e1", 0xfea8, 0x0, 0x0, 0x0) splice(r2, 0x0, r1, 0x0, 0x40009, 0x0) 20:01:22 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = open(&(0x7f0000000000)='./bus\x00', 0x109842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x15) 20:01:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x60f2, &(0x7f0000000540), &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000040)) mmap$IORING_OFF_CQ_RING(&(0x7f0000bff000/0x400000)=nil, 0x400000, 0x0, 0x13, r1, 0x8000000) r2 = syz_io_uring_setup(0x60f2, &(0x7f0000000540), &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) mmap$IORING_OFF_CQ_RING(&(0x7f0000e17000/0x3000)=nil, 0x3000, 0x0, 0x100011, r2, 0x8000000) 20:01:22 executing program 4: r0 = fsopen(&(0x7f0000000080)='devpts\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x2) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) 20:01:22 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000002c0)={@in={{0x2, 0x0, @remote}}, 0x0, 0x0, 0x1a, 0x0, "af701db9c5d8c309826792fcabad8a28c9f0bc84900f22fca7d44102381153397474b47bf7bc4a551e04be0b6d0a1b0b1f9e30f17764c9f519e85eef0f69644631c11ae465f3bc509a66aa8f94fb319f"}, 0xd8) fcntl$setpipe(r0, 0x407, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x14, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) sendto$inet(r2, &(0x7f0000000200)="e1", 0xfea8, 0x0, 0x0, 0x0) splice(r2, 0x0, r1, 0x0, 0x40009, 0x0) 20:01:22 executing program 0: r0 = fsopen(&(0x7f0000000080)='devpts\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x2) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) 20:01:22 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = eventfd(0x0) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000200)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x6, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x1, r2}]) 20:01:22 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000002c0)={@in={{0x2, 0x0, @remote}}, 0x0, 0x0, 0x1a, 0x0, "af701db9c5d8c309826792fcabad8a28c9f0bc84900f22fca7d44102381153397474b47bf7bc4a551e04be0b6d0a1b0b1f9e30f17764c9f519e85eef0f69644631c11ae465f3bc509a66aa8f94fb319f"}, 0xd8) fcntl$setpipe(r0, 0x407, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x14, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) sendto$inet(r2, &(0x7f0000000200)="e1", 0xfea8, 0x0, 0x0, 0x0) splice(r2, 0x0, r1, 0x0, 0x40009, 0x0) 20:01:22 executing program 4: r0 = fsopen(&(0x7f0000000080)='devpts\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x2) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) 20:01:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x60f2, &(0x7f0000000540), &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000040)) mmap$IORING_OFF_CQ_RING(&(0x7f0000bff000/0x400000)=nil, 0x400000, 0x0, 0x13, r1, 0x8000000) r2 = syz_io_uring_setup(0x60f2, &(0x7f0000000540), &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) mmap$IORING_OFF_CQ_RING(&(0x7f0000e17000/0x3000)=nil, 0x3000, 0x0, 0x100011, r2, 0x8000000) 20:01:22 executing program 4: r0 = fsopen(&(0x7f0000000080)='devpts\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x2) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) 20:01:22 executing program 0: r0 = fsopen(&(0x7f0000000080)='devpts\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x2) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) 20:01:22 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nf_conntrack_expect\x00') lseek(r0, 0x80000000, 0x0) 20:01:22 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = open(&(0x7f0000000000)='./bus\x00', 0x109842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x15) 20:01:22 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000040)={0xc21, 0x0, 0x0, 0xfffffffd, 0x0, "1474973b9db7844ab6b1a32b7de2bc59e92300"}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000000)) 20:01:22 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$sock(r0, &(0x7f00000003c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000440)="a528b012d9aac807017d3bed694f62", 0xf}, {&(0x7f0000000140)="f7", 0x1}], 0x2}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[@timestamping={{0x14}}], 0x18}}], 0x2, 0x0) 20:01:22 executing program 4: r0 = fsopen(&(0x7f0000000080)='devpts\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x2) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) 20:01:22 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nf_conntrack_expect\x00') lseek(r0, 0x80000000, 0x0) 20:01:22 executing program 0: r0 = fsopen(&(0x7f0000000080)='devpts\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x2) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) 20:01:22 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nf_conntrack_expect\x00') lseek(r0, 0x80000000, 0x0) 20:01:22 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x5452, &(0x7f0000001000)=@buf) 20:01:22 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="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", 0x1a8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000040)={'syz1', "d795c02fd9d3581e6384ae34b40b56071cd52753fda981557f1c0389096a464c5059fef46f2d34f170fb61c8c8c6c6bb077b6205703d3aac54a280b19a83b46c68aef559998d2258cdb85bbde7394d4c2febf04b24d3e7a1ad688ce7ed6522c5cd83bec313c095c040f1fb02175a65ad01d82a49ff"}, 0x79) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) 20:01:22 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000040)={0xc21, 0x0, 0x0, 0xfffffffd, 0x0, "1474973b9db7844ab6b1a32b7de2bc59e92300"}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000000)) 20:01:22 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_score_adj\x00') writev(r0, &(0x7f0000000100)=[{&(0x7f0000000140)='1', 0x1}, {&(0x7f0000000080)="39b0", 0x2}], 0x2) 20:01:22 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="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", 0x1a8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000040)={'syz1', "d795c02fd9d3581e6384ae34b40b56071cd52753fda981557f1c0389096a464c5059fef46f2d34f170fb61c8c8c6c6bb077b6205703d3aac54a280b19a83b46c68aef559998d2258cdb85bbde7394d4c2febf04b24d3e7a1ad688ce7ed6522c5cd83bec313c095c040f1fb02175a65ad01d82a49ff"}, 0x79) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) 20:01:22 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a8687c443fdc0683800c3eb0f365c31c34de8856720000000000000093d5b8c22e287510000000000000002e5d8267491b38ea0b994806ebe884bb2b33f44a7094b42e82e9095c0568ca609fa5553c7cc8a7d6a3cf74fa896774e1c35f797ffeeb11cb8261686dcb28449024ecf9ca7d6c54066f6a2cf0997b7bc1bd682b443300ac6e972b142cf3569a02c2cefcd0fb7e6451b8f7741e23e576f0ab554aea009a4611ab5a31d6df6b63ad0a2f76f11c25e64ac2d95950ba6ef958cbea5f2a9abbe525c2136c55ab6809d28b17db4c579744191b055c26a857ec488930f89d8cf20226c09912e24babb43e627815a3850c6ca373c9803162ff5b56b28aea172f76e7247d99e8c48e4216795e9ad0b9703ddd00a1b8863916370bad9b5d5f604b56d2722d9361c3087b9ae640d716d7de72be41a8a664ef0c48fc3f3c4c99abd2ae1f86490adab71a4fc291bea59c2f89938b03f20e5d482684a59104297a2dc135a2831523365cb6f9d33e3a033b4a1a6cc819ad7e12aa7af9dc00ecb83162f6fa60f08fd28038891ec2885a099eb9", 0x1a8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000040)={'syz1', "d795c02fd9d3581e6384ae34b40b56071cd52753fda981557f1c0389096a464c5059fef46f2d34f170fb61c8c8c6c6bb077b6205703d3aac54a280b19a83b46c68aef559998d2258cdb85bbde7394d4c2febf04b24d3e7a1ad688ce7ed6522c5cd83bec313c095c040f1fb02175a65ad01d82a49ff"}, 0x79) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) 20:01:22 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nf_conntrack_expect\x00') lseek(r0, 0x80000000, 0x0) 20:01:22 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000000c0)={[{@mpol={'mpol', 0x3d, {'prefer', '', @val={0x3a, [0x38, 0x35, 0xa]}}}, 0x2}]}) 20:01:22 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000040)={0xc21, 0x0, 0x0, 0xfffffffd, 0x0, "1474973b9db7844ab6b1a32b7de2bc59e92300"}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000000)) 20:01:22 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_score_adj\x00') writev(r0, &(0x7f0000000100)=[{&(0x7f0000000140)='1', 0x1}, {&(0x7f0000000080)="39b0", 0x2}], 0x2) 20:01:22 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x10, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfffffffd}]}]}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}]}, 0x3c}}, 0x0) 20:01:22 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a8687c443fdc0683800c3eb0f365c31c34de8856720000000000000093d5b8c22e287510000000000000002e5d8267491b38ea0b994806ebe884bb2b33f44a7094b42e82e9095c0568ca609fa5553c7cc8a7d6a3cf74fa896774e1c35f797ffeeb11cb8261686dcb28449024ecf9ca7d6c54066f6a2cf0997b7bc1bd682b443300ac6e972b142cf3569a02c2cefcd0fb7e6451b8f7741e23e576f0ab554aea009a4611ab5a31d6df6b63ad0a2f76f11c25e64ac2d95950ba6ef958cbea5f2a9abbe525c2136c55ab6809d28b17db4c579744191b055c26a857ec488930f89d8cf20226c09912e24babb43e627815a3850c6ca373c9803162ff5b56b28aea172f76e7247d99e8c48e4216795e9ad0b9703ddd00a1b8863916370bad9b5d5f604b56d2722d9361c3087b9ae640d716d7de72be41a8a664ef0c48fc3f3c4c99abd2ae1f86490adab71a4fc291bea59c2f89938b03f20e5d482684a59104297a2dc135a2831523365cb6f9d33e3a033b4a1a6cc819ad7e12aa7af9dc00ecb83162f6fa60f08fd28038891ec2885a099eb9", 0x1a8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000040)={'syz1', "d795c02fd9d3581e6384ae34b40b56071cd52753fda981557f1c0389096a464c5059fef46f2d34f170fb61c8c8c6c6bb077b6205703d3aac54a280b19a83b46c68aef559998d2258cdb85bbde7394d4c2febf04b24d3e7a1ad688ce7ed6522c5cd83bec313c095c040f1fb02175a65ad01d82a49ff"}, 0x79) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) 20:01:22 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000000c0)={[{@mpol={'mpol', 0x3d, {'prefer', '', @val={0x3a, [0x38, 0x35, 0xa]}}}, 0x2}]}) 20:01:22 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_score_adj\x00') writev(r0, &(0x7f0000000100)=[{&(0x7f0000000140)='1', 0x1}, {&(0x7f0000000080)="39b0", 0x2}], 0x2) 20:01:22 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0504000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}}, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000180)=@tipc=@name, &(0x7f0000000000)=0x80, 0x0) sendfile(r2, r1, 0x0, 0x7ffff000) 20:01:22 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000040)={0xc21, 0x0, 0x0, 0xfffffffd, 0x0, "1474973b9db7844ab6b1a32b7de2bc59e92300"}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000000)) [ 359.400359][T18144] tmpfs: Bad value for 'mpol' 20:01:22 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f0000000180)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000040), 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x40020, 0x0) 20:01:22 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x10, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfffffffd}]}]}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}]}, 0x3c}}, 0x0) 20:01:22 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000000c0)={[{@mpol={'mpol', 0x3d, {'prefer', '', @val={0x3a, [0x38, 0x35, 0xa]}}}, 0x2}]}) 20:01:22 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_score_adj\x00') writev(r0, &(0x7f0000000100)=[{&(0x7f0000000140)='1', 0x1}, {&(0x7f0000000080)="39b0", 0x2}], 0x2) [ 359.464040][T18159] tmpfs: Bad value for 'mpol' 20:01:22 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r3 = socket(0x400000000000010, 0x3, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r2, 0x0, 0x16, 0x0, 0x0) 20:01:22 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x9001}, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) sendto$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @remote}, 0x14) 20:01:22 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x10, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfffffffd}]}]}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}]}, 0x3c}}, 0x0) 20:01:22 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000000c0)={[{@mpol={'mpol', 0x3d, {'prefer', '', @val={0x3a, [0x38, 0x35, 0xa]}}}, 0x2}]}) 20:01:23 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000400), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc0305302, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue0\x00'}) [ 359.527376][T18174] tmpfs: Bad value for 'mpol' 20:01:23 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r3 = socket(0x400000000000010, 0x3, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r2, 0x0, 0x16, 0x0, 0x0) [ 359.591476][T18185] tmpfs: Bad value for 'mpol' 20:01:23 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0504000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}}, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000180)=@tipc=@name, &(0x7f0000000000)=0x80, 0x0) sendfile(r2, r1, 0x0, 0x7ffff000) 20:01:23 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x9001}, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) sendto$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @remote}, 0x14) 20:01:23 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r3 = socket(0x400000000000010, 0x3, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r2, 0x0, 0x16, 0x0, 0x0) 20:01:23 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x10, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfffffffd}]}]}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}]}, 0x3c}}, 0x0) 20:01:23 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x9001}, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) sendto$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @remote}, 0x14) 20:01:23 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000400), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc0305302, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue0\x00'}) 20:01:23 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x9001}, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) sendto$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @remote}, 0x14) 20:01:23 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r3 = socket(0x400000000000010, 0x3, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r2, 0x0, 0x16, 0x0, 0x0) 20:01:23 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x9001}, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) sendto$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @remote}, 0x14) 20:01:23 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x42, &(0x7f0000000640)={0x0, &(0x7f0000000600)}, 0x10) 20:01:23 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000400), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc0305302, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue0\x00'}) 20:01:23 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x9001}, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) sendto$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @remote}, 0x14) 20:01:23 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0504000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}}, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000180)=@tipc=@name, &(0x7f0000000000)=0x80, 0x0) sendfile(r2, r1, 0x0, 0x7ffff000) 20:01:23 executing program 5: r0 = syz_io_uring_setup(0x5d7, &(0x7f00000002c0), &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000340), &(0x7f0000000380)) r1 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r0, 0x7, &(0x7f0000000000)=r1, 0x1) 20:01:23 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x9001}, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) sendto$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @remote}, 0x14) 20:01:23 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x42, &(0x7f0000000640)={0x0, &(0x7f0000000600)}, 0x10) 20:01:23 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000400), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc0305302, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue0\x00'}) 20:01:23 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=@newsa={0x160, 0x10, 0x713, 0x0, 0x0, {{@in=@loopback, @in6=@private2}, {@in6=@mcast1, 0x0, 0x33}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x2}, [@algo_auth={0x48, 0x1, {{'hmac(sha256)\x00'}}}, @replay_esn_val={0x1c}, @sec_ctx={0xc, 0x8, {0x8}}]}, 0x160}}, 0x0) 20:01:23 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x42, &(0x7f0000000640)={0x0, &(0x7f0000000600)}, 0x10) 20:01:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x38, 0x0, 0xc04a01) 20:01:23 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="24000000260007031dfffd946fa2830014000a0009000000741d8568201ba3a20400ff7e280000002500ff1803abf53e21bca91d5384d97f9d22a839ddb89e4b34947fd7cb91d34e2009a05f", 0x4c}], 0x1}, 0x0) 20:01:23 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=@newsa={0x160, 0x10, 0x713, 0x0, 0x0, {{@in=@loopback, @in6=@private2}, {@in6=@mcast1, 0x0, 0x33}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x2}, [@algo_auth={0x48, 0x1, {{'hmac(sha256)\x00'}}}, @replay_esn_val={0x1c}, @sec_ctx={0xc, 0x8, {0x8}}]}, 0x160}}, 0x0) 20:01:23 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x42, &(0x7f0000000640)={0x0, &(0x7f0000000600)}, 0x10) 20:01:23 executing program 5: clone(0x54041bc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = gettid() tkill(r1, 0x34) tkill(r1, 0x16) ptrace(0x4206, r0) [ 359.978498][T18245] __nla_validate_parse: 2 callbacks suppressed [ 359.978511][T18245] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 360.051304][T18256] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 20:01:23 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0504000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}}, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000180)=@tipc=@name, &(0x7f0000000000)=0x80, 0x0) sendfile(r2, r1, 0x0, 0x7ffff000) 20:01:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x38, 0x0, 0xc04a01) 20:01:23 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=@newsa={0x160, 0x10, 0x713, 0x0, 0x0, {{@in=@loopback, @in6=@private2}, {@in6=@mcast1, 0x0, 0x33}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x2}, [@algo_auth={0x48, 0x1, {{'hmac(sha256)\x00'}}}, @replay_esn_val={0x1c}, @sec_ctx={0xc, 0x8, {0x8}}]}, 0x160}}, 0x0) 20:01:23 executing program 3: r0 = inotify_init() r1 = epoll_create(0x200008) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) 20:01:23 executing program 5: clone(0x54041bc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = gettid() tkill(r1, 0x34) tkill(r1, 0x16) ptrace(0x4206, r0) 20:01:23 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="24000000260007031dfffd946fa2830014000a0009000000741d8568201ba3a20400ff7e280000002500ff1803abf53e21bca91d5384d97f9d22a839ddb89e4b34947fd7cb91d34e2009a05f", 0x4c}], 0x1}, 0x0) 20:01:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x38, 0x0, 0xc04a01) 20:01:23 executing program 5: clone(0x54041bc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = gettid() tkill(r1, 0x34) tkill(r1, 0x16) ptrace(0x4206, r0) [ 360.155910][ T25] audit: type=1326 audit(1623355283.595:2082): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18261 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 360.195158][T18271] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 20:01:23 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=@newsa={0x160, 0x10, 0x713, 0x0, 0x0, {{@in=@loopback, @in6=@private2}, {@in6=@mcast1, 0x0, 0x33}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x2}, [@algo_auth={0x48, 0x1, {{'hmac(sha256)\x00'}}}, @replay_esn_val={0x1c}, @sec_ctx={0xc, 0x8, {0x8}}]}, 0x160}}, 0x0) 20:01:23 executing program 3: r0 = inotify_init() r1 = epoll_create(0x200008) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) 20:01:23 executing program 5: clone(0x54041bc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = gettid() tkill(r1, 0x34) tkill(r1, 0x16) ptrace(0x4206, r0) 20:01:23 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="24000000260007031dfffd946fa2830014000a0009000000741d8568201ba3a20400ff7e280000002500ff1803abf53e21bca91d5384d97f9d22a839ddb89e4b34947fd7cb91d34e2009a05f", 0x4c}], 0x1}, 0x0) [ 360.249908][ T25] audit: type=1326 audit(1623355283.595:2083): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18261 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=233 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 360.315502][ T25] audit: type=1326 audit(1623355283.595:2084): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18261 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 360.324716][T18291] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 360.370898][ T25] audit: type=1326 audit(1623355283.595:2085): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18261 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=253 compat=0 ip=0x4665d9 code=0x7ffc0000 20:01:23 executing program 3: r0 = inotify_init() r1 = epoll_create(0x200008) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) 20:01:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x38, 0x0, 0xc04a01) 20:01:23 executing program 1: clone(0x54041bc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = gettid() tkill(r1, 0x34) tkill(r1, 0x16) ptrace(0x4206, r0) 20:01:23 executing program 2: r0 = syz_io_uring_setup(0x5d7, &(0x7f00000002c0), &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000340), &(0x7f0000000380)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000024c0)=[{&(0x7f00000003c0)=""/4096, 0xd00b00}, {&(0x7f0000000100)}], 0x2) 20:01:23 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$notify(r0, 0x402, 0x0) [ 360.408899][ T25] audit: type=1326 audit(1623355283.595:2086): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18261 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 20:01:23 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="24000000260007031dfffd946fa2830014000a0009000000741d8568201ba3a20400ff7e280000002500ff1803abf53e21bca91d5384d97f9d22a839ddb89e4b34947fd7cb91d34e2009a05f", 0x4c}], 0x1}, 0x0) 20:01:23 executing program 1: clone(0x54041bc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = gettid() tkill(r1, 0x34) tkill(r1, 0x16) ptrace(0x4206, r0) 20:01:23 executing program 1: clone(0x54041bc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = gettid() tkill(r1, 0x34) tkill(r1, 0x16) ptrace(0x4206, r0) [ 360.460567][ T25] audit: type=1326 audit(1623355283.595:2087): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18261 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=213 compat=0 ip=0x4665d9 code=0x7ffc0000 20:01:23 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000180)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@version_u}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}, 0x22}]}}) 20:01:23 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:01:24 executing program 3: r0 = inotify_init() r1 = epoll_create(0x200008) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) 20:01:24 executing program 1: munmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000) madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x10) [ 360.536111][T18317] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 360.574680][T18322] 9pnet: Insufficient options for proto=fd 20:01:24 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000180)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@version_u}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}, 0x22}]}}) 20:01:24 executing program 0: perf_event_open(&(0x7f0000002000)={0x2, 0x80, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x7) [ 360.589794][ T25] audit: type=1326 audit(1623355283.595:2088): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18261 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 360.615985][T18329] 9pnet: Insufficient options for proto=fd 20:01:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x80, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x4, 0xc000, 0x4, @perf_config_ext={0x7, 0x594}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) open(&(0x7f0000000180)='./bus\x00', 0x141042, 0x18) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file1\x00', 0x0, &(0x7f0000000100)={'U+', 0x80000000}, 0x16, 0x2) r0 = creat(&(0x7f00000004c0)='./file1\x00', 0x106) accept4$packet(r0, 0x0, &(0x7f00000002c0), 0x180800) add_key$fscrypt_provisioning(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000780)=ANY=[@ANYBLOB="01004f1c425541cc05053ff82fc2000000000069d5ae5254a7a03f87a4107a05fabcd1afe4fa3fd7734506a711a9d5ea846586a2025128900dd255a78672f0d599d5de8fc6e31d659e3edfc02b98c0b77efc36a48e9692bb3a0caed8610e041bd2208017607b1d3f975c4ef77fc4e8fc87adb8325184378a3bee6e3ef77400cef85479b8842707facb8c497e7dac1f9401be318a2723e4c4e54cff675dec17d7a9d1be121dead1509ab6327850fcdc0da057b1bffefee5b8319bdcdfac2a1b5ca044e5a3d08635984e000000000000000000000000000000d289054cdcccdee121c3b2bef6f8d0b02e0107ebff51f64fc0b8cf4db7a12edcfa37b01eaab682a88ef66899f21f87b203f6f6d342c9e14c574baf6ac76b9227c666320213dee23dcb094439ac8e855d23ac42f47263405bd234a577424755f457d0c58cfd3c18bd447ffe0f4424329226582123bc091be0685fab293c502e2382b853bdd9bf421edb6dc1b7531749785b30ab4aec379bad9e7c8f517687187116489cd280d7ccab8f710d48c7dec0bbad10c2ef017bc1c1f3adfeeae8acc1bde7958c92fd5eed85e1ca43a313d9120035af31e6ac"], 0x44, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x11c19, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x40, 0x0, 0x0, 0x6, 0x2, 0x4, 0x3ff}, 0x0, 0x5, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r1, 0x10, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x20) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x16e) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x801e}) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000440)='./file1/../file0\x00', 0xd4, 0x2, &(0x7f00000003c0)=[{&(0x7f0000000340)="93eb49f111f69ed5bd4d13b7859fbd6b01cacafac696", 0x16, 0x1f}, {&(0x7f0000000380)="a81480b4af7c828d538ca547bb93ab11ce16ef6951540da75c0a4f6317f9", 0x1e}], 0xa000, &(0x7f0000000400)={[{@rodir}, {@numtail}, {@shortname_lower}]}) creat(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) 20:01:24 executing program 2: setpgid(0x0, 0xffffffffffffffff) 20:01:24 executing program 1: munmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000) madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x10) 20:01:24 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000180)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@version_u}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}, 0x22}]}}) 20:01:24 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 360.680268][T18338] 9pnet: Insufficient options for proto=fd [ 360.686495][ T25] audit: type=1326 audit(1623355283.595:2089): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18261 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 20:01:24 executing program 0: perf_event_open(&(0x7f0000002000)={0x2, 0x80, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x7) 20:01:24 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000180)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@version_u}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}, 0x22}]}}) 20:01:24 executing program 2: setpgid(0x0, 0xffffffffffffffff) [ 360.741302][T18347] 9pnet: Insufficient options for proto=fd [ 360.760052][ T25] audit: type=1326 audit(1623355283.785:2090): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18285 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 20:01:24 executing program 1: munmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000) madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x10) 20:01:24 executing program 0: perf_event_open(&(0x7f0000002000)={0x2, 0x80, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x7) 20:01:24 executing program 2: setpgid(0x0, 0xffffffffffffffff) 20:01:24 executing program 4: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f00000051c0)={0x0, {{0x2, 0x0, @empty}}, {{0x2, 0x0, @broadcast}}}, 0x108) [ 360.807846][ T25] audit: type=1326 audit(1623355283.795:2091): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18285 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=233 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 360.816824][T18357] 9pnet: Insufficient options for proto=fd [ 360.869137][T18340] EXT4-fs error (device sda1): mb_free_blocks:1822: group 6, inode 14595: block 221214:freeing already freed block (bit 24606); block bitmap corrupt. [ 360.884527][T18340] EXT4-fs (sda1): pa ffff888106743c98: logic 32768, phys. 221184, len 2048 [ 360.893176][T18340] EXT4-fs error (device sda1): ext4_mb_release_inode_pa:4704: group 6, free 2018, pa_free 2007 20:01:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x80, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x4, 0xc000, 0x4, @perf_config_ext={0x7, 0x594}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) open(&(0x7f0000000180)='./bus\x00', 0x141042, 0x18) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file1\x00', 0x0, &(0x7f0000000100)={'U+', 0x80000000}, 0x16, 0x2) r0 = creat(&(0x7f00000004c0)='./file1\x00', 0x106) accept4$packet(r0, 0x0, &(0x7f00000002c0), 0x180800) add_key$fscrypt_provisioning(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x44, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x11c19, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x40, 0x0, 0x0, 0x6, 0x2, 0x4, 0x3ff}, 0x0, 0x5, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r1, 0x10, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x20) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x16e) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x801e}) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000440)='./file1/../file0\x00', 0xd4, 0x2, &(0x7f00000003c0)=[{&(0x7f0000000340)="93eb49f111f69ed5bd4d13b7859fbd6b01cacafac696", 0x16, 0x1f}, {&(0x7f0000000380)="a81480b4af7c828d538ca547bb93ab11ce16ef6951540da75c0a4f6317f9", 0x1e}], 0xa000, &(0x7f0000000400)={[{@rodir}, {@numtail}, {@shortname_lower}]}) creat(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) 20:01:24 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:01:24 executing program 1: munmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000) madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x10) 20:01:24 executing program 4: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f00000051c0)={0x0, {{0x2, 0x0, @empty}}, {{0x2, 0x0, @broadcast}}}, 0x108) 20:01:24 executing program 0: perf_event_open(&(0x7f0000002000)={0x2, 0x80, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x7) 20:01:24 executing program 2: setpgid(0x0, 0xffffffffffffffff) 20:01:24 executing program 4: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f00000051c0)={0x0, {{0x2, 0x0, @empty}}, {{0x2, 0x0, @broadcast}}}, 0x108) 20:01:24 executing program 2: clone(0x200300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000000)) ptrace(0x10, r0) ptrace$getregset(0x11, r0, 0x0, &(0x7f0000001880)={0x0}) 20:01:24 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCGETA(r0, 0x541a, &(0x7f0000000000)) 20:01:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f00000038c0), 0x4000000000000a8, 0x0) recvmmsg(r0, &(0x7f0000005c80)=[{{0x0, 0x0, &(0x7f0000003e40)=[{&(0x7f00000018c0)=""/156, 0x9c}], 0x1}}], 0x1, 0x0, &(0x7f0000005d80)={0x77359400}) 20:01:24 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:01:24 executing program 4: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f00000051c0)={0x0, {{0x2, 0x0, @empty}}, {{0x2, 0x0, @broadcast}}}, 0x108) 20:01:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x80, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x4, 0xc000, 0x4, @perf_config_ext={0x7, 0x594}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) open(&(0x7f0000000180)='./bus\x00', 0x141042, 0x18) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file1\x00', 0x0, &(0x7f0000000100)={'U+', 0x80000000}, 0x16, 0x2) r0 = creat(&(0x7f00000004c0)='./file1\x00', 0x106) accept4$packet(r0, 0x0, &(0x7f00000002c0), 0x180800) add_key$fscrypt_provisioning(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x44, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x11c19, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x40, 0x0, 0x0, 0x6, 0x2, 0x4, 0x3ff}, 0x0, 0x5, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r1, 0x10, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x20) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x16e) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x801e}) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000440)='./file1/../file0\x00', 0xd4, 0x2, &(0x7f00000003c0)=[{&(0x7f0000000340)="93eb49f111f69ed5bd4d13b7859fbd6b01cacafac696", 0x16, 0x1f}, {&(0x7f0000000380)="a81480b4af7c828d538ca547bb93ab11ce16ef6951540da75c0a4f6317f9", 0x1e}], 0xa000, &(0x7f0000000400)={[{@rodir}, {@numtail}, {@shortname_lower}]}) creat(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) 20:01:24 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCGETA(r0, 0x541a, &(0x7f0000000000)) 20:01:24 executing program 2: clone(0x200300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000000)) ptrace(0x10, r0) ptrace$getregset(0x11, r0, 0x0, &(0x7f0000001880)={0x0}) 20:01:24 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c453020202020202010", 0x4c, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) truncate(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x80041, 0x0) 20:01:24 executing program 4: r0 = socket(0x10, 0x80000000000802, 0x0) write(r0, &(0x7f0000000000)="fc0000001c007f030000000f0000070007ab080002000000f000020821000000000f0000000000000037000000039815fad151ba010200d0a8e54e46fe00006a0a00020009f8ffffff693dacc63b01958dd603d9182a9bfbbae9e58c01b5562ab55b44a79e32d9df0d11512fcd4e51e0cad44000150000008934d07302ad23fed20100e9d39c51c701185e744afe49e28162f4fe7b0000005538000033d477e2a0fc020800000b000000d49e0c0d6ebe06ba4a463ae4f5566f91cf190201ded815b2ccdd430695392a0104000000000000001d066b6b577283c327366aa03a17e583df150c3b8853198820450200870271bfe9c8c077c34d3c2dd5f7", 0xfc) [ 361.219279][T18384] EXT4-fs error (device sda1): mb_free_blocks:1822: group 8, inode 14899: block 264222:freeing already freed block (bit 2078); block bitmap corrupt. [ 361.234489][T18384] EXT4-fs (sda1): pa ffff888106658c30: logic 32768, phys. 264192, len 2048 [ 361.243129][T18384] EXT4-fs error (device sda1): ext4_mb_release_inode_pa:4704: group 8, free 2018, pa_free 2007 20:01:24 executing program 2: clone(0x200300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000000)) ptrace(0x10, r0) ptrace$getregset(0x11, r0, 0x0, &(0x7f0000001880)={0x0}) 20:01:24 executing program 4: r0 = socket(0x10, 0x80000000000802, 0x0) write(r0, &(0x7f0000000000)="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", 0xfc) [ 361.275946][T18417] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.4'. [ 361.292662][T18422] loop5: detected capacity change from 0 to 6 [ 361.304186][T18422] FAT-fs (loop5): Directory bread(block 6) failed 20:01:24 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCGETA(r0, 0x541a, &(0x7f0000000000)) 20:01:24 executing program 2: clone(0x200300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000000)) ptrace(0x10, r0) ptrace$getregset(0x11, r0, 0x0, &(0x7f0000001880)={0x0}) [ 361.322285][T18422] FAT-fs (loop5): error, corrupted directory (invalid entries) [ 361.329865][T18422] FAT-fs (loop5): Filesystem has been set read-only [ 361.336665][T18422] FAT-fs (loop5): error, corrupted directory (invalid entries) [ 361.377991][T18432] FAT-fs (loop5): error, corrupted directory (invalid entries) [ 361.386249][T18435] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.4'. [ 361.468807][T18419] EXT4-fs error (device sda1): mb_free_blocks:1822: group 10, inode 14883: block 329758:freeing already freed block (bit 2078); block bitmap corrupt. [ 361.484168][T18419] EXT4-fs (sda1): pa ffff888106743e38: logic 32768, phys. 329728, len 2048 [ 361.492902][T18419] EXT4-fs error (device sda1): ext4_mb_release_inode_pa:4704: group 10, free 2018, pa_free 2007 20:01:25 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c453020202020202010", 0x4c, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) truncate(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x80041, 0x0) 20:01:25 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c453020202020202010", 0x4c, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) truncate(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x80041, 0x0) 20:01:25 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c453020202020202010", 0x4c, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) truncate(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x80041, 0x0) 20:01:25 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCGETA(r0, 0x541a, &(0x7f0000000000)) 20:01:25 executing program 4: r0 = socket(0x10, 0x80000000000802, 0x0) write(r0, &(0x7f0000000000)="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", 0xfc) 20:01:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x80, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x4, 0xc000, 0x4, @perf_config_ext={0x7, 0x594}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) open(&(0x7f0000000180)='./bus\x00', 0x141042, 0x18) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file1\x00', 0x0, &(0x7f0000000100)={'U+', 0x80000000}, 0x16, 0x2) r0 = creat(&(0x7f00000004c0)='./file1\x00', 0x106) accept4$packet(r0, 0x0, &(0x7f00000002c0), 0x180800) add_key$fscrypt_provisioning(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x44, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x40, 0x0, 0x0, 0x0, 0x10001, 0x11c19, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x40, 0x0, 0x0, 0x6, 0x2, 0x4, 0x3ff}, 0x0, 0x5, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r1, 0x10, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x20) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x16e) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x801e}) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000440)='./file1/../file0\x00', 0xd4, 0x2, &(0x7f00000003c0)=[{&(0x7f0000000340)="93eb49f111f69ed5bd4d13b7859fbd6b01cacafac696", 0x16, 0x1f}, {&(0x7f0000000380)="a81480b4af7c828d538ca547bb93ab11ce16ef6951540da75c0a4f6317f9", 0x1e}], 0xa000, &(0x7f0000000400)={[{@rodir}, {@numtail}, {@shortname_lower}]}) creat(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 361.980106][T18452] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.4'. [ 361.990200][T18454] loop2: detected capacity change from 0 to 6 [ 361.996963][T18456] loop5: detected capacity change from 0 to 6 [ 362.005591][T18454] FAT-fs (loop2): Directory bread(block 6) failed [ 362.018021][T18456] FAT-fs (loop5): Directory bread(block 6) failed 20:01:25 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x0, 0xc63f}]}) 20:01:25 executing program 4: r0 = socket(0x10, 0x80000000000802, 0x0) write(r0, &(0x7f0000000000)="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", 0xfc) [ 362.027899][T18460] loop0: detected capacity change from 0 to 6 [ 362.039726][T18454] FAT-fs (loop2): error, corrupted directory (invalid entries) [ 362.047315][T18454] FAT-fs (loop2): Filesystem has been set read-only [ 362.065103][T18460] FAT-fs (loop0): Directory bread(block 6) failed [ 362.070031][T18460] FAT-fs (loop0): error, corrupted directory (invalid entries) [ 362.070042][T18460] FAT-fs (loop0): Filesystem has been set read-only [ 362.070319][T18460] FAT-fs (loop0): error, corrupted directory (invalid entries) [ 362.073795][T18456] FAT-fs (loop5): error, corrupted directory (invalid entries) [ 362.073808][T18456] FAT-fs (loop5): Filesystem has been set read-only 20:01:25 executing program 4: accept$inet(0xffffffffffffffff, 0x0, 0x0) 20:01:25 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c453020202020202010", 0x4c, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) truncate(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x80041, 0x0) 20:01:25 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c453020202020202010", 0x4c, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) truncate(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x80041, 0x0) 20:01:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/sockstat6\x00') pread64(r0, &(0x7f0000000340)=""/187, 0xbb, 0x0) 20:01:25 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x0, 0xc63f}]}) 20:01:25 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c453020202020202010", 0x4c, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) truncate(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x80041, 0x0) [ 362.073906][T18456] FAT-fs (loop5): error, corrupted directory (invalid entries) [ 362.105409][T18469] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.4'. [ 362.115584][T18468] FAT-fs (loop2): error, corrupted directory (invalid entries) 20:01:25 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x0, 0xc63f}]}) [ 362.196627][T18450] EXT4-fs error (device sda1): mb_free_blocks:1822: group 12, inode 15187: block 393246:freeing already freed block (bit 30); block bitmap corrupt. [ 362.211736][T18450] EXT4-fs (sda1): pa ffff888106743e38: logic 32768, phys. 393216, len 2048 [ 362.220483][T18450] EXT4-fs error (device sda1): ext4_mb_release_inode_pa:4704: group 12, free 2018, pa_free 2007 20:01:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/sockstat6\x00') pread64(r0, &(0x7f0000000340)=""/187, 0xbb, 0x0) 20:01:25 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x0, 0xc63f}]}) [ 362.272737][T18482] loop5: detected capacity change from 0 to 6 [ 362.279118][T18487] loop2: detected capacity change from 0 to 6 [ 362.283769][T18486] loop0: detected capacity change from 0 to 6 [ 362.304368][T18486] FAT-fs (loop0): Directory bread(block 6) failed [ 362.315098][T18487] FAT-fs (loop2): Directory bread(block 6) failed 20:01:25 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c453020202020202010", 0x4c, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) truncate(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x80041, 0x0) [ 362.322768][T18487] FAT-fs (loop2): error, corrupted directory (invalid entries) [ 362.330428][T18487] FAT-fs (loop2): Filesystem has been set read-only [ 362.337084][T18486] FAT-fs (loop0): error, corrupted directory (invalid entries) [ 362.337112][T18486] FAT-fs (loop0): Filesystem has been set read-only [ 362.339399][T18487] FAT-fs (loop2): error, corrupted directory (invalid entries) [ 362.346447][T18486] FAT-fs (loop0): error, corrupted directory (invalid entries) 20:01:25 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x0, 0xc63f}]}) 20:01:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/sockstat6\x00') pread64(r0, &(0x7f0000000340)=""/187, 0xbb, 0x0) 20:01:25 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x0, 0xc63f}]}) [ 362.367878][T18482] FAT-fs (loop5): Directory bread(block 6) failed 20:01:25 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c453020202020202010", 0x4c, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) truncate(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x80041, 0x0) 20:01:25 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c453020202020202010", 0x4c, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) truncate(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x80041, 0x0) 20:01:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/sockstat6\x00') pread64(r0, &(0x7f0000000340)=""/187, 0xbb, 0x0) 20:01:25 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) 20:01:25 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x0, 0xc63f}]}) 20:01:25 executing program 2: sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="18000000010201"], 0x18}}, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2f6) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x447fe7, 0x0) [ 362.423677][T18508] loop2: detected capacity change from 0 to 6 [ 362.430728][T18508] FAT-fs (loop2): Directory bread(block 6) failed [ 362.449158][T18508] FAT-fs (loop2): error, corrupted directory (invalid entries) [ 362.456742][T18508] FAT-fs (loop2): Filesystem has been set read-only [ 362.463883][T18508] FAT-fs (loop2): error, corrupted directory (invalid entries) 20:01:25 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) 20:01:25 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80104592, &(0x7f00000000c0)=[0x0, 0xfffffffa]) 20:01:25 executing program 3: unshare(0x600) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2000002) [ 362.492568][T18512] loop5: detected capacity change from 0 to 6 [ 362.504322][T18512] FAT-fs (loop5): Directory bread(block 6) failed 20:01:26 executing program 3: unshare(0x600) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2000002) [ 362.556109][T18512] FAT-fs (loop5): error, corrupted directory (invalid entries) [ 362.563693][T18512] FAT-fs (loop5): Filesystem has been set read-only [ 362.595803][T18528] loop0: detected capacity change from 0 to 6 20:01:26 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) 20:01:26 executing program 3: unshare(0x600) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2000002) [ 362.604821][T18528] FAT-fs (loop0): Directory bread(block 6) failed [ 362.636392][T18532] FAT-fs (loop5): error, corrupted directory (invalid entries) [ 362.648261][T18528] FAT-fs (loop0): error, corrupted directory (invalid entries) [ 362.655846][T18528] FAT-fs (loop0): Filesystem has been set read-only [ 362.663677][T18539] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 20:01:26 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80104592, &(0x7f00000000c0)=[0x0, 0xfffffffa]) 20:01:26 executing program 3: unshare(0x600) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2000002) 20:01:26 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) 20:01:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000000100)={0x10, 0x0, 0x25dfdbfe}, 0xc) bind$netlink(r0, &(0x7f00000000c0)={0x10, 0x0, 0x25dfdbfe}, 0xc) 20:01:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9c, 0x0) clock_adjtime(0x0, &(0x7f0000000140)={0x10000072d9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x26c0}) [ 362.691849][T18528] FAT-fs (loop0): error, corrupted directory (invalid entries) 20:01:26 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in6=@private1={0xfc, 0x3}, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 20:01:26 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = getpgrp(0x0) sched_getaffinity(r0, 0x8, &(0x7f0000000000)) 20:01:26 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80104592, &(0x7f00000000c0)=[0x0, 0xfffffffa]) 20:01:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9c, 0x0) clock_adjtime(0x0, &(0x7f0000000140)={0x10000072d9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x26c0}) 20:01:26 executing program 2: sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="18000000010201"], 0x18}}, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2f6) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x447fe7, 0x0) 20:01:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000000100)={0x10, 0x0, 0x25dfdbfe}, 0xc) bind$netlink(r0, &(0x7f00000000c0)={0x10, 0x0, 0x25dfdbfe}, 0xc) 20:01:26 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80104592, &(0x7f00000000c0)=[0x0, 0xfffffffa]) 20:01:26 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = getpgrp(0x0) sched_getaffinity(r0, 0x8, &(0x7f0000000000)) 20:01:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000000100)={0x10, 0x0, 0x25dfdbfe}, 0xc) bind$netlink(r0, &(0x7f00000000c0)={0x10, 0x0, 0x25dfdbfe}, 0xc) 20:01:26 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = getpgrp(0x0) sched_getaffinity(r0, 0x8, &(0x7f0000000000)) 20:01:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9c, 0x0) clock_adjtime(0x0, &(0x7f0000000140)={0x10000072d9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x26c0}) 20:01:26 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000c40)={0x40, 0x0, 0x2, 0x3, 0x0, 0x0, {0x2}, [@CTA_EXPECT_TUPLE={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x4}}]}, @CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_MASTER={0x4}]}, 0x40}}, 0x0) 20:01:27 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = getpgrp(0x0) sched_getaffinity(r0, 0x8, &(0x7f0000000000)) 20:01:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = getpgrp(0x0) sched_getaffinity(r0, 0x8, &(0x7f0000000000)) 20:01:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000000100)={0x10, 0x0, 0x25dfdbfe}, 0xc) bind$netlink(r0, &(0x7f00000000c0)={0x10, 0x0, 0x25dfdbfe}, 0xc) 20:01:27 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x43, 0xd9c, 0x0) clock_adjtime(0x0, &(0x7f0000000140)={0x10000072d9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x26c0}) [ 363.575089][T18586] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 20:01:27 executing program 2: sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="18000000010201"], 0x18}}, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2f6) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x447fe7, 0x0) 20:01:27 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000c40)={0x40, 0x0, 0x2, 0x3, 0x0, 0x0, {0x2}, [@CTA_EXPECT_TUPLE={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x4}}]}, @CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_MASTER={0x4}]}, 0x40}}, 0x0) 20:01:27 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = getpgrp(0x0) sched_getaffinity(r0, 0x8, &(0x7f0000000000)) 20:01:27 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x3, &(0x7f00000000c0)=[{0x24}, {0x80}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000006340)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 20:01:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = getpgrp(0x0) sched_getaffinity(r0, 0x8, &(0x7f0000000000)) 20:01:27 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f00000002c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004fb01", 0x17}, {0x0}], 0x0, &(0x7f0000000080)={[{@fat=@sys_immutable}]}) [ 364.354540][T18605] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 364.383779][T18607] loop0: detected capacity change from 0 to 1560 20:01:27 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x3, &(0x7f00000000c0)=[{0x24}, {0x80}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000006340)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 20:01:27 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @multicast2}, {0x0, @multicast}, 0x3a, {}, 'lo\x00'}) 20:01:27 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000c40)={0x40, 0x0, 0x2, 0x3, 0x0, 0x0, {0x2}, [@CTA_EXPECT_TUPLE={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x4}}]}, @CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_MASTER={0x4}]}, 0x40}}, 0x0) 20:01:27 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r0, 0x11, 0x29, &(0x7f0000001700)={@local, @remote}, 0x10) [ 364.400448][T18607] FAT-fs (loop0): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. 20:01:27 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f00000002c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004fb01", 0x17}, {0x0}], 0x0, &(0x7f0000000080)={[{@fat=@sys_immutable}]}) 20:01:27 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @multicast2}, {0x0, @multicast}, 0x3a, {}, 'lo\x00'}) [ 364.472937][T18624] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 364.532949][T18630] loop0: detected capacity change from 0 to 1560 [ 364.542257][T18630] FAT-fs (loop0): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. 20:01:28 executing program 2: sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="18000000010201"], 0x18}}, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2f6) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x447fe7, 0x0) 20:01:28 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r0, 0x11, 0x29, &(0x7f0000001700)={@local, @remote}, 0x10) 20:01:28 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x3, &(0x7f00000000c0)=[{0x24}, {0x80}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000006340)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 20:01:28 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000c40)={0x40, 0x0, 0x2, 0x3, 0x0, 0x0, {0x2}, [@CTA_EXPECT_TUPLE={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x4}}]}, @CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_MASTER={0x4}]}, 0x40}}, 0x0) 20:01:28 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @multicast2}, {0x0, @multicast}, 0x3a, {}, 'lo\x00'}) 20:01:28 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f00000002c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004fb01", 0x17}, {0x0}], 0x0, &(0x7f0000000080)={[{@fat=@sys_immutable}]}) 20:01:28 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r0, 0x11, 0x29, &(0x7f0000001700)={@local, @remote}, 0x10) 20:01:28 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x3, &(0x7f00000000c0)=[{0x24}, {0x80}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000006340)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 365.249665][T18643] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 365.284175][T18645] loop0: detected capacity change from 0 to 1560 20:01:28 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @multicast2}, {0x0, @multicast}, 0x3a, {}, 'lo\x00'}) 20:01:28 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp6\x00') preadv2(r0, &(0x7f0000000040)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x3, 0x0, 0x0) 20:01:28 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a8687c443fdc0683800c3eb0f365c31c34de8856720000000000000093d5b8c22e287510000000000000002e5d8267491b38ea0b994806ebe884bb2b33f44a7094b42e82e9095c0568ca609fa5553c7cc8a7d6a3cf74fa896774e1c35f797ffeeb11cb8261686dcb28449024ecf9ca7d6c54066f6a2cf0997b7bc1bd682b443300ac6e972b142cf3569a02c2cefcd0fb7e6451b8f7741e23e576f0ab554aea009a4611ab5a31d6df6b63ad0a2f76f11c25e64ac2d95950ba6ef958cbea5f2a9abbe525c2136c55ab6809d28b17db4c579744191b055c26a857ec488930f89d8cf20226c09912e24babb43e627815a3850c6ca373c9803162ff5b56b28aea172f76e7247d99e8c48e4216795e9ad0b9703ddd00a1b8863916370bad9b5d5f604b56d2722d", 0x13d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x3) [ 365.302492][T18645] FAT-fs (loop0): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 365.332055][T18654] __nla_validate_parse: 2 callbacks suppressed [ 365.332066][T18654] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 20:01:28 executing program 1: syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040), 0xffffffffffffffff) syz_open_dev$vcsu(0x0, 0x0, 0x0) 20:01:29 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f00000002c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004fb01", 0x17}, {0x0}], 0x0, &(0x7f0000000080)={[{@fat=@sys_immutable}]}) 20:01:29 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r0, 0x11, 0x29, &(0x7f0000001700)={@local, @remote}, 0x10) 20:01:29 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp6\x00') preadv2(r0, &(0x7f0000000040)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x3, 0x0, 0x0) 20:01:29 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400009) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f00000005c0)={0x2, 0x80, 0x4d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) 20:01:29 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="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", 0x13d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x3) 20:01:29 executing program 2: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone3(&(0x7f0000000000)={0xe00e1400, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) wait4(0x0, 0x0, 0x0, 0x0) 20:01:29 executing program 3: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) write$tcp_mem(r0, &(0x7f0000000280), 0x3fffff) 20:01:29 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp6\x00') preadv2(r0, &(0x7f0000000040)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x3, 0x0, 0x0) 20:01:29 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp6\x00') preadv2(r0, &(0x7f0000000040)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x3, 0x0, 0x0) 20:01:29 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400009) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f00000005c0)={0x2, 0x80, 0x4d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) [ 366.169921][T18680] loop0: detected capacity change from 0 to 1560 [ 366.193600][T18680] FAT-fs (loop0): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. 20:01:29 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000040)=[{0x1, 0xfffe}, {}], 0x2) syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)) 20:01:29 executing program 3: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) write$tcp_mem(r0, &(0x7f0000000280), 0x3fffff) 20:01:29 executing program 2: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone3(&(0x7f0000000000)={0xe00e1400, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) wait4(0x0, 0x0, 0x0, 0x0) 20:01:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)={0x14, r1, 0x1, 0x0, 0x0, {0x12}}, 0x14}}, 0x0) 20:01:29 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400009) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f00000005c0)={0x2, 0x80, 0x4d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) 20:01:29 executing program 3: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) write$tcp_mem(r0, &(0x7f0000000280), 0x3fffff) 20:01:32 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="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", 0x13d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x3) 20:01:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)={0x14, r1, 0x1, 0x0, 0x0, {0x12}}, 0x14}}, 0x0) 20:01:32 executing program 3: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) write$tcp_mem(r0, &(0x7f0000000280), 0x3fffff) 20:01:32 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400009) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f00000005c0)={0x2, 0x80, 0x4d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) 20:01:32 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000040)=[{0x1, 0xfffe}, {}], 0x2) syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)) 20:01:32 executing program 3: creat(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@cache_fscache, 0x3b}]}}) 20:01:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)={0x14, r1, 0x1, 0x0, 0x0, {0x12}}, 0x14}}, 0x0) 20:01:32 executing program 3: creat(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@cache_fscache, 0x3b}]}}) [ 369.234640][T18747] 9p: Unknown Cache mode fscache; [ 369.278682][T18751] 9p: Unknown Cache mode fscache; 20:01:32 executing program 2: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone3(&(0x7f0000000000)={0xe00e1400, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) wait4(0x0, 0x0, 0x0, 0x0) 20:01:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)={0x14, r1, 0x1, 0x0, 0x0, {0x12}}, 0x14}}, 0x0) 20:01:32 executing program 1: r0 = io_uring_setup(0x20003154, &(0x7f0000005400)={0x0, 0x8673, 0x18}) r1 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r1, &(0x7f00000002c0)={&(0x7f0000000000)=@abs={0x1}, 0x6e, 0x0, 0x0, &(0x7f0000000280)=[@rights={{0x18, 0x1, 0x1, [r0, r0]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x30}, 0x0) 20:01:32 executing program 3: creat(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@cache_fscache, 0x3b}]}}) 20:01:32 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0xffffffff) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000000)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) read(r0, &(0x7f0000001c40)=""/238, 0xee) [ 369.413482][T18763] 9p: Unknown Cache mode fscache; 20:01:35 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="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", 0x13d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x3) 20:01:35 executing program 1: r0 = io_uring_setup(0x20003154, &(0x7f0000005400)={0x0, 0x8673, 0x18}) r1 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r1, &(0x7f00000002c0)={&(0x7f0000000000)=@abs={0x1}, 0x6e, 0x0, 0x0, &(0x7f0000000280)=[@rights={{0x18, 0x1, 0x1, [r0, r0]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x30}, 0x0) 20:01:35 executing program 3: creat(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@cache_fscache, 0x3b}]}}) 20:01:35 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0xffffffff) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000000)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) read(r0, &(0x7f0000001c40)=""/238, 0xee) 20:01:35 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000040)=[{0x1, 0xfffe}, {}], 0x2) syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)) 20:01:35 executing program 1: r0 = io_uring_setup(0x20003154, &(0x7f0000005400)={0x0, 0x8673, 0x18}) r1 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r1, &(0x7f00000002c0)={&(0x7f0000000000)=@abs={0x1}, 0x6e, 0x0, 0x0, &(0x7f0000000280)=[@rights={{0x18, 0x1, 0x1, [r0, r0]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x30}, 0x0) 20:01:35 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0xffffffff) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000000)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) read(r0, &(0x7f0000001c40)=""/238, 0xee) [ 372.260119][T18782] 9p: Unknown Cache mode fscache; 20:01:35 executing program 2: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone3(&(0x7f0000000000)={0xe00e1400, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) wait4(0x0, 0x0, 0x0, 0x0) 20:01:35 executing program 3: r0 = io_uring_setup(0x20003154, &(0x7f0000005400)={0x0, 0x8673, 0x18}) r1 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r1, &(0x7f00000002c0)={&(0x7f0000000000)=@abs={0x1}, 0x6e, 0x0, 0x0, &(0x7f0000000280)=[@rights={{0x18, 0x1, 0x1, [r0, r0]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x30}, 0x0) 20:01:35 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0xffffffff) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000000)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) read(r0, &(0x7f0000001c40)=""/238, 0xee) 20:01:35 executing program 1: r0 = io_uring_setup(0x20003154, &(0x7f0000005400)={0x0, 0x8673, 0x18}) r1 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r1, &(0x7f00000002c0)={&(0x7f0000000000)=@abs={0x1}, 0x6e, 0x0, 0x0, &(0x7f0000000280)=[@rights={{0x18, 0x1, 0x1, [r0, r0]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x30}, 0x0) 20:01:35 executing program 3: r0 = io_uring_setup(0x20003154, &(0x7f0000005400)={0x0, 0x8673, 0x18}) r1 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r1, &(0x7f00000002c0)={&(0x7f0000000000)=@abs={0x1}, 0x6e, 0x0, 0x0, &(0x7f0000000280)=[@rights={{0x18, 0x1, 0x1, [r0, r0]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x30}, 0x0) 20:01:38 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000040)=[{0x1, 0xfffe}, {}], 0x2) syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)) 20:01:38 executing program 4: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = open(&(0x7f0000000400)='./file0/../file0\x00', 0x0, 0x0) chroot(&(0x7f00000003c0)='./file0/../file0\x00') mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') umount2(&(0x7f0000000240)='./file0/../file0\x00', 0x2) fchdir(r1) 20:01:38 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)={0x50, 0x10, 0x6e47, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x0, 0x0, [0x0, 0x0, 0x2c]}}, [@INET_DIAG_REQ_BYTECODE={0x4, 0x12}]}, 0x50}}, 0x0) 20:01:38 executing program 3: r0 = io_uring_setup(0x20003154, &(0x7f0000005400)={0x0, 0x8673, 0x18}) r1 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r1, &(0x7f00000002c0)={&(0x7f0000000000)=@abs={0x1}, 0x6e, 0x0, 0x0, &(0x7f0000000280)=[@rights={{0x18, 0x1, 0x1, [r0, r0]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x30}, 0x0) 20:01:38 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) flistxattr(r0, &(0x7f0000000200)=""/15, 0xf) 20:01:38 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) flistxattr(r0, &(0x7f0000000200)=""/15, 0xf) 20:01:38 executing program 3: unshare(0x400) r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) 20:01:38 executing program 4: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = open(&(0x7f0000000400)='./file0/../file0\x00', 0x0, 0x0) chroot(&(0x7f00000003c0)='./file0/../file0\x00') mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') umount2(&(0x7f0000000240)='./file0/../file0\x00', 0x2) fchdir(r1) 20:01:38 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)={0x50, 0x10, 0x6e47, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x0, 0x0, [0x0, 0x0, 0x2c]}}, [@INET_DIAG_REQ_BYTECODE={0x4, 0x12}]}, 0x50}}, 0x0) 20:01:38 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) flistxattr(r0, &(0x7f0000000200)=""/15, 0xf) 20:01:38 executing program 3: unshare(0x400) r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) 20:01:38 executing program 2: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='.\x00', 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x5347402bcd93a54d) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000a, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) execveat(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 20:01:39 executing program 4: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = open(&(0x7f0000000400)='./file0/../file0\x00', 0x0, 0x0) chroot(&(0x7f00000003c0)='./file0/../file0\x00') mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') umount2(&(0x7f0000000240)='./file0/../file0\x00', 0x2) fchdir(r1) 20:01:39 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) flistxattr(r0, &(0x7f0000000200)=""/15, 0xf) 20:01:39 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)={0x50, 0x10, 0x6e47, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x0, 0x0, [0x0, 0x0, 0x2c]}}, [@INET_DIAG_REQ_BYTECODE={0x4, 0x12}]}, 0x50}}, 0x0) 20:01:39 executing program 2: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='.\x00', 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x5347402bcd93a54d) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000a, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) execveat(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 20:01:39 executing program 3: unshare(0x400) r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) 20:01:39 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000001600)=""/4099, 0x1003) 20:01:39 executing program 2: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='.\x00', 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x5347402bcd93a54d) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000a, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) execveat(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 20:01:39 executing program 3: unshare(0x400) r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) 20:01:39 executing program 5: timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x4, @thr={&(0x7f0000000000), 0x0}}, 0x0) 20:01:39 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)={0x50, 0x10, 0x6e47, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x0, 0x0, [0x0, 0x0, 0x2c]}}, [@INET_DIAG_REQ_BYTECODE={0x4, 0x12}]}, 0x50}}, 0x0) 20:01:39 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000001600)=""/4099, 0x1003) 20:01:39 executing program 4: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = open(&(0x7f0000000400)='./file0/../file0\x00', 0x0, 0x0) chroot(&(0x7f00000003c0)='./file0/../file0\x00') mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') umount2(&(0x7f0000000240)='./file0/../file0\x00', 0x2) fchdir(r1) 20:01:39 executing program 2: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='.\x00', 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x5347402bcd93a54d) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000a, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) execveat(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 20:01:39 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x40) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={@mcast1, 0x0, r2}) 20:01:39 executing program 5: r0 = memfd_create(&(0x7f0000000000)='%!-}@%\x00', 0x5) fallocate(r0, 0x10, 0x0, 0x800) 20:01:39 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000001600)=""/4099, 0x1003) 20:01:39 executing program 1: unshare(0x2a000400) r0 = open(&(0x7f0000000080)='.\x00', 0x240000, 0x0) ftruncate(r0, 0x0) 20:01:39 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040), 0x81, 0x0) write$vga_arbiter(r0, 0x0, 0x37) 20:01:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000005c0)={0x18, r1, 0xb21, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 20:01:39 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000001600)=""/4099, 0x1003) 20:01:39 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040), 0x81, 0x0) write$vga_arbiter(r0, 0x0, 0x37) 20:01:39 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x40) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={@mcast1, 0x0, r2}) 20:01:39 executing program 5: r0 = memfd_create(&(0x7f0000000000)='%!-}@%\x00', 0x5) fallocate(r0, 0x10, 0x0, 0x800) 20:01:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000005c0)={0x18, r1, 0xb21, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 20:01:39 executing program 1: unshare(0x2a000400) r0 = open(&(0x7f0000000080)='.\x00', 0x240000, 0x0) ftruncate(r0, 0x0) 20:01:39 executing program 0: unshare(0x2a000400) r0 = open(&(0x7f0000000080)='.\x00', 0x240000, 0x0) ftruncate(r0, 0x0) 20:01:39 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040), 0x81, 0x0) write$vga_arbiter(r0, 0x0, 0x37) 20:01:39 executing program 5: r0 = memfd_create(&(0x7f0000000000)='%!-}@%\x00', 0x5) fallocate(r0, 0x10, 0x0, 0x800) 20:01:39 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x40) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={@mcast1, 0x0, r2}) 20:01:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000005c0)={0x18, r1, 0xb21, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 20:01:39 executing program 1: unshare(0x2a000400) r0 = open(&(0x7f0000000080)='.\x00', 0x240000, 0x0) ftruncate(r0, 0x0) 20:01:39 executing program 0: unshare(0x2a000400) r0 = open(&(0x7f0000000080)='.\x00', 0x240000, 0x0) ftruncate(r0, 0x0) 20:01:39 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x40) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={@mcast1, 0x0, r2}) 20:01:39 executing program 5: r0 = memfd_create(&(0x7f0000000000)='%!-}@%\x00', 0x5) fallocate(r0, 0x10, 0x0, 0x800) 20:01:39 executing program 1: unshare(0x2a000400) r0 = open(&(0x7f0000000080)='.\x00', 0x240000, 0x0) ftruncate(r0, 0x0) 20:01:39 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040), 0x81, 0x0) write$vga_arbiter(r0, 0x0, 0x37) 20:01:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000005c0)={0x18, r1, 0xb21, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 20:01:39 executing program 0: unshare(0x2a000400) r0 = open(&(0x7f0000000080)='.\x00', 0x240000, 0x0) ftruncate(r0, 0x0) 20:01:39 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x0) ioctl$LOOP_SET_STATUS(r0, 0xc0481273, &(0x7f0000000000)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "a9f609f66428ce213c1836f5f40d2db6cd96d4ee36822925a3e6d1f66c4ab89655d7b543d84ba5f798ac2d7c2bb4637a269782531c519b8cc813f118d2b78759", "3b427fb91049fe9826a63e9b87da3b476613608ae67d578a8312695752372362"}) 20:01:39 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000), &(0x7f0000000040)) r2 = io_uring_setup(0x7680, &(0x7f0000000180)) dup2(r1, r2) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) 20:01:40 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x3c, &(0x7f0000000200)="98a2cd9e00550f47e89aea8bff07000000000000b50cec00000000000000a77694bd9d4530fea39ab76346a4ac51238f17ddb47dc33681f447587733"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:01:40 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/udplite\x00') mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x8000000) syz_io_uring_setup(0x7a0e, &(0x7f00000039c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000002540), &(0x7f0000003a40)) 20:01:40 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x101}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setattr(0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) ppoll(&(0x7f0000000100)=[{r1}, {}], 0x2, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000001680)=[{&(0x7f0000000240)="19", 0x1}], 0x1, 0x0) 20:01:40 executing program 0: clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', 0x0, &(0x7f0000000140)="d003b274efa86d2cf14284adf4ea73ed1540ea42a7a101f7ff40f83752f75ead08591113ef47334485666e08fc306a7a71c27041197a7ca8a0ff0162cdb0b1a6de214ee46a96d1d9c438d3e50fbf642d1009953469f59f0e12c4d04c5f57c1f7960800000000000000a1328564036250323560feb5983f6e12d5ff07e8b1c84ff41c84f0b56182d2f9e62d88792323c02600", 0x92, 0xfffffffffffffffb) 20:01:40 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x0) ioctl$LOOP_SET_STATUS(r0, 0xc0481273, &(0x7f0000000000)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "a9f609f66428ce213c1836f5f40d2db6cd96d4ee36822925a3e6d1f66c4ab89655d7b543d84ba5f798ac2d7c2bb4637a269782531c519b8cc813f118d2b78759", "3b427fb91049fe9826a63e9b87da3b476613608ae67d578a8312695752372362"}) 20:01:40 executing program 0: clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', 0x0, &(0x7f0000000140)="d003b274efa86d2cf14284adf4ea73ed1540ea42a7a101f7ff40f83752f75ead08591113ef47334485666e08fc306a7a71c27041197a7ca8a0ff0162cdb0b1a6de214ee46a96d1d9c438d3e50fbf642d1009953469f59f0e12c4d04c5f57c1f7960800000000000000a1328564036250323560feb5983f6e12d5ff07e8b1c84ff41c84f0b56182d2f9e62d88792323c02600", 0x92, 0xfffffffffffffffb) 20:01:40 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000001c0)=0xffffffffffffffff) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x2) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x3ec0) [ 376.755514][T18962] Invalid option length (0) for dns_resolver key 20:01:40 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x0) ioctl$LOOP_SET_STATUS(r0, 0xc0481273, &(0x7f0000000000)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "a9f609f66428ce213c1836f5f40d2db6cd96d4ee36822925a3e6d1f66c4ab89655d7b543d84ba5f798ac2d7c2bb4637a269782531c519b8cc813f118d2b78759", "3b427fb91049fe9826a63e9b87da3b476613608ae67d578a8312695752372362"}) 20:01:40 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000), &(0x7f0000000040)) r2 = io_uring_setup(0x7680, &(0x7f0000000180)) dup2(r1, r2) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) 20:01:40 executing program 0: clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', 0x0, &(0x7f0000000140)="d003b274efa86d2cf14284adf4ea73ed1540ea42a7a101f7ff40f83752f75ead08591113ef47334485666e08fc306a7a71c27041197a7ca8a0ff0162cdb0b1a6de214ee46a96d1d9c438d3e50fbf642d1009953469f59f0e12c4d04c5f57c1f7960800000000000000a1328564036250323560feb5983f6e12d5ff07e8b1c84ff41c84f0b56182d2f9e62d88792323c02600", 0x92, 0xfffffffffffffffb) [ 376.823662][T18976] Invalid option length (0) for dns_resolver key 20:01:40 executing program 0: clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', 0x0, &(0x7f0000000140)="d003b274efa86d2cf14284adf4ea73ed1540ea42a7a101f7ff40f83752f75ead08591113ef47334485666e08fc306a7a71c27041197a7ca8a0ff0162cdb0b1a6de214ee46a96d1d9c438d3e50fbf642d1009953469f59f0e12c4d04c5f57c1f7960800000000000000a1328564036250323560feb5983f6e12d5ff07e8b1c84ff41c84f0b56182d2f9e62d88792323c02600", 0x92, 0xfffffffffffffffb) [ 376.864225][T18984] Invalid option length (0) for dns_resolver key 20:01:40 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000), &(0x7f0000000040)) r2 = io_uring_setup(0x7680, &(0x7f0000000180)) dup2(r1, r2) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) [ 376.904773][T18992] Invalid option length (0) for dns_resolver key 20:01:43 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x0) ioctl$LOOP_SET_STATUS(r0, 0xc0481273, &(0x7f0000000000)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "a9f609f66428ce213c1836f5f40d2db6cd96d4ee36822925a3e6d1f66c4ab89655d7b543d84ba5f798ac2d7c2bb4637a269782531c519b8cc813f118d2b78759", "3b427fb91049fe9826a63e9b87da3b476613608ae67d578a8312695752372362"}) 20:01:43 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x3c, &(0x7f0000000200)="98a2cd9e00550f47e89aea8bff07000000000000b50cec00000000000000a77694bd9d4530fea39ab76346a4ac51238f17ddb47dc33681f447587733"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:01:43 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000001c0)=0xffffffffffffffff) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x2) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x3ec0) 20:01:43 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in=@empty, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0xa, 0xe0}}}, 0xb8}}, 0x0) 20:01:43 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000), &(0x7f0000000040)) r2 = io_uring_setup(0x7680, &(0x7f0000000180)) dup2(r1, r2) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) 20:01:43 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x101}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setattr(0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) ppoll(&(0x7f0000000100)=[{r1}, {}], 0x2, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000001680)=[{&(0x7f0000000240)="19", 0x1}], 0x1, 0x0) 20:01:43 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x101}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setattr(0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) ppoll(&(0x7f0000000100)=[{r1}, {}], 0x2, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000001680)=[{&(0x7f0000000240)="19", 0x1}], 0x1, 0x0) 20:01:43 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000001c0)=0xffffffffffffffff) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x2) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x3ec0) 20:01:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) open$dir(&(0x7f0000000340)='./file0/bus\x00', 0xc840, 0x0) acct(&(0x7f0000000000)='./file0/bus\x00') clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7efbb, 0x0) [ 379.755289][T19011] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.0'. 20:01:43 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in=@empty, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0xa, 0xe0}}}, 0xb8}}, 0x0) 20:01:43 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000001c0)=0xffffffffffffffff) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x2) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x3ec0) 20:01:43 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000000c0)={{0xe, 0x9b, 0x8, 0x7, 0x0, 0x34, 0x0, 0x0, 0x460, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x40) 20:01:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) open$dir(&(0x7f0000000340)='./file0/bus\x00', 0xc840, 0x0) acct(&(0x7f0000000000)='./file0/bus\x00') clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7efbb, 0x0) 20:01:43 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in=@empty, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0xa, 0xe0}}}, 0xb8}}, 0x0) [ 379.855411][T19028] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.0'. [ 379.865717][T19027] Process accounting resumed [ 379.876005][T19033] Process accounting resumed [ 379.912840][T19040] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.0'. [ 379.948934][T19043] Process accounting resumed 20:01:46 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x3c, &(0x7f0000000200)="98a2cd9e00550f47e89aea8bff07000000000000b50cec00000000000000a77694bd9d4530fea39ab76346a4ac51238f17ddb47dc33681f447587733"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:01:46 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in=@empty, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0xa, 0xe0}}}, 0xb8}}, 0x0) 20:01:46 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000000c0)={{0xe, 0x9b, 0x8, 0x7, 0x0, 0x34, 0x0, 0x0, 0x460, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x40) 20:01:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) open$dir(&(0x7f0000000340)='./file0/bus\x00', 0xc840, 0x0) acct(&(0x7f0000000000)='./file0/bus\x00') clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7efbb, 0x0) 20:01:46 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x101}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setattr(0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) ppoll(&(0x7f0000000100)=[{r1}, {}], 0x2, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000001680)=[{&(0x7f0000000240)="19", 0x1}], 0x1, 0x0) 20:01:46 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x101}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setattr(0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) ppoll(&(0x7f0000000100)=[{r1}, {}], 0x2, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000001680)=[{&(0x7f0000000240)="19", 0x1}], 0x1, 0x0) 20:01:46 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000000c0)={{0xe, 0x9b, 0x8, 0x7, 0x0, 0x34, 0x0, 0x0, 0x460, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x40) 20:01:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) open$dir(&(0x7f0000000340)='./file0/bus\x00', 0xc840, 0x0) acct(&(0x7f0000000000)='./file0/bus\x00') clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7efbb, 0x0) [ 382.816195][T19057] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.0'. [ 382.831242][T19059] Process accounting resumed 20:01:46 executing program 4: mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000140), 0x14, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f00000001c0)={{}, {}, [], {}, [{0x8, 0x0, 0xffffffffffffffff}]}, 0x2c, 0x0) 20:01:46 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@newsa={0x158, 0x10, 0x713, 0x0, 0x0, {{@in6=@ipv4={'\x00', '\xff\xff', @broadcast}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {@in6=@local, 0x0, 0x32}, @in6=@mcast2, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x68, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0xe0, 0x60, "291caaf71201268b248b54d57df6145eb36cb29b2ce34074a09088fa"}}]}, 0x158}}, 0x0) [ 382.862372][T19067] Process accounting resumed 20:01:46 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000000c0)={{0xe, 0x9b, 0x8, 0x7, 0x0, 0x34, 0x0, 0x0, 0x460, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x40) 20:01:46 executing program 4: mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000140), 0x14, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f00000001c0)={{}, {}, [], {}, [{0x8, 0x0, 0xffffffffffffffff}]}, 0x2c, 0x0) 20:01:49 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x3c, &(0x7f0000000200)="98a2cd9e00550f47e89aea8bff07000000000000b50cec00000000000000a77694bd9d4530fea39ab76346a4ac51238f17ddb47dc33681f447587733"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:01:49 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@newsa={0x158, 0x10, 0x713, 0x0, 0x0, {{@in6=@ipv4={'\x00', '\xff\xff', @broadcast}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {@in6=@local, 0x0, 0x32}, @in6=@mcast2, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x68, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0xe0, 0x60, "291caaf71201268b248b54d57df6145eb36cb29b2ce34074a09088fa"}}]}, 0x158}}, 0x0) 20:01:49 executing program 2: mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000140), 0x14, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f00000001c0)={{}, {}, [], {}, [{0x8, 0x0, 0xffffffffffffffff}]}, 0x2c, 0x0) 20:01:49 executing program 4: mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000140), 0x14, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f00000001c0)={{}, {}, [], {}, [{0x8, 0x0, 0xffffffffffffffff}]}, 0x2c, 0x0) 20:01:49 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x101}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setattr(0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) ppoll(&(0x7f0000000100)=[{r1}, {}], 0x2, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000001680)=[{&(0x7f0000000240)="19", 0x1}], 0x1, 0x0) 20:01:49 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x101}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setattr(0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) ppoll(&(0x7f0000000100)=[{r1}, {}], 0x2, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000001680)=[{&(0x7f0000000240)="19", 0x1}], 0x1, 0x0) 20:01:49 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@newsa={0x158, 0x10, 0x713, 0x0, 0x0, {{@in6=@ipv4={'\x00', '\xff\xff', @broadcast}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {@in6=@local, 0x0, 0x32}, @in6=@mcast2, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x68, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0xe0, 0x60, "291caaf71201268b248b54d57df6145eb36cb29b2ce34074a09088fa"}}]}, 0x158}}, 0x0) 20:01:49 executing program 4: mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000140), 0x14, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f00000001c0)={{}, {}, [], {}, [{0x8, 0x0, 0xffffffffffffffff}]}, 0x2c, 0x0) 20:01:49 executing program 2: mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000140), 0x14, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f00000001c0)={{}, {}, [], {}, [{0x8, 0x0, 0xffffffffffffffff}]}, 0x2c, 0x0) 20:01:49 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@newsa={0x158, 0x10, 0x713, 0x0, 0x0, {{@in6=@ipv4={'\x00', '\xff\xff', @broadcast}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {@in6=@local, 0x0, 0x32}, @in6=@mcast2, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x68, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0xe0, 0x60, "291caaf71201268b248b54d57df6145eb36cb29b2ce34074a09088fa"}}]}, 0x158}}, 0x0) 20:01:49 executing program 2: mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000140), 0x14, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f00000001c0)={{}, {}, [], {}, [{0x8, 0x0, 0xffffffffffffffff}]}, 0x2c, 0x0) 20:01:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db000800000000000023c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b5877341e0", 0x6b}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 20:01:52 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000100)={[{@mpol={'mpol', 0x3d, {'default', '=static', @val={0x3a, [0x35]}}}, 0x22}]}) 20:01:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db000800000000000023c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b5877341e0", 0x6b}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 20:01:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0x0, r2) setfsgid(r2) 20:01:52 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 20:01:52 executing program 1: alarm(0x1) alarm(0x0) 20:01:52 executing program 3: r0 = epoll_create(0x8) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) epoll_wait(r0, &(0x7f0000000100)=[{}], 0x1, 0x6edfaccc) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) 20:01:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0x0, r2) setfsgid(r2) 20:01:52 executing program 1: alarm(0x1) alarm(0x0) 20:01:52 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="37ea777cd0c621ab844b3e"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000323c0)=""/102397, 0x18ffd}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) [ 388.939115][T19142] PM: suspend entry (deep) [ 388.950422][T19145] tmpfs: Bad value for 'mpol' [ 388.966230][T19142] Filesystems sync: 0.022 seconds [ 388.998463][T19142] Freezing user space processes ... [ 409.174875][T19142] Freezing of tasks failed after 20.010 seconds (1 tasks refusing to freeze, wq_busy=0): [ 409.184831][T19142] task:syz-executor.2 state:D stack:14048 pid: 7870 ppid: 1789 flags:0x00004004 [ 409.194025][T19142] Call Trace: [ 409.197296][T19142] __schedule+0x41f/0x5b0 [ 409.201620][T19142] ? prepare_to_wait_event+0x13f/0x190 [ 409.207216][T19142] schedule+0x67/0x90 [ 409.211181][T19142] p9_client_rpc+0x254/0x630 [ 409.215761][T19142] ? _raw_spin_unlock_irqrestore+0x27/0x40 [ 409.221559][T19142] ? init_wait_entry+0x30/0x30 [ 409.226358][T19142] ? signalfd_read+0x600/0x600 [ 409.231105][T19142] p9_client_version+0x8e/0x300 [ 409.235955][T19142] ? p9_fd_create+0x1d1/0x1e0 [ 409.240746][T19142] p9_client_create+0x601/0x6f0 [ 409.245572][T19142] ? __kmalloc_track_caller+0x23b/0x340 [ 409.251146][T19142] v9fs_session_init+0x100/0xcf0 [ 409.256177][T19142] ? kmem_cache_alloc_trace+0x215/0x310 [ 409.261722][T19142] ? v9fs_mount+0x41/0x4c0 [ 409.266165][T19142] v9fs_mount+0x57/0x4c0 [ 409.270414][T19142] ? selinux_capable+0x34/0x40 [ 409.275172][T19142] ? tsan.module_ctor+0x10/0x10 [ 409.280014][T19142] legacy_get_tree+0x70/0xc0 [ 409.284635][T19142] vfs_get_tree+0x4a/0x1a0 [ 409.289039][T19142] path_mount+0x11d4/0x1ce0 [ 409.293526][T19142] __se_sys_mount+0x23d/0x2e0 [ 409.298218][T19142] ? __fpregs_load_activate+0x103/0x1b0 [ 409.303739][T19142] __x64_sys_mount+0x63/0x70 [ 409.308345][T19142] do_syscall_64+0x4a/0x90 [ 409.312746][T19142] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 409.318641][T19142] RIP: 0033:0x4665d9 [ 409.322511][T19142] RSP: 002b:00007f4976524188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 409.330915][T19142] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 409.338965][T19142] RDX: 0000000020000200 RSI: 00000000200001c0 RDI: 0000000000000000 [ 409.346948][T19142] RBP: 00000000004bfcb9 R08: 0000000020000240 R09: 0000000000000000 [ 409.354938][T19142] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 20:02:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db000800000000000023c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b5877341e0", 0x6b}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 20:02:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x29, 0x15, 0x0, 0x0) 20:02:12 executing program 1: alarm(0x1) alarm(0x0) 20:02:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0x0, r2) setfsgid(r2) 20:02:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x29, 0x15, 0x0, 0x0) [ 409.362962][T19142] R13: 00007ffc5b5241ef R14: 00007f4976524300 R15: 0000000000022000 [ 409.371073][T19142] [ 409.373375][T19142] OOM killer enabled. [ 409.377327][T19142] Restarting tasks ... done. 20:02:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db000800000000000023c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b5877341e0", 0x6b}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 409.436848][T19142] PM: suspend exit 20:02:12 executing program 5: perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}, 0x0, 0xffffffff00000001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 20:02:12 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f00000007c0)='\r', 0x1}], 0x207009, &(0x7f0000002840)={[{@journal_checksum}, {@dax}, {@data_ordered}, {@resuid={'resuid', 0x3d, 0xffffffffffffffff}}], [{@euid_gt={'euid>', 0xee01}}, {@obj_type={'obj_type', 0x3d, 'journal_checksum'}}, {@seclabel}]}) 20:02:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0x0, r2) setfsgid(r2) 20:02:12 executing program 1: alarm(0x1) alarm(0x0) 20:02:12 executing program 4: futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000)=0x80, 0x0) 20:02:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x29, 0x15, 0x0, 0x0) 20:02:12 executing program 2: r0 = memfd_create(&(0x7f0000000180)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3', 0x0) r1 = dup(r0) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) open_tree(r1, &(0x7f0000000140)='./file0\x00', 0x1001) 20:02:12 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000240)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x2000000000000600}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='umask=0']) 20:02:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x29, 0x15, 0x0, 0x0) 20:02:12 executing program 2: r0 = memfd_create(&(0x7f0000000180)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3', 0x0) r1 = dup(r0) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) open_tree(r1, &(0x7f0000000140)='./file0\x00', 0x1001) 20:02:12 executing program 5: perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}, 0x0, 0xffffffff00000001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 20:02:12 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f00000007c0)='\r', 0x1}], 0x207009, &(0x7f0000002840)={[{@journal_checksum}, {@dax}, {@data_ordered}, {@resuid={'resuid', 0x3d, 0xffffffffffffffff}}], [{@euid_gt={'euid>', 0xee01}}, {@obj_type={'obj_type', 0x3d, 'journal_checksum'}}, {@seclabel}]}) 20:02:12 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_adj\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000140)='1', 0x1}], 0x1) [ 409.563089][T19190] loop1: detected capacity change from 0 to 264192 20:02:12 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000240)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x2000000000000600}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='umask=0']) 20:02:12 executing program 2: r0 = memfd_create(&(0x7f0000000180)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3', 0x0) r1 = dup(r0) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) open_tree(r1, &(0x7f0000000140)='./file0\x00', 0x1001) 20:02:12 executing program 5: perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}, 0x0, 0xffffffff00000001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 409.691580][T19210] loop1: detected capacity change from 0 to 264192 20:02:13 executing program 4: futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000)=0x80, 0x0) 20:02:13 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_adj\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000140)='1', 0x1}], 0x1) 20:02:13 executing program 5: perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}, 0x0, 0xffffffff00000001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 20:02:13 executing program 2: r0 = memfd_create(&(0x7f0000000180)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3', 0x0) r1 = dup(r0) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) open_tree(r1, &(0x7f0000000140)='./file0\x00', 0x1001) 20:02:13 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f00000007c0)='\r', 0x1}], 0x207009, &(0x7f0000002840)={[{@journal_checksum}, {@dax}, {@data_ordered}, {@resuid={'resuid', 0x3d, 0xffffffffffffffff}}], [{@euid_gt={'euid>', 0xee01}}, {@obj_type={'obj_type', 0x3d, 'journal_checksum'}}, {@seclabel}]}) 20:02:13 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000240)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x2000000000000600}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='umask=0']) 20:02:13 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_adj\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000140)='1', 0x1}], 0x1) 20:02:13 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x81ff, 0x0) r2 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x11) fcntl$setlease(r2, 0x400, 0x1) creat(&(0x7f0000000140)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) close(r2) 20:02:13 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_adj\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000140)='1', 0x1}], 0x1) 20:02:13 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2000, 0x1) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 20:02:13 executing program 1: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000240)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x2000000000000600}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='umask=0']) 20:02:13 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(r1, 0x801c581f, 0x0) [ 410.455558][T19223] loop1: detected capacity change from 0 to 264192 20:02:14 executing program 4: futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000)=0x80, 0x0) 20:02:14 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2000, 0x1) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 20:02:14 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f00000007c0)='\r', 0x1}], 0x207009, &(0x7f0000002840)={[{@journal_checksum}, {@dax}, {@data_ordered}, {@resuid={'resuid', 0x3d, 0xffffffffffffffff}}], [{@euid_gt={'euid>', 0xee01}}, {@obj_type={'obj_type', 0x3d, 'journal_checksum'}}, {@seclabel}]}) 20:02:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(r1, 0x801c581f, 0x0) 20:02:14 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) connect(r0, &(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80) 20:02:14 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2000, 0x1) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 20:02:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(r1, 0x801c581f, 0x0) 20:02:14 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x81ff, 0x0) r2 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x11) fcntl$setlease(r2, 0x400, 0x1) creat(&(0x7f0000000140)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) close(r2) 20:02:14 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) connect(r0, &(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80) 20:02:14 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x81ff, 0x0) r2 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x11) fcntl$setlease(r2, 0x400, 0x1) creat(&(0x7f0000000140)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) close(r2) 20:02:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(r1, 0x801c581f, 0x0) 20:02:14 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) connect(r0, &(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80) 20:02:15 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2000, 0x1) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 20:02:15 executing program 4: futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000)=0x80, 0x0) 20:02:15 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) connect(r0, &(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80) 20:02:15 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x81ff, 0x0) r2 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x11) fcntl$setlease(r2, 0x400, 0x1) creat(&(0x7f0000000140)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) close(r2) 20:02:15 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x81ff, 0x0) r2 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x11) fcntl$setlease(r2, 0x400, 0x1) creat(&(0x7f0000000140)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) close(r2) 20:02:15 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x3f4, 0x0, 0x0, 0x0, {0x10, 0x3e8}}, 0x420}}, 0x0) 20:02:15 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x3f4, 0x0, 0x0, 0x0, {0x10, 0x3e8}}, 0x420}}, 0x0) 20:02:15 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x81ff, 0x0) r2 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x11) fcntl$setlease(r2, 0x400, 0x1) creat(&(0x7f0000000140)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) close(r2) 20:02:15 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x3f4, 0x0, 0x0, 0x0, {0x10, 0x3e8}}, 0x420}}, 0x0) 20:02:15 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x81ff, 0x0) r2 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x11) fcntl$setlease(r2, 0x400, 0x1) creat(&(0x7f0000000140)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) close(r2) 20:02:15 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x3f4, 0x0, 0x0, 0x0, {0x10, 0x3e8}}, 0x420}}, 0x0) 20:02:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) r2 = syz_io_uring_setup(0x2882, &(0x7f0000000100), &(0x7f0000eec000/0x2000)=nil, &(0x7f00006ec000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000180)) dup2(r2, r1) 20:02:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) r2 = syz_io_uring_setup(0x2882, &(0x7f0000000100), &(0x7f0000eec000/0x2000)=nil, &(0x7f00006ec000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000180)) dup2(r2, r1) 20:02:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) r2 = syz_io_uring_setup(0x2882, &(0x7f0000000100), &(0x7f0000eec000/0x2000)=nil, &(0x7f00006ec000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000180)) dup2(r2, r1) 20:02:16 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x81ff, 0x0) r2 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x11) fcntl$setlease(r2, 0x400, 0x1) creat(&(0x7f0000000140)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) close(r2) 20:02:16 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) poll(&(0x7f0000000040)=[{r2}, {r3}], 0x2, 0xff) dup2(r1, r3) write$binfmt_misc(r3, &(0x7f00000000c0)={'syz1'}, 0x4) 20:02:16 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x81ff, 0x0) r2 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x11) fcntl$setlease(r2, 0x400, 0x1) creat(&(0x7f0000000140)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) close(r2) 20:02:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) r2 = syz_io_uring_setup(0x2882, &(0x7f0000000100), &(0x7f0000eec000/0x2000)=nil, &(0x7f00006ec000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000180)) dup2(r2, r1) 20:02:16 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='ro']) 20:02:16 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x81ff, 0x0) r2 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x11) fcntl$setlease(r2, 0x400, 0x1) creat(&(0x7f0000000140)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) close(r2) 20:02:16 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='ro']) 20:02:16 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x81ff, 0x0) r2 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x11) fcntl$setlease(r2, 0x400, 0x1) creat(&(0x7f0000000140)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) close(r2) 20:02:16 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='ro']) 20:02:16 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='ro']) 20:02:16 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x43, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2000050, 0x0) r0 = creat(&(0x7f0000000100)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r0, 0x7, &(0x7f00000003c0)={0x1, 0x0, 0x0, 0x0, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pwritev(r0, &(0x7f00000001c0)=[{&(0x7f0000000300)='Y', 0x1}], 0x1, 0x0, 0x0) 20:02:16 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x43, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2000050, 0x0) r0 = creat(&(0x7f0000000100)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r0, 0x7, &(0x7f00000003c0)={0x1, 0x0, 0x0, 0x0, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pwritev(r0, &(0x7f00000001c0)=[{&(0x7f0000000300)='Y', 0x1}], 0x1, 0x0, 0x0) 20:02:16 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x81ff, 0x0) r2 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x11) fcntl$setlease(r2, 0x400, 0x1) creat(&(0x7f0000000140)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) close(r2) 20:02:16 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x43, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2000050, 0x0) r0 = creat(&(0x7f0000000100)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r0, 0x7, &(0x7f00000003c0)={0x1, 0x0, 0x0, 0x0, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pwritev(r0, &(0x7f00000001c0)=[{&(0x7f0000000300)='Y', 0x1}], 0x1, 0x0, 0x0) 20:02:16 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x81ff, 0x0) r2 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x11) fcntl$setlease(r2, 0x400, 0x1) creat(&(0x7f0000000140)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) close(r2) 20:02:16 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) poll(&(0x7f0000000040)=[{r2}, {r3}], 0x2, 0xff) dup2(r1, r3) write$binfmt_misc(r3, &(0x7f00000000c0)={'syz1'}, 0x4) 20:02:16 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x43, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2000050, 0x0) r0 = creat(&(0x7f0000000100)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r0, 0x7, &(0x7f00000003c0)={0x1, 0x0, 0x0, 0x0, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pwritev(r0, &(0x7f00000001c0)=[{&(0x7f0000000300)='Y', 0x1}], 0x1, 0x0, 0x0) 20:02:17 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) poll(&(0x7f0000000040)=[{r2}, {r3}], 0x2, 0xff) dup2(r1, r3) write$binfmt_misc(r3, &(0x7f00000000c0)={'syz1'}, 0x4) 20:02:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) poll(&(0x7f0000000040)=[{r2}, {r3}], 0x2, 0xff) dup2(r1, r3) write$binfmt_misc(r3, &(0x7f00000000c0)={'syz1'}, 0x4) 20:02:17 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x43, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2000050, 0x0) r0 = creat(&(0x7f0000000100)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r0, 0x7, &(0x7f00000003c0)={0x1, 0x0, 0x0, 0x0, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pwritev(r0, &(0x7f00000001c0)=[{&(0x7f0000000300)='Y', 0x1}], 0x1, 0x0, 0x0) 20:02:17 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x43, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2000050, 0x0) r0 = creat(&(0x7f0000000100)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r0, 0x7, &(0x7f00000003c0)={0x1, 0x0, 0x0, 0x0, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pwritev(r0, &(0x7f00000001c0)=[{&(0x7f0000000300)='Y', 0x1}], 0x1, 0x0, 0x0) 20:02:17 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x43, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2000050, 0x0) r0 = creat(&(0x7f0000000100)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r0, 0x7, &(0x7f00000003c0)={0x1, 0x0, 0x0, 0x0, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pwritev(r0, &(0x7f00000001c0)=[{&(0x7f0000000300)='Y', 0x1}], 0x1, 0x0, 0x0) 20:02:17 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="66530700ae897094e7b126b08deaa769de6d28c41bd34e677d114b655ef5f0166391c68f72e44e260f82e8a905c92b1055f69a370925992be2f9cfc2", 0x3c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x2) 20:02:17 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="66530700ae897094e7b126b08deaa769de6d28c41bd34e677d114b655ef5f0166391c68f72e44e260f82e8a905c92b1055f69a370925992be2f9cfc2", 0x3c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x2) 20:02:17 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) poll(&(0x7f0000000040)=[{r2}, {r3}], 0x2, 0xff) dup2(r1, r3) write$binfmt_misc(r3, &(0x7f00000000c0)={'syz1'}, 0x4) 20:02:17 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="66530700ae897094e7b126b08deaa769de6d28c41bd34e677d114b655ef5f0166391c68f72e44e260f82e8a905c92b1055f69a370925992be2f9cfc2", 0x3c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x2) 20:02:17 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getdents64(r0, &(0x7f0000000300)=""/89, 0x7757) getdents(r0, 0x0, 0x0) 20:02:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) poll(&(0x7f0000000040)=[{r2}, {r3}], 0x2, 0xff) dup2(r1, r3) write$binfmt_misc(r3, &(0x7f00000000c0)={'syz1'}, 0x4) 20:02:17 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) poll(&(0x7f0000000040)=[{r2}, {r3}], 0x2, 0xff) dup2(r1, r3) write$binfmt_misc(r3, &(0x7f00000000c0)={'syz1'}, 0x4) 20:02:17 executing program 2: r0 = epoll_create1(0x0) r1 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000040)={0x6}) epoll_wait(r0, &(0x7f0000000000)=[{}], 0x1, 0x0) 20:02:17 executing program 2: r0 = epoll_create1(0x0) r1 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000040)={0x6}) epoll_wait(r0, &(0x7f0000000000)=[{}], 0x1, 0x0) 20:02:17 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getdents64(r0, &(0x7f0000000300)=""/89, 0x7757) getdents(r0, 0x0, 0x0) 20:02:17 executing program 2: r0 = epoll_create1(0x0) r1 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000040)={0x6}) epoll_wait(r0, &(0x7f0000000000)=[{}], 0x1, 0x0) 20:02:17 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getdents64(r0, &(0x7f0000000300)=""/89, 0x7757) getdents(r0, 0x0, 0x0) 20:02:17 executing program 2: r0 = epoll_create1(0x0) r1 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000040)={0x6}) epoll_wait(r0, &(0x7f0000000000)=[{}], 0x1, 0x0) 20:02:17 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getdents64(r0, &(0x7f0000000300)=""/89, 0x7757) getdents(r0, 0x0, 0x0) 20:02:18 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getdents64(r0, &(0x7f0000000300)=""/89, 0x7757) getdents(r0, 0x0, 0x0) 20:02:20 executing program 0: r0 = epoll_create1(0x0) r1 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000040)={0x6}) epoll_wait(r0, &(0x7f0000000000)=[{}], 0x1, 0x0) 20:02:20 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) poll(&(0x7f0000000040)=[{r2}, {r3}], 0x2, 0xff) dup2(r1, r3) write$binfmt_misc(r3, &(0x7f00000000c0)={'syz1'}, 0x4) 20:02:20 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getdents64(r0, &(0x7f0000000300)=""/89, 0x7757) getdents(r0, 0x0, 0x0) 20:02:20 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) poll(&(0x7f0000000040)=[{r2}, {r3}], 0x2, 0xff) dup2(r1, r3) write$binfmt_misc(r3, &(0x7f00000000c0)={'syz1'}, 0x4) 20:02:20 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) poll(&(0x7f0000000040)=[{r2}, {r3}], 0x2, 0xff) dup2(r1, r3) write$binfmt_misc(r3, &(0x7f00000000c0)={'syz1'}, 0x4) 20:02:20 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="66530700ae897094e7b126b08deaa769de6d28c41bd34e677d114b655ef5f0166391c68f72e44e260f82e8a905c92b1055f69a370925992be2f9cfc2", 0x3c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x2) 20:02:20 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getdents64(r0, &(0x7f0000000300)=""/89, 0x7757) getdents(r0, 0x0, 0x0) 20:02:20 executing program 0: r0 = epoll_create1(0x0) r1 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000040)={0x6}) epoll_wait(r0, &(0x7f0000000000)=[{}], 0x1, 0x0) 20:02:20 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x2, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000000)) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x96a4549) splice(r0, 0x0, r2, 0x0, 0x4ffd9, 0x0) 20:02:20 executing program 0: r0 = epoll_create1(0x0) r1 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000040)={0x6}) epoll_wait(r0, &(0x7f0000000000)=[{}], 0x1, 0x0) 20:02:20 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@shmem={0xc}, 0x0) 20:02:20 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@shmem={0xc}, 0x0) 20:02:23 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0xe, 0x0, 0x0) 20:02:23 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@shmem={0xc}, 0x0) 20:02:23 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200), 0xa41, 0x0) write$vga_arbiter(r0, &(0x7f0000000040)=@target={'target ', {'PCI:', '1e', ':', '6', ':', '15', '.', '2'}}, 0x8) 20:02:23 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffffff, &(0x7f00000014c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000e, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x63, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 20:02:23 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/sync_on_suspend', 0xc0202, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x12) 20:02:23 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x2, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000000)) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x96a4549) splice(r0, 0x0, r2, 0x0, 0x4ffd9, 0x0) 20:02:23 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200), 0xa41, 0x0) write$vga_arbiter(r0, &(0x7f0000000040)=@target={'target ', {'PCI:', '1e', ':', '6', ':', '15', '.', '2'}}, 0x8) 20:02:23 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/sync_on_suspend', 0xc0202, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x12) 20:02:23 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@shmem={0xc}, 0x0) 20:02:23 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffffff, &(0x7f00000014c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000e, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x63, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 20:02:23 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200), 0xa41, 0x0) write$vga_arbiter(r0, &(0x7f0000000040)=@target={'target ', {'PCI:', '1e', ':', '6', ':', '15', '.', '2'}}, 0x8) 20:02:23 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0xe, 0x0, 0x0) 20:02:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp6\x00') lseek(r1, 0xa3, 0x0) 20:02:23 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/sync_on_suspend', 0xc0202, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x12) 20:02:23 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200), 0xa41, 0x0) write$vga_arbiter(r0, &(0x7f0000000040)=@target={'target ', {'PCI:', '1e', ':', '6', ':', '15', '.', '2'}}, 0x8) 20:02:23 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffffff, &(0x7f00000014c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000e, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x63, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 20:02:23 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0xe, 0x0, 0x0) 20:02:24 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x2, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000000)) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x96a4549) splice(r0, 0x0, r2, 0x0, 0x4ffd9, 0x0) 20:02:24 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fcntl$notify(r0, 0x402, 0x0) 20:02:24 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp6\x00') lseek(r1, 0xa3, 0x0) 20:02:24 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/sync_on_suspend', 0xc0202, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x12) 20:02:24 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffffff, &(0x7f00000014c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000e, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x63, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 20:02:24 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0xe, 0x0, 0x0) 20:02:24 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x42) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) ioctl$EVIOCGRAB(r0, 0x80004518, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) 20:02:24 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fcntl$notify(r0, 0x402, 0x0) 20:02:24 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x0, 0x1, 0x3}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@mcast1, 0x0, 0x1}, 0x20) 20:02:24 executing program 3: unshare(0x22060400) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000001080)) 20:02:24 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp6\x00') lseek(r1, 0xa3, 0x0) 20:02:24 executing program 3: unshare(0x22060400) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000001080)) 20:02:25 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x2, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000000)) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x96a4549) splice(r0, 0x0, r2, 0x0, 0x4ffd9, 0x0) 20:02:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fcntl$notify(r0, 0x402, 0x0) 20:02:25 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x0, 0x1, 0x3}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@mcast1, 0x0, 0x1}, 0x20) 20:02:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp6\x00') lseek(r1, 0xa3, 0x0) 20:02:25 executing program 3: unshare(0x22060400) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000001080)) 20:02:25 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x42) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) ioctl$EVIOCGRAB(r0, 0x80004518, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) 20:02:25 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x0, 0x1, 0x3}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@mcast1, 0x0, 0x1}, 0x20) 20:02:25 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x42) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) ioctl$EVIOCGRAB(r0, 0x80004518, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) 20:02:25 executing program 3: unshare(0x22060400) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000001080)) 20:02:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fcntl$notify(r0, 0x402, 0x0) 20:02:25 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x0, 0x1, 0x3}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@mcast1, 0x0, 0x1}, 0x20) 20:02:25 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x0, 0x1, 0x3}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@mcast1, 0x0, 0x1}, 0x20) 20:02:26 executing program 4: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="4e01278300535c6abcb6a8"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 20:02:26 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x0, 0x1, 0x3}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@mcast1, 0x0, 0x1}, 0x20) 20:02:26 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() prlimit64(0x0, 0x6, &(0x7f0000000040), 0x0) setreuid(r0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fork() 20:02:26 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x42) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) ioctl$EVIOCGRAB(r0, 0x80004518, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) 20:02:26 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x42) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) ioctl$EVIOCGRAB(r0, 0x80004518, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) 20:02:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = dup3(r0, r1, 0x0) setsockopt$inet6_tcp_buf(r2, 0x6, 0xc, &(0x7f0000000000)="7e50a7ff", 0x4) 20:02:26 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x0, 0x1, 0x3}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@mcast1, 0x0, 0x1}, 0x20) 20:02:26 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x2224c1, 0x0) fcntl$getflags(r0, 0x1) 20:02:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = dup3(r0, r1, 0x0) setsockopt$inet6_tcp_buf(r2, 0x6, 0xc, &(0x7f0000000000)="7e50a7ff", 0x4) 20:02:26 executing program 4: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="4e01278300535c6abcb6a8"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 20:02:26 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() prlimit64(0x0, 0x6, &(0x7f0000000040), 0x0) setreuid(r0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fork() 20:02:26 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x2224c1, 0x0) fcntl$getflags(r0, 0x1) 20:02:26 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() prlimit64(0x0, 0x6, &(0x7f0000000040), 0x0) setreuid(r0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fork() 20:02:26 executing program 4: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="4e01278300535c6abcb6a8"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 20:02:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = dup3(r0, r1, 0x0) setsockopt$inet6_tcp_buf(r2, 0x6, 0xc, &(0x7f0000000000)="7e50a7ff", 0x4) 20:02:26 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x42) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) ioctl$EVIOCGRAB(r0, 0x80004518, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) 20:02:26 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x42) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) ioctl$EVIOCGRAB(r0, 0x80004518, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) 20:02:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = dup3(r0, r1, 0x0) setsockopt$inet6_tcp_buf(r2, 0x6, 0xc, &(0x7f0000000000)="7e50a7ff", 0x4) 20:02:26 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x2224c1, 0x0) fcntl$getflags(r0, 0x1) 20:02:26 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() prlimit64(0x0, 0x6, &(0x7f0000000040), 0x0) setreuid(r0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fork() 20:02:26 executing program 4: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="4e01278300535c6abcb6a8"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 20:02:26 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x2224c1, 0x0) fcntl$getflags(r0, 0x1) 20:02:26 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/module/nfs', 0x0, 0x0) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000040)="31456839bf124ecba663620f2e65d7dfa22135d7e6fff5832b011490cee866bab150688bfc37fca43ae620fdb97e3d9b76f50fe3081117137acf01e7bdf648bec9e30b203c6faa1211afd988190afced140b3b9e98370876e0c8c2507e5365b09681071f33643b4b80b0943e7809cbee5c6c84e2c8c12aa44a95827b8e16e5b38023bbe83d9d72910bb635b38f257d1e9532e946f311347621dfb23cc3f25d4aac8ee409007ea430dcb72d2bd364f5cee20675bd7d771e2e16a221d1ad71a7577409d613f108da4fbfeeedef1107ca8fbe20bde6c4f78d081f4c5889afa6aa10"}, {&(0x7f0000000140)="c0cb3473c5c468c10d0eb1e90b8de7fbd81e46a8cc7597e48bb65f7714cc875e8de90963e78093547be86fe27ce0dd189a156691402af54f5074a0bb75f7c2c3cce6b67bcb193200f38ad08d0c3d1585b9b611a37648f9a5f5a41ba6371c6e6eb6ac423efe57c197b8d8ca49b5b5737007bc64955cda1ad27e1d1410438f13b6ea0ab4991f98604b34ebde6621263c27adb4d65e787b4ef080b73c447aaf06e41e490b973474f28f951c2b5f5d9d6a091639e8b52c16b30110ed7bc2c2172173d5a746ee55646ede5b0257f57257fa52baa7"}, {&(0x7f0000000280)="264bb61176608b0a48d0c567e20074272ea7bda1ea81c88710bd40dd95"}, {&(0x7f00000002c0)="523667d36e8cacb36e42c2807fa818d9c6d1a7b8b42805c23d4bdfb1611ef5a49491ce74abfa72bf12991de24c50ab"}, {&(0x7f0000000300)="be95dce7da69db21df8c189f4f8bc1291765d06e384360516aede5ab40d8c564a218f7629750d3056bd475edafc4cb6b4576c82624071428"}], 0x1f) 20:02:26 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000040)=ANY=[]) 20:02:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0x10132) recvmmsg(r1, &(0x7f0000001140)=[{{0x0, 0x0, 0x0}}], 0x700, 0x0, 0x0) 20:02:26 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/module/nfs', 0x0, 0x0) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000040)="31456839bf124ecba663620f2e65d7dfa22135d7e6fff5832b011490cee866bab150688bfc37fca43ae620fdb97e3d9b76f50fe3081117137acf01e7bdf648bec9e30b203c6faa1211afd988190afced140b3b9e98370876e0c8c2507e5365b09681071f33643b4b80b0943e7809cbee5c6c84e2c8c12aa44a95827b8e16e5b38023bbe83d9d72910bb635b38f257d1e9532e946f311347621dfb23cc3f25d4aac8ee409007ea430dcb72d2bd364f5cee20675bd7d771e2e16a221d1ad71a7577409d613f108da4fbfeeedef1107ca8fbe20bde6c4f78d081f4c5889afa6aa10"}, {&(0x7f0000000140)="c0cb3473c5c468c10d0eb1e90b8de7fbd81e46a8cc7597e48bb65f7714cc875e8de90963e78093547be86fe27ce0dd189a156691402af54f5074a0bb75f7c2c3cce6b67bcb193200f38ad08d0c3d1585b9b611a37648f9a5f5a41ba6371c6e6eb6ac423efe57c197b8d8ca49b5b5737007bc64955cda1ad27e1d1410438f13b6ea0ab4991f98604b34ebde6621263c27adb4d65e787b4ef080b73c447aaf06e41e490b973474f28f951c2b5f5d9d6a091639e8b52c16b30110ed7bc2c2172173d5a746ee55646ede5b0257f57257fa52baa7"}, {&(0x7f0000000280)="264bb61176608b0a48d0c567e20074272ea7bda1ea81c88710bd40dd95"}, {&(0x7f00000002c0)="523667d36e8cacb36e42c2807fa818d9c6d1a7b8b42805c23d4bdfb1611ef5a49491ce74abfa72bf12991de24c50ab"}, {&(0x7f0000000300)="be95dce7da69db21df8c189f4f8bc1291765d06e384360516aede5ab40d8c564a218f7629750d3056bd475edafc4cb6b4576c82624071428"}], 0x1f) 20:02:26 executing program 3: syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000000)='./file1\x00', 0x0, 0x2, &(0x7f00000005c0)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020301000240040000f0", 0x16}, {0x0, 0x0, 0xffffffff}], 0x0, &(0x7f0000000200)) [ 423.813336][T19758] loop3: detected capacity change from 0 to 264192 [ 423.821393][T19758] FAT-fs (loop3): bogus sectors per cluster 3 [ 423.827742][T19758] FAT-fs (loop3): Can't find a valid FAT filesystem 20:02:26 executing program 3: syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000000)='./file1\x00', 0x0, 0x2, &(0x7f00000005c0)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020301000240040000f0", 0x16}, {0x0, 0x0, 0xffffffff}], 0x0, &(0x7f0000000200)) 20:02:26 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000040)=ANY=[]) 20:02:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0x10132) recvmmsg(r1, &(0x7f0000001140)=[{{0x0, 0x0, 0x0}}], 0x700, 0x0, 0x0) 20:02:26 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/module/nfs', 0x0, 0x0) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000040)="31456839bf124ecba663620f2e65d7dfa22135d7e6fff5832b011490cee866bab150688bfc37fca43ae620fdb97e3d9b76f50fe3081117137acf01e7bdf648bec9e30b203c6faa1211afd988190afced140b3b9e98370876e0c8c2507e5365b09681071f33643b4b80b0943e7809cbee5c6c84e2c8c12aa44a95827b8e16e5b38023bbe83d9d72910bb635b38f257d1e9532e946f311347621dfb23cc3f25d4aac8ee409007ea430dcb72d2bd364f5cee20675bd7d771e2e16a221d1ad71a7577409d613f108da4fbfeeedef1107ca8fbe20bde6c4f78d081f4c5889afa6aa10"}, {&(0x7f0000000140)="c0cb3473c5c468c10d0eb1e90b8de7fbd81e46a8cc7597e48bb65f7714cc875e8de90963e78093547be86fe27ce0dd189a156691402af54f5074a0bb75f7c2c3cce6b67bcb193200f38ad08d0c3d1585b9b611a37648f9a5f5a41ba6371c6e6eb6ac423efe57c197b8d8ca49b5b5737007bc64955cda1ad27e1d1410438f13b6ea0ab4991f98604b34ebde6621263c27adb4d65e787b4ef080b73c447aaf06e41e490b973474f28f951c2b5f5d9d6a091639e8b52c16b30110ed7bc2c2172173d5a746ee55646ede5b0257f57257fa52baa7"}, {&(0x7f0000000280)="264bb61176608b0a48d0c567e20074272ea7bda1ea81c88710bd40dd95"}, {&(0x7f00000002c0)="523667d36e8cacb36e42c2807fa818d9c6d1a7b8b42805c23d4bdfb1611ef5a49491ce74abfa72bf12991de24c50ab"}, {&(0x7f0000000300)="be95dce7da69db21df8c189f4f8bc1291765d06e384360516aede5ab40d8c564a218f7629750d3056bd475edafc4cb6b4576c82624071428"}], 0x1f) 20:02:26 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f610500020c010a1f05fe380c10080008001e000a00c00e140000001a00ffffba16a0aa1c0900000a000000", 0x38}], 0x1}, 0x0) 20:02:26 executing program 0: shmat(0xffffffffffffffff, &(0x7f0000ff9000/0x4000)=nil, 0x0) 20:02:26 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000040)=ANY=[]) 20:02:26 executing program 0: shmat(0xffffffffffffffff, &(0x7f0000ff9000/0x4000)=nil, 0x0) 20:02:26 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/module/nfs', 0x0, 0x0) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000040)="31456839bf124ecba663620f2e65d7dfa22135d7e6fff5832b011490cee866bab150688bfc37fca43ae620fdb97e3d9b76f50fe3081117137acf01e7bdf648bec9e30b203c6faa1211afd988190afced140b3b9e98370876e0c8c2507e5365b09681071f33643b4b80b0943e7809cbee5c6c84e2c8c12aa44a95827b8e16e5b38023bbe83d9d72910bb635b38f257d1e9532e946f311347621dfb23cc3f25d4aac8ee409007ea430dcb72d2bd364f5cee20675bd7d771e2e16a221d1ad71a7577409d613f108da4fbfeeedef1107ca8fbe20bde6c4f78d081f4c5889afa6aa10"}, {&(0x7f0000000140)="c0cb3473c5c468c10d0eb1e90b8de7fbd81e46a8cc7597e48bb65f7714cc875e8de90963e78093547be86fe27ce0dd189a156691402af54f5074a0bb75f7c2c3cce6b67bcb193200f38ad08d0c3d1585b9b611a37648f9a5f5a41ba6371c6e6eb6ac423efe57c197b8d8ca49b5b5737007bc64955cda1ad27e1d1410438f13b6ea0ab4991f98604b34ebde6621263c27adb4d65e787b4ef080b73c447aaf06e41e490b973474f28f951c2b5f5d9d6a091639e8b52c16b30110ed7bc2c2172173d5a746ee55646ede5b0257f57257fa52baa7"}, {&(0x7f0000000280)="264bb61176608b0a48d0c567e20074272ea7bda1ea81c88710bd40dd95"}, {&(0x7f00000002c0)="523667d36e8cacb36e42c2807fa818d9c6d1a7b8b42805c23d4bdfb1611ef5a49491ce74abfa72bf12991de24c50ab"}, {&(0x7f0000000300)="be95dce7da69db21df8c189f4f8bc1291765d06e384360516aede5ab40d8c564a218f7629750d3056bd475edafc4cb6b4576c82624071428"}], 0x1f) 20:02:26 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000040)=ANY=[]) 20:02:26 executing program 3: syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000000)='./file1\x00', 0x0, 0x2, &(0x7f00000005c0)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020301000240040000f0", 0x16}, {0x0, 0x0, 0xffffffff}], 0x0, &(0x7f0000000200)) [ 423.926447][T19770] loop3: detected capacity change from 0 to 264192 [ 423.936671][T19770] FAT-fs (loop3): bogus sectors per cluster 3 [ 423.942751][T19770] FAT-fs (loop3): Can't find a valid FAT filesystem 20:02:26 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000001ac0)='./file0\x00', 0x0) r0 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(r1) 20:02:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0x10132) recvmmsg(r1, &(0x7f0000001140)=[{{0x0, 0x0, 0x0}}], 0x700, 0x0, 0x0) 20:02:27 executing program 3: syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000000)='./file1\x00', 0x0, 0x2, &(0x7f00000005c0)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020301000240040000f0", 0x16}, {0x0, 0x0, 0xffffffff}], 0x0, &(0x7f0000000200)) 20:02:27 executing program 0: shmat(0xffffffffffffffff, &(0x7f0000ff9000/0x4000)=nil, 0x0) 20:02:27 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f610500020c010a1f05fe380c10080008001e000a00c00e140000001a00ffffba16a0aa1c0900000a000000", 0x38}], 0x1}, 0x0) 20:02:27 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x8080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_sock_diag(0x10, 0x3, 0x4) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mmap(&(0x7f000005d000/0x400000)=nil, 0x400000, 0x7000006, 0x392d6ad36ec2c8b2, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x8) mlock2(&(0x7f00001ce000/0x1000)=nil, 0x1000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps_rollup\x00') preadv(r0, &(0x7f0000000780)=[{&(0x7f0000000080)=""/170, 0xaa}], 0x1, 0x7, 0x0) socket$nl_audit(0x10, 0x3, 0x9) [ 424.001915][T19784] loop3: detected capacity change from 0 to 264192 [ 424.018735][T19784] FAT-fs (loop3): bogus sectors per cluster 3 [ 424.024830][T19784] FAT-fs (loop3): Can't find a valid FAT filesystem 20:02:27 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000001ac0)='./file0\x00', 0x0) r0 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(r1) 20:02:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0x10132) recvmmsg(r1, &(0x7f0000001140)=[{{0x0, 0x0, 0x0}}], 0x700, 0x0, 0x0) 20:02:27 executing program 0: shmat(0xffffffffffffffff, &(0x7f0000ff9000/0x4000)=nil, 0x0) [ 424.118492][T19800] loop3: detected capacity change from 0 to 264192 20:02:27 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000001ac0)='./file0\x00', 0x0) r0 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(r1) 20:02:27 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f610500020c010a1f05fe380c10080008001e000a00c00e140000001a00ffffba16a0aa1c0900000a000000", 0x38}], 0x1}, 0x0) 20:02:27 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f610500020c010a1f05fe380c10080008001e000a00c00e140000001a00ffffba16a0aa1c0900000a000000", 0x38}], 0x1}, 0x0) 20:02:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000001ac0)='./file0\x00', 0x0) r0 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(r1) 20:02:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000001ac0)='./file0\x00', 0x0) r0 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(r1) [ 424.182478][T19800] FAT-fs (loop3): bogus sectors per cluster 3 [ 424.188603][T19800] FAT-fs (loop3): Can't find a valid FAT filesystem 20:02:27 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x8080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_sock_diag(0x10, 0x3, 0x4) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mmap(&(0x7f000005d000/0x400000)=nil, 0x400000, 0x7000006, 0x392d6ad36ec2c8b2, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x8) mlock2(&(0x7f00001ce000/0x1000)=nil, 0x1000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps_rollup\x00') preadv(r0, &(0x7f0000000780)=[{&(0x7f0000000080)=""/170, 0xaa}], 0x1, 0x7, 0x0) socket$nl_audit(0x10, 0x3, 0x9) 20:02:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000001ac0)='./file0\x00', 0x0) r0 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(r1) 20:02:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000001ac0)='./file0\x00', 0x0) r0 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(r1) 20:02:27 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000001ac0)='./file0\x00', 0x0) r0 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(r1) 20:02:27 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "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", ['\x00', '\x00', '\x00']}, 0xa70) 20:02:27 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x8080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_sock_diag(0x10, 0x3, 0x4) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mmap(&(0x7f000005d000/0x400000)=nil, 0x400000, 0x7000006, 0x392d6ad36ec2c8b2, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x8) mlock2(&(0x7f00001ce000/0x1000)=nil, 0x1000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps_rollup\x00') preadv(r0, &(0x7f0000000780)=[{&(0x7f0000000080)=""/170, 0xaa}], 0x1, 0x7, 0x0) socket$nl_audit(0x10, 0x3, 0x9) 20:02:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000001ac0)='./file0\x00', 0x0) r0 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(r1) 20:02:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000001ac0)='./file0\x00', 0x0) r0 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(r1) 20:02:27 executing program 4: sendmsg$NL80211_CMD_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000002740)={&(0x7f0000000640)={0x9c4, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@chandef_params=[@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_CENTER_FREQ2={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5}], @NL80211_ATTR_CH_SWITCH_COUNT={0x8}, @NL80211_ATTR_CSA_IES={0x4}, @NL80211_ATTR_CSA_IES={0x978, 0xb9, 0x0, 0x1, [@NL80211_ATTR_CSA_C_OFF_BEACON={0xe, 0xba, [0x0, 0x0, 0x0, 0x0, 0x0]}, @beacon_params=[@NL80211_ATTR_BEACON_HEAD={0x1cd, 0xe, {@with_ht={{{}, {}, @device_b, @device_b, @random="52e3c6db5c97"}}, 0x0, @random, 0x0, @val={0x0, 0x6, @default_ibss_ssid}, @void, @void, @val={0x4, 0x6}, @void, @val={0x5, 0x90, {0x0, 0x0, 0x0, "22b3d6363e8fea84c78743587577b1e9585c0d4f92d77718cb252c1d55ebf271462e90f20f875769f17981814f16c7c7cf0a92c6773db349b35a919fb50b65a29bace4fe51f543c3d6482655f4e2a35fbc8dca9ae3620f3ff9cb35fa2821d4d3e52903fced03013c6da5e3531d39d248df6698c4acc8042e84689e668ebb57bc5e439f90de1b02f19de6d77349"}}, @void, @val={0x2a, 0x1}, @void, @val={0x2d, 0x1a}, @val={0x72, 0x6}, @void, @void, [{0xdd, 0xd6, "b35b5a79ba268cb8652e59f676b23e1c17f56b06c60a77eed51b0995fc8a1ef53d1bcb4f6eda779cc2e112b94df54f63f9a0fa3a886e4dde52df417cb6f2aab725b1488884baf3aefe2ab2971d99fd64e4614f6c6bc38689c8f13d62563808200d3428f3275e6420b65c9a04e94bcb6018b04b6aa149f41cca536059859bc92c378704ddcc922ce758a0fca7531bfd6e8391fc91db3f41bd592af929827ec645af479d15369d6519116e6bb42b955e99ae08e54fa6933a2016d9e4338183ef20b02a92d7d460c0867e45e570c61b2bba03019b990b71"}]}}, @NL80211_ATTR_IE={0x55, 0x2a, [@ht={0x2d, 0x1a}, @ssid={0x0, 0x6, @default_ibss_ssid}, @chsw_timing={0x68, 0x4}, @prep={0x83, 0x25}]}, @NL80211_ATTR_IE_PROBE_RESP={0x105, 0x7f, [@tim={0x5, 0x71, {0x0, 0x0, 0x0, "2add7b619685e6124c836bb3b38dd4b3cf0f77e9b604a2bdb0d0d9e62b51aac94aff1c4b7b4e4fcbacd725f25e9554455baeac9c248ff79f2c87243f0e4e6ebc00caa41b3991eafdd2c367fffc747daaaef7ca58c1d0ddb835d096370d1adb21a12767433de9fcdbb63bf9843247"}}, @supported_rates={0x1, 0x4, [{}, {}, {}, {}]}, @mesh_id={0x72, 0x6}, @ext_channel_switch={0x3c, 0x4}, @tim={0x5, 0x70, {0x0, 0x0, 0x0, "77296dde6b472c598837d73d42664da32a1b883cf7496d994ec1815dc6f8129974bcd703f75b14088d80372d72841bbe26f5f729a122b4be47ded3b5cbf4e590bf0844070e6fd7d0edd84c48d3b97c61d454edc4202e94c64621a81f73708ab03e2b2cfdae2bc56dcd61bcf4b6"}}, @cf={0x4, 0x6}]}, @NL80211_ATTR_IE={0xd, 0x2a, [@mesh_config={0x71, 0x7}]}, @NL80211_ATTR_IE_ASSOC_RESP={0x621, 0x80, [@random_vendor={0xdd, 0x22, "bfb8bea42937974ec352ae2bc1bfb6082cb53b2494745db03f20f09ffb5d77a3964d"}, @perr={0x84, 0x82, {0x0, 0x8, [@not_ext={{}, @device_b}, @not_ext={{}, @broadcast}, @ext, @ext, @ext={{}, @device_b}, @not_ext={{}, @broadcast}, @ext={{}, @device_a, 0x0, @device_b}, @not_ext={{}, @device_b}]}}, @random_vendor={0xdd, 0x92, "ea748531a420bc49374a40ac8b82fc6fd7440c0ddba2706a81373775d196c7ea98ab304b49776e630ee7accbea4fdb1017b23537bd60d8b5cfed1a0d73a093d581e779744a4cdc8fc1cc1be57cbbbb791bb974f93a0dcfc9558439be40ac22bd552b946a67b66e82f9672b7c877ec2f9ccd1e34d56638cd7b147ad1bd62b987f90beedaa42632ea1f570c8d321748f2b3e8f"}, @random_vendor={0xdd, 0x78, "114cf900d78b0766500d02056b169cf7242b228d9ddf4f0305934b96a6ca90a9011369b01c97e04dd5fb264916e1a6d74f8e828d4b0d83d3134242ef63f4e0480b99f566f66027bad4c4946408f7cbdc626a408959dd951fea89ef78ec0b302cf78e5525b52e2913a2165a6c72ff031cdf11d1d9152c8b9c"}, @erp={0x2a, 0x1}, @mesh_chsw={0x76, 0x6}, @preq={0x82, 0x72, @not_ext={{}, 0x0, 0x0, 0x0, @broadcast, 0x0, "", 0x0, 0x0, 0x8, [{{}, @broadcast}, {{}, @broadcast}, {{}, @device_b}, {{}, @broadcast}, {{}, @device_b}, {{}, @broadcast}, {}, {{}, @device_b}]}}, @mesh_chsw={0x76, 0x6}, @measure_req={0x26, 0x3de, {0x0, 0x0, 0x0, "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"}}]}]]}]}, 0x9c4}}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000580)={0x1, 0x0, 0xb, 0x2000018, 0x11b, &(0x7f0000000080)}) 20:02:27 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "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", ['\x00', '\x00', '\x00']}, 0xa70) 20:02:27 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x8080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_sock_diag(0x10, 0x3, 0x4) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mmap(&(0x7f000005d000/0x400000)=nil, 0x400000, 0x7000006, 0x392d6ad36ec2c8b2, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x8) mlock2(&(0x7f00001ce000/0x1000)=nil, 0x1000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps_rollup\x00') preadv(r0, &(0x7f0000000780)=[{&(0x7f0000000080)=""/170, 0xaa}], 0x1, 0x7, 0x0) socket$nl_audit(0x10, 0x3, 0x9) 20:02:27 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="66530700ae897094e7b126b08d", 0xd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:02:27 executing program 0: set_mempolicy(0x1, &(0x7f0000000100)=0xfffffffffffffff9, 0x79) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000005a00)='cgroup2\x00', 0x0, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) 20:02:27 executing program 4: sendmsg$NL80211_CMD_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000002740)={&(0x7f0000000640)={0x9c4, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@chandef_params=[@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_CENTER_FREQ2={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5}], @NL80211_ATTR_CH_SWITCH_COUNT={0x8}, @NL80211_ATTR_CSA_IES={0x4}, @NL80211_ATTR_CSA_IES={0x978, 0xb9, 0x0, 0x1, [@NL80211_ATTR_CSA_C_OFF_BEACON={0xe, 0xba, [0x0, 0x0, 0x0, 0x0, 0x0]}, @beacon_params=[@NL80211_ATTR_BEACON_HEAD={0x1cd, 0xe, {@with_ht={{{}, {}, @device_b, @device_b, @random="52e3c6db5c97"}}, 0x0, @random, 0x0, @val={0x0, 0x6, @default_ibss_ssid}, @void, @void, @val={0x4, 0x6}, @void, @val={0x5, 0x90, {0x0, 0x0, 0x0, "22b3d6363e8fea84c78743587577b1e9585c0d4f92d77718cb252c1d55ebf271462e90f20f875769f17981814f16c7c7cf0a92c6773db349b35a919fb50b65a29bace4fe51f543c3d6482655f4e2a35fbc8dca9ae3620f3ff9cb35fa2821d4d3e52903fced03013c6da5e3531d39d248df6698c4acc8042e84689e668ebb57bc5e439f90de1b02f19de6d77349"}}, @void, @val={0x2a, 0x1}, @void, @val={0x2d, 0x1a}, @val={0x72, 0x6}, @void, @void, [{0xdd, 0xd6, "b35b5a79ba268cb8652e59f676b23e1c17f56b06c60a77eed51b0995fc8a1ef53d1bcb4f6eda779cc2e112b94df54f63f9a0fa3a886e4dde52df417cb6f2aab725b1488884baf3aefe2ab2971d99fd64e4614f6c6bc38689c8f13d62563808200d3428f3275e6420b65c9a04e94bcb6018b04b6aa149f41cca536059859bc92c378704ddcc922ce758a0fca7531bfd6e8391fc91db3f41bd592af929827ec645af479d15369d6519116e6bb42b955e99ae08e54fa6933a2016d9e4338183ef20b02a92d7d460c0867e45e570c61b2bba03019b990b71"}]}}, @NL80211_ATTR_IE={0x55, 0x2a, [@ht={0x2d, 0x1a}, @ssid={0x0, 0x6, @default_ibss_ssid}, @chsw_timing={0x68, 0x4}, @prep={0x83, 0x25}]}, @NL80211_ATTR_IE_PROBE_RESP={0x105, 0x7f, [@tim={0x5, 0x71, {0x0, 0x0, 0x0, "2add7b619685e6124c836bb3b38dd4b3cf0f77e9b604a2bdb0d0d9e62b51aac94aff1c4b7b4e4fcbacd725f25e9554455baeac9c248ff79f2c87243f0e4e6ebc00caa41b3991eafdd2c367fffc747daaaef7ca58c1d0ddb835d096370d1adb21a12767433de9fcdbb63bf9843247"}}, @supported_rates={0x1, 0x4, [{}, {}, {}, {}]}, @mesh_id={0x72, 0x6}, @ext_channel_switch={0x3c, 0x4}, @tim={0x5, 0x70, {0x0, 0x0, 0x0, "77296dde6b472c598837d73d42664da32a1b883cf7496d994ec1815dc6f8129974bcd703f75b14088d80372d72841bbe26f5f729a122b4be47ded3b5cbf4e590bf0844070e6fd7d0edd84c48d3b97c61d454edc4202e94c64621a81f73708ab03e2b2cfdae2bc56dcd61bcf4b6"}}, @cf={0x4, 0x6}]}, @NL80211_ATTR_IE={0xd, 0x2a, [@mesh_config={0x71, 0x7}]}, @NL80211_ATTR_IE_ASSOC_RESP={0x621, 0x80, [@random_vendor={0xdd, 0x22, "bfb8bea42937974ec352ae2bc1bfb6082cb53b2494745db03f20f09ffb5d77a3964d"}, @perr={0x84, 0x82, {0x0, 0x8, [@not_ext={{}, @device_b}, @not_ext={{}, @broadcast}, @ext, @ext, @ext={{}, @device_b}, @not_ext={{}, @broadcast}, @ext={{}, @device_a, 0x0, @device_b}, @not_ext={{}, @device_b}]}}, @random_vendor={0xdd, 0x92, "ea748531a420bc49374a40ac8b82fc6fd7440c0ddba2706a81373775d196c7ea98ab304b49776e630ee7accbea4fdb1017b23537bd60d8b5cfed1a0d73a093d581e779744a4cdc8fc1cc1be57cbbbb791bb974f93a0dcfc9558439be40ac22bd552b946a67b66e82f9672b7c877ec2f9ccd1e34d56638cd7b147ad1bd62b987f90beedaa42632ea1f570c8d321748f2b3e8f"}, @random_vendor={0xdd, 0x78, "114cf900d78b0766500d02056b169cf7242b228d9ddf4f0305934b96a6ca90a9011369b01c97e04dd5fb264916e1a6d74f8e828d4b0d83d3134242ef63f4e0480b99f566f66027bad4c4946408f7cbdc626a408959dd951fea89ef78ec0b302cf78e5525b52e2913a2165a6c72ff031cdf11d1d9152c8b9c"}, @erp={0x2a, 0x1}, @mesh_chsw={0x76, 0x6}, @preq={0x82, 0x72, @not_ext={{}, 0x0, 0x0, 0x0, @broadcast, 0x0, "", 0x0, 0x0, 0x8, [{{}, @broadcast}, {{}, @broadcast}, {{}, @device_b}, {{}, @broadcast}, {{}, @device_b}, {{}, @broadcast}, {}, {{}, @device_b}]}}, @mesh_chsw={0x76, 0x6}, @measure_req={0x26, 0x3de, {0x0, 0x0, 0x0, "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"}}]}]]}]}, 0x9c4}}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000580)={0x1, 0x0, 0xb, 0x2000018, 0x11b, &(0x7f0000000080)}) 20:02:27 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x8080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_sock_diag(0x10, 0x3, 0x4) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mmap(&(0x7f000005d000/0x400000)=nil, 0x400000, 0x7000006, 0x392d6ad36ec2c8b2, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x8) mlock2(&(0x7f00001ce000/0x1000)=nil, 0x1000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps_rollup\x00') preadv(r0, &(0x7f0000000780)=[{&(0x7f0000000080)=""/170, 0xaa}], 0x1, 0x7, 0x0) socket$nl_audit(0x10, 0x3, 0x9) 20:02:27 executing program 4: sendmsg$NL80211_CMD_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000002740)={&(0x7f0000000640)={0x9c4, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@chandef_params=[@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_CENTER_FREQ2={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5}], @NL80211_ATTR_CH_SWITCH_COUNT={0x8}, @NL80211_ATTR_CSA_IES={0x4}, @NL80211_ATTR_CSA_IES={0x978, 0xb9, 0x0, 0x1, [@NL80211_ATTR_CSA_C_OFF_BEACON={0xe, 0xba, [0x0, 0x0, 0x0, 0x0, 0x0]}, @beacon_params=[@NL80211_ATTR_BEACON_HEAD={0x1cd, 0xe, {@with_ht={{{}, {}, @device_b, @device_b, @random="52e3c6db5c97"}}, 0x0, @random, 0x0, @val={0x0, 0x6, @default_ibss_ssid}, @void, @void, @val={0x4, 0x6}, @void, @val={0x5, 0x90, {0x0, 0x0, 0x0, "22b3d6363e8fea84c78743587577b1e9585c0d4f92d77718cb252c1d55ebf271462e90f20f875769f17981814f16c7c7cf0a92c6773db349b35a919fb50b65a29bace4fe51f543c3d6482655f4e2a35fbc8dca9ae3620f3ff9cb35fa2821d4d3e52903fced03013c6da5e3531d39d248df6698c4acc8042e84689e668ebb57bc5e439f90de1b02f19de6d77349"}}, @void, @val={0x2a, 0x1}, @void, @val={0x2d, 0x1a}, @val={0x72, 0x6}, @void, @void, [{0xdd, 0xd6, "b35b5a79ba268cb8652e59f676b23e1c17f56b06c60a77eed51b0995fc8a1ef53d1bcb4f6eda779cc2e112b94df54f63f9a0fa3a886e4dde52df417cb6f2aab725b1488884baf3aefe2ab2971d99fd64e4614f6c6bc38689c8f13d62563808200d3428f3275e6420b65c9a04e94bcb6018b04b6aa149f41cca536059859bc92c378704ddcc922ce758a0fca7531bfd6e8391fc91db3f41bd592af929827ec645af479d15369d6519116e6bb42b955e99ae08e54fa6933a2016d9e4338183ef20b02a92d7d460c0867e45e570c61b2bba03019b990b71"}]}}, @NL80211_ATTR_IE={0x55, 0x2a, [@ht={0x2d, 0x1a}, @ssid={0x0, 0x6, @default_ibss_ssid}, @chsw_timing={0x68, 0x4}, @prep={0x83, 0x25}]}, @NL80211_ATTR_IE_PROBE_RESP={0x105, 0x7f, [@tim={0x5, 0x71, {0x0, 0x0, 0x0, "2add7b619685e6124c836bb3b38dd4b3cf0f77e9b604a2bdb0d0d9e62b51aac94aff1c4b7b4e4fcbacd725f25e9554455baeac9c248ff79f2c87243f0e4e6ebc00caa41b3991eafdd2c367fffc747daaaef7ca58c1d0ddb835d096370d1adb21a12767433de9fcdbb63bf9843247"}}, @supported_rates={0x1, 0x4, [{}, {}, {}, {}]}, @mesh_id={0x72, 0x6}, @ext_channel_switch={0x3c, 0x4}, @tim={0x5, 0x70, {0x0, 0x0, 0x0, "77296dde6b472c598837d73d42664da32a1b883cf7496d994ec1815dc6f8129974bcd703f75b14088d80372d72841bbe26f5f729a122b4be47ded3b5cbf4e590bf0844070e6fd7d0edd84c48d3b97c61d454edc4202e94c64621a81f73708ab03e2b2cfdae2bc56dcd61bcf4b6"}}, @cf={0x4, 0x6}]}, @NL80211_ATTR_IE={0xd, 0x2a, [@mesh_config={0x71, 0x7}]}, @NL80211_ATTR_IE_ASSOC_RESP={0x621, 0x80, [@random_vendor={0xdd, 0x22, "bfb8bea42937974ec352ae2bc1bfb6082cb53b2494745db03f20f09ffb5d77a3964d"}, @perr={0x84, 0x82, {0x0, 0x8, [@not_ext={{}, @device_b}, @not_ext={{}, @broadcast}, @ext, @ext, @ext={{}, @device_b}, @not_ext={{}, @broadcast}, @ext={{}, @device_a, 0x0, @device_b}, @not_ext={{}, @device_b}]}}, @random_vendor={0xdd, 0x92, "ea748531a420bc49374a40ac8b82fc6fd7440c0ddba2706a81373775d196c7ea98ab304b49776e630ee7accbea4fdb1017b23537bd60d8b5cfed1a0d73a093d581e779744a4cdc8fc1cc1be57cbbbb791bb974f93a0dcfc9558439be40ac22bd552b946a67b66e82f9672b7c877ec2f9ccd1e34d56638cd7b147ad1bd62b987f90beedaa42632ea1f570c8d321748f2b3e8f"}, @random_vendor={0xdd, 0x78, "114cf900d78b0766500d02056b169cf7242b228d9ddf4f0305934b96a6ca90a9011369b01c97e04dd5fb264916e1a6d74f8e828d4b0d83d3134242ef63f4e0480b99f566f66027bad4c4946408f7cbdc626a408959dd951fea89ef78ec0b302cf78e5525b52e2913a2165a6c72ff031cdf11d1d9152c8b9c"}, @erp={0x2a, 0x1}, @mesh_chsw={0x76, 0x6}, @preq={0x82, 0x72, @not_ext={{}, 0x0, 0x0, 0x0, @broadcast, 0x0, "", 0x0, 0x0, 0x8, [{{}, @broadcast}, {{}, @broadcast}, {{}, @device_b}, {{}, @broadcast}, {{}, @device_b}, {{}, @broadcast}, {}, {{}, @device_b}]}}, @mesh_chsw={0x76, 0x6}, @measure_req={0x26, 0x3de, {0x0, 0x0, 0x0, "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"}}]}]]}]}, 0x9c4}}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000580)={0x1, 0x0, 0xb, 0x2000018, 0x11b, &(0x7f0000000080)}) 20:02:27 executing program 0: set_mempolicy(0x1, &(0x7f0000000100)=0xfffffffffffffff9, 0x79) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000005a00)='cgroup2\x00', 0x0, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) 20:02:27 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "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", ['\x00', '\x00', '\x00']}, 0xa70) 20:02:27 executing program 5: set_mempolicy(0x1, &(0x7f0000000100)=0xfffffffffffffff9, 0x79) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000005a00)='cgroup2\x00', 0x0, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) 20:02:27 executing program 4: sendmsg$NL80211_CMD_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000002740)={&(0x7f0000000640)={0x9c4, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@chandef_params=[@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_CENTER_FREQ2={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5}], @NL80211_ATTR_CH_SWITCH_COUNT={0x8}, @NL80211_ATTR_CSA_IES={0x4}, @NL80211_ATTR_CSA_IES={0x978, 0xb9, 0x0, 0x1, [@NL80211_ATTR_CSA_C_OFF_BEACON={0xe, 0xba, [0x0, 0x0, 0x0, 0x0, 0x0]}, @beacon_params=[@NL80211_ATTR_BEACON_HEAD={0x1cd, 0xe, {@with_ht={{{}, {}, @device_b, @device_b, @random="52e3c6db5c97"}}, 0x0, @random, 0x0, @val={0x0, 0x6, @default_ibss_ssid}, @void, @void, @val={0x4, 0x6}, @void, @val={0x5, 0x90, {0x0, 0x0, 0x0, "22b3d6363e8fea84c78743587577b1e9585c0d4f92d77718cb252c1d55ebf271462e90f20f875769f17981814f16c7c7cf0a92c6773db349b35a919fb50b65a29bace4fe51f543c3d6482655f4e2a35fbc8dca9ae3620f3ff9cb35fa2821d4d3e52903fced03013c6da5e3531d39d248df6698c4acc8042e84689e668ebb57bc5e439f90de1b02f19de6d77349"}}, @void, @val={0x2a, 0x1}, @void, @val={0x2d, 0x1a}, @val={0x72, 0x6}, @void, @void, [{0xdd, 0xd6, "b35b5a79ba268cb8652e59f676b23e1c17f56b06c60a77eed51b0995fc8a1ef53d1bcb4f6eda779cc2e112b94df54f63f9a0fa3a886e4dde52df417cb6f2aab725b1488884baf3aefe2ab2971d99fd64e4614f6c6bc38689c8f13d62563808200d3428f3275e6420b65c9a04e94bcb6018b04b6aa149f41cca536059859bc92c378704ddcc922ce758a0fca7531bfd6e8391fc91db3f41bd592af929827ec645af479d15369d6519116e6bb42b955e99ae08e54fa6933a2016d9e4338183ef20b02a92d7d460c0867e45e570c61b2bba03019b990b71"}]}}, @NL80211_ATTR_IE={0x55, 0x2a, [@ht={0x2d, 0x1a}, @ssid={0x0, 0x6, @default_ibss_ssid}, @chsw_timing={0x68, 0x4}, @prep={0x83, 0x25}]}, @NL80211_ATTR_IE_PROBE_RESP={0x105, 0x7f, [@tim={0x5, 0x71, {0x0, 0x0, 0x0, "2add7b619685e6124c836bb3b38dd4b3cf0f77e9b604a2bdb0d0d9e62b51aac94aff1c4b7b4e4fcbacd725f25e9554455baeac9c248ff79f2c87243f0e4e6ebc00caa41b3991eafdd2c367fffc747daaaef7ca58c1d0ddb835d096370d1adb21a12767433de9fcdbb63bf9843247"}}, @supported_rates={0x1, 0x4, [{}, {}, {}, {}]}, @mesh_id={0x72, 0x6}, @ext_channel_switch={0x3c, 0x4}, @tim={0x5, 0x70, {0x0, 0x0, 0x0, "77296dde6b472c598837d73d42664da32a1b883cf7496d994ec1815dc6f8129974bcd703f75b14088d80372d72841bbe26f5f729a122b4be47ded3b5cbf4e590bf0844070e6fd7d0edd84c48d3b97c61d454edc4202e94c64621a81f73708ab03e2b2cfdae2bc56dcd61bcf4b6"}}, @cf={0x4, 0x6}]}, @NL80211_ATTR_IE={0xd, 0x2a, [@mesh_config={0x71, 0x7}]}, @NL80211_ATTR_IE_ASSOC_RESP={0x621, 0x80, [@random_vendor={0xdd, 0x22, "bfb8bea42937974ec352ae2bc1bfb6082cb53b2494745db03f20f09ffb5d77a3964d"}, @perr={0x84, 0x82, {0x0, 0x8, [@not_ext={{}, @device_b}, @not_ext={{}, @broadcast}, @ext, @ext, @ext={{}, @device_b}, @not_ext={{}, @broadcast}, @ext={{}, @device_a, 0x0, @device_b}, @not_ext={{}, @device_b}]}}, @random_vendor={0xdd, 0x92, "ea748531a420bc49374a40ac8b82fc6fd7440c0ddba2706a81373775d196c7ea98ab304b49776e630ee7accbea4fdb1017b23537bd60d8b5cfed1a0d73a093d581e779744a4cdc8fc1cc1be57cbbbb791bb974f93a0dcfc9558439be40ac22bd552b946a67b66e82f9672b7c877ec2f9ccd1e34d56638cd7b147ad1bd62b987f90beedaa42632ea1f570c8d321748f2b3e8f"}, @random_vendor={0xdd, 0x78, "114cf900d78b0766500d02056b169cf7242b228d9ddf4f0305934b96a6ca90a9011369b01c97e04dd5fb264916e1a6d74f8e828d4b0d83d3134242ef63f4e0480b99f566f66027bad4c4946408f7cbdc626a408959dd951fea89ef78ec0b302cf78e5525b52e2913a2165a6c72ff031cdf11d1d9152c8b9c"}, @erp={0x2a, 0x1}, @mesh_chsw={0x76, 0x6}, @preq={0x82, 0x72, @not_ext={{}, 0x0, 0x0, 0x0, @broadcast, 0x0, "", 0x0, 0x0, 0x8, [{{}, @broadcast}, {{}, @broadcast}, {{}, @device_b}, {{}, @broadcast}, {{}, @device_b}, {{}, @broadcast}, {}, {{}, @device_b}]}}, @mesh_chsw={0x76, 0x6}, @measure_req={0x26, 0x3de, {0x0, 0x0, 0x0, "cd866cd7096b993418306682e5b16dfb9cec079cd0055e175c57a8eeef7ea2189593c90dc18289ac76205f113582b22e61ec55516f0480673109e82836abd63a112b78c4b80b10ed97b7cee15400449ea4edb87446db5dad79b9512ddbe2e06128eb4a38ee73ce441c3937d18cf958c282d6ba7102a4e1758619bd0081171c8fcfd11d33f8d7b5c5c339df203db826d59cb2a573039ad82a7a8ad479ae6b68831532b82c25e028472723a56268cace0a8f8d7fc4a2447cfccfa671c4a738ce5a3b0b8b67d9ae83567872c7d0d6e51aff0c2218526d9ed47218b396ee1b845c9a6bd907b2d35956dc427a9c67a1c1478e6e961ce4f5eb60d15210ab45ab79e0c1b058d4c4d430f0b1406b8ddfdb26c845abbde961b8527733297e27c7a9a085319000f5fe68ac67c858e5b186840f682b070e7fd53dee7a17029cd58e3a4825c889cd5e54558ce491380a1e15b4d20b3b14bae8dcc911f8c11c5fc117d2e791b0e64c209dce6b5186935cc6dd907198d6e187dd9d2c575dad31db600ec975f6609908575165b4bbfc2719dcab94963dd38161e508879c362253f8025d676c84cf80031dde6147935a4533941f9325fca99d02d7b48d06ee7bd32ec64fdf1a35f18ec9d1c3ce63fba89fc2b4e84d6186b9fffab916400eb0ef1ab233c43b3166133187eca55bcec3d90cd3215634e04363be2e97316c99881255285ae973b284032ae6e2fdd31a09bf96fbe1b87b86242d606def1f198ab4f2b03d20fe6aaff55b121f777f23de712af18c9346d3360959ce2c37583019cc54c7df386fc97e3268a12172c134fbd6daa7b067019901d234876cfcb8f5784ac2d40a6271cab63ad8c28191f147634510f182e1a7c840e32d9dede9f0a32d82adde3c4bb55b328a2e69aa959f20b604d4cd91ec96917ba4574cee5ac655e51ced05104113576bd04ffff9259d149789cdda21da565eac0b28bc387764babef40d149761700274872594e83bc6275c4a0ab40bff534838dcb8c7483bd368b0d981c15cc336ff6af0568a1d2db1edf5d47329fad3707d620603c6d7fbf04034f83e63e04cd0c19c645995765bbc1195e1b036fa8ac2b341bd1391a9ab85415017d96508c089f04ae15f39ecd4c8cd9ce02c64780ef7e385af017d2b72e41df7508add877aaeca30d07533d5df0bb187f50fcf6447da30110ca0febd0567ad94cd29eb53f5127b7ac3838c5b30d0e9e52a8a2d61ea3e9892fbe695abe24a44be966f8f194a8a474e71732e92ec529d0bf5da938fc3cfc4c45d923ce97fd28d9acd0670a32027dfb6442d25ab42af53397755f72325f5e562a7e509e7d6efaf0d58a52c9b38ad3ef05cf175ddd646cf0b458769da74f1e29a4a69ad7285671d85097ce61519"}}]}]]}]}, 0x9c4}}, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000580)={0x1, 0x0, 0xb, 0x2000018, 0x11b, &(0x7f0000000080)}) 20:02:27 executing program 0: set_mempolicy(0x1, &(0x7f0000000100)=0xfffffffffffffff9, 0x79) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000005a00)='cgroup2\x00', 0x0, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) 20:02:27 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x8080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_sock_diag(0x10, 0x3, 0x4) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mmap(&(0x7f000005d000/0x400000)=nil, 0x400000, 0x7000006, 0x392d6ad36ec2c8b2, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x8) mlock2(&(0x7f00001ce000/0x1000)=nil, 0x1000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps_rollup\x00') preadv(r0, &(0x7f0000000780)=[{&(0x7f0000000080)=""/170, 0xaa}], 0x1, 0x7, 0x0) socket$nl_audit(0x10, 0x3, 0x9) 20:02:27 executing program 5: set_mempolicy(0x1, &(0x7f0000000100)=0xfffffffffffffff9, 0x79) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000005a00)='cgroup2\x00', 0x0, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) 20:02:27 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "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", ['\x00', '\x00', '\x00']}, 0xa70) 20:02:27 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x8080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_sock_diag(0x10, 0x3, 0x4) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mmap(&(0x7f000005d000/0x400000)=nil, 0x400000, 0x7000006, 0x392d6ad36ec2c8b2, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x8) mlock2(&(0x7f00001ce000/0x1000)=nil, 0x1000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps_rollup\x00') preadv(r0, &(0x7f0000000780)=[{&(0x7f0000000080)=""/170, 0xaa}], 0x1, 0x7, 0x0) socket$nl_audit(0x10, 0x3, 0x9) 20:02:27 executing program 0: set_mempolicy(0x1, &(0x7f0000000100)=0xfffffffffffffff9, 0x79) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000005a00)='cgroup2\x00', 0x0, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) 20:02:27 executing program 4: set_mempolicy(0x1, &(0x7f0000000100)=0xfffffffffffffff9, 0x79) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000005a00)='cgroup2\x00', 0x0, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) 20:02:27 executing program 5: set_mempolicy(0x1, &(0x7f0000000100)=0xfffffffffffffff9, 0x79) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000005a00)='cgroup2\x00', 0x0, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) 20:02:27 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1, 0x0, &(0x7f0000000040)) 20:02:27 executing program 4: set_mempolicy(0x1, &(0x7f0000000100)=0xfffffffffffffff9, 0x79) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000005a00)='cgroup2\x00', 0x0, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) 20:02:27 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r3 = socket(0x400000000000010, 0x3, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r2, 0x0, 0xd, 0x0, 0x0) 20:02:27 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1, 0x0, &(0x7f0000000040)) 20:02:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="290000001c00190f41f4cbace7f9a7df02000000ffe80001dd0000040d000300ea1100000005000000", 0x29}], 0x1) 20:02:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="290000001c00190f41f4cbace7f9a7df02000000ffe80001dd0000040d000300ea1100000005000000", 0x29}], 0x1) 20:02:27 executing program 4: set_mempolicy(0x1, &(0x7f0000000100)=0xfffffffffffffff9, 0x79) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000005a00)='cgroup2\x00', 0x0, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) 20:02:27 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1, 0x0, &(0x7f0000000040)) 20:02:27 executing program 1: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 20:02:27 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r3 = socket(0x400000000000010, 0x3, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r2, 0x0, 0xd, 0x0, 0x0) 20:02:27 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x11, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c0000001d00010000000000000000000a00100028"], 0x1c}}, 0x0) sendmmsg(r2, &(0x7f0000000180), 0xf1, 0x0) 20:02:27 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1, 0x0, &(0x7f0000000040)) 20:02:27 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x54041bc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() r2 = gettid() tkill(r2, 0x14) ptrace(0x4206, r1) ptrace$cont(0x20, r2, 0x0, 0x0) 20:02:27 executing program 2: creat(&(0x7f0000000000)='./bus\x00', 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x2de7, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) syz_io_uring_submit(r2, r3, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r1, 0x302, 0x0, 0x0, 0x0, 0x0) 20:02:27 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x11, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c0000001d00010000000000000000000a00100028"], 0x1c}}, 0x0) sendmmsg(r2, &(0x7f0000000180), 0xf1, 0x0) 20:02:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="290000001c00190f41f4cbace7f9a7df02000000ffe80001dd0000040d000300ea1100000005000000", 0x29}], 0x1) 20:02:27 executing program 1: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) [ 424.930785][ T25] kauditd_printk_skb: 51 callbacks suppressed [ 424.930795][ T25] audit: type=1326 audit(1623355347.870:2143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19917 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 20:02:27 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r3 = socket(0x400000000000010, 0x3, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r2, 0x0, 0xd, 0x0, 0x0) 20:02:28 executing program 2: creat(&(0x7f0000000000)='./bus\x00', 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x2de7, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) syz_io_uring_submit(r2, r3, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r1, 0x302, 0x0, 0x0, 0x0, 0x0) 20:02:28 executing program 1: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) [ 425.034851][ T25] audit: type=1326 audit(1623355347.900:2144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19917 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=326 compat=0 ip=0x4665d9 code=0x7ffc0000 20:02:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="290000001c00190f41f4cbace7f9a7df02000000ffe80001dd0000040d000300ea1100000005000000", 0x29}], 0x1) 20:02:28 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x11, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c0000001d00010000000000000000000a00100028"], 0x1c}}, 0x0) sendmmsg(r2, &(0x7f0000000180), 0xf1, 0x0) 20:02:28 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r3 = socket(0x400000000000010, 0x3, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r2, 0x0, 0xd, 0x0, 0x0) [ 425.062783][ T25] audit: type=1326 audit(1623355347.900:2145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19917 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 20:02:28 executing program 5: r0 = creat(&(0x7f00000015c0)='./file0\x00', 0x0) fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r1) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc422, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 425.144958][ T25] audit: type=1326 audit(1623355347.900:2146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19917 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 425.177257][ T25] audit: type=1326 audit(1623355347.900:2147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19917 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=334 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 425.205821][ T25] audit: type=1326 audit(1623355347.900:2148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19917 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 425.233392][ T25] audit: type=1326 audit(1623355347.900:2149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19917 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=157 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 425.257476][ T25] audit: type=1326 audit(1623355347.900:2150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19917 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 425.281973][ T25] audit: type=1326 audit(1623355347.900:2151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19917 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 425.306456][ T25] audit: type=1326 audit(1623355347.959:2152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19936 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 20:02:28 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x54041bc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() r2 = gettid() tkill(r2, 0x14) ptrace(0x4206, r1) ptrace$cont(0x20, r2, 0x0, 0x0) 20:02:28 executing program 2: creat(&(0x7f0000000000)='./bus\x00', 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x2de7, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) syz_io_uring_submit(r2, r3, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r1, 0x302, 0x0, 0x0, 0x0, 0x0) 20:02:28 executing program 1: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 20:02:28 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x11, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c0000001d00010000000000000000000a00100028"], 0x1c}}, 0x0) sendmmsg(r2, &(0x7f0000000180), 0xf1, 0x0) 20:02:28 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x30, &(0x7f0000001840)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 20:02:28 executing program 5: r0 = creat(&(0x7f00000015c0)='./file0\x00', 0x0) fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r1) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc422, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:02:28 executing program 3: r0 = syz_io_uring_setup(0x47a9, &(0x7f00000002c0), &(0x7f0000ffe000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f00000001c0)=0x0, &(0x7f0000000080)=0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000002700)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}, 0x0) io_uring_enter(r0, 0xbf, 0x0, 0x0, 0x0, 0x0) 20:02:28 executing program 2: creat(&(0x7f0000000000)='./bus\x00', 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x2de7, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) syz_io_uring_submit(r2, r3, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r1, 0x302, 0x0, 0x0, 0x0, 0x0) 20:02:28 executing program 1: r0 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@N\xff\x03\x00\x00\x00\x00\x00\x00\x04\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\xf2\aw\xa8\x91\xc5\xb1\xab\x1a\xd8a\xb6=\xee\x16\x9b\x8c\xa7k\n\x86\xc3.\xd5\x9a\xaa\xcd(ovjd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&#FX\xb1\xb6V\x843\b\xb2\xeblh\x99\xd3\xec\xa6\xf7\x91\x9c\x85\xbb\xc3T\xb7\x98\x11\x0f\xa7\x7f\xdf=\x96C\xc8\x84\xf3\xf9\x19\x83\xe31\x90\xd1w2\x12\xf1\xc7\xab)\x80E\xc9\x0f\xc8\aD\x93Xb-?0\x12\x8b\x99+\xec\xca\x9e\xf6\xb2\xcc@\xe6A\xaa\xae\x8a\xc8\x99\x81\x80\xe6\xbc\x1fB\x96\xf1x\xadj\xab\xc0\xf8\x7f&\x13\xf1\x96\x00\x8fS\x8d\xfd\xcad\x19\x03\x91L\x1e\xe9\xd7\x8b\xdd\x8b:\xd3\x97\xa3\x15\x8bH\xf3M\f\x1b4\xc3\xa0\xe6l\xde\xd0\xca*(\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbf>', 0x0) fcntl$setlease(r0, 0x400, 0x0) exit(0x0) fcntl$setown(r0, 0x8, 0x0) 20:02:28 executing program 5: r0 = creat(&(0x7f00000015c0)='./file0\x00', 0x0) fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r1) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc422, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:02:28 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x30, &(0x7f0000001840)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 20:02:28 executing program 5: r0 = creat(&(0x7f00000015c0)='./file0\x00', 0x0) fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r1) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc422, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:02:29 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x54041bc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() r2 = gettid() tkill(r2, 0x14) ptrace(0x4206, r1) ptrace$cont(0x20, r2, 0x0, 0x0) 20:02:29 executing program 3: r0 = syz_io_uring_setup(0x47a9, &(0x7f00000002c0), &(0x7f0000ffe000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f00000001c0)=0x0, &(0x7f0000000080)=0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000002700)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}, 0x0) io_uring_enter(r0, 0xbf, 0x0, 0x0, 0x0, 0x0) 20:02:29 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x7, 0x7ff) clone(0x16510c700, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x171) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00') set_mempolicy(0x1, 0x0, 0x0) r0 = inotify_init1(0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KDSETMODE(r1, 0x4b3a, 0x0) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f00000000c0)) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x4000400) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000180)={0x0, 0x7fffffff, 0xe2}) 20:02:29 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x30, &(0x7f0000001840)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 20:02:29 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000180)="ccb86bfd74707827f0a7", 0xa}], 0x3, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x120, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 20:02:29 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x30, &(0x7f0000001840)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 20:02:29 executing program 3: r0 = syz_io_uring_setup(0x47a9, &(0x7f00000002c0), &(0x7f0000ffe000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f00000001c0)=0x0, &(0x7f0000000080)=0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000002700)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}, 0x0) io_uring_enter(r0, 0xbf, 0x0, 0x0, 0x0, 0x0) 20:02:29 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x7, 0x7ff) clone(0x16510c700, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x171) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00') set_mempolicy(0x1, 0x0, 0x0) r0 = inotify_init1(0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KDSETMODE(r1, 0x4b3a, 0x0) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f00000000c0)) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x4000400) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000180)={0x0, 0x7fffffff, 0xe2}) 20:02:29 executing program 1: r0 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@N\xff\x03\x00\x00\x00\x00\x00\x00\x04\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\xf2\aw\xa8\x91\xc5\xb1\xab\x1a\xd8a\xb6=\xee\x16\x9b\x8c\xa7k\n\x86\xc3.\xd5\x9a\xaa\xcd(ovjd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&#FX\xb1\xb6V\x843\b\xb2\xeblh\x99\xd3\xec\xa6\xf7\x91\x9c\x85\xbb\xc3T\xb7\x98\x11\x0f\xa7\x7f\xdf=\x96C\xc8\x84\xf3\xf9\x19\x83\xe31\x90\xd1w2\x12\xf1\xc7\xab)\x80E\xc9\x0f\xc8\aD\x93Xb-?0\x12\x8b\x99+\xec\xca\x9e\xf6\xb2\xcc@\xe6A\xaa\xae\x8a\xc8\x99\x81\x80\xe6\xbc\x1fB\x96\xf1x\xadj\xab\xc0\xf8\x7f&\x13\xf1\x96\x00\x8fS\x8d\xfd\xcad\x19\x03\x91L\x1e\xe9\xd7\x8b\xdd\x8b:\xd3\x97\xa3\x15\x8bH\xf3M\f\x1b4\xc3\xa0\xe6l\xde\xd0\xca*(\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbf>', 0x0) fcntl$setlease(r0, 0x400, 0x0) exit(0x0) fcntl$setown(r0, 0x8, 0x0) 20:02:29 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x7, 0x7ff) clone(0x16510c700, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x171) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00') set_mempolicy(0x1, 0x0, 0x0) r0 = inotify_init1(0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KDSETMODE(r1, 0x4b3a, 0x0) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f00000000c0)) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x4000400) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000180)={0x0, 0x7fffffff, 0xe2}) 20:02:29 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000180)="ccb86bfd74707827f0a7", 0xa}], 0x3, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x120, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 20:02:29 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x2) io_setup(0x800, &(0x7f0000001440)) 20:02:30 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x54041bc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() r2 = gettid() tkill(r2, 0x14) ptrace(0x4206, r1) ptrace$cont(0x20, r2, 0x0, 0x0) 20:02:30 executing program 3: r0 = syz_io_uring_setup(0x47a9, &(0x7f00000002c0), &(0x7f0000ffe000/0x2000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f00000001c0)=0x0, &(0x7f0000000080)=0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000002700)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}, 0x0) io_uring_enter(r0, 0xbf, 0x0, 0x0, 0x0, 0x0) 20:02:30 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x7, 0x7ff) clone(0x16510c700, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x171) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00') set_mempolicy(0x1, 0x0, 0x0) r0 = inotify_init1(0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KDSETMODE(r1, 0x4b3a, 0x0) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f00000000c0)) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x4000400) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000180)={0x0, 0x7fffffff, 0xe2}) 20:02:30 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000180)="ccb86bfd74707827f0a7", 0xa}], 0x3, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x120, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 20:02:30 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x2) io_setup(0x800, &(0x7f0000001440)) 20:02:30 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000180)="ccb86bfd74707827f0a7", 0xa}], 0x3, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x120, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 20:02:30 executing program 3: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x2) io_setup(0x800, &(0x7f0000001440)) 20:02:30 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) openat2(0xffffffffffffff9c, 0x0, 0x0, 0x0) 20:02:30 executing program 1: r0 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@N\xff\x03\x00\x00\x00\x00\x00\x00\x04\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\xf2\aw\xa8\x91\xc5\xb1\xab\x1a\xd8a\xb6=\xee\x16\x9b\x8c\xa7k\n\x86\xc3.\xd5\x9a\xaa\xcd(ovjd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&#FX\xb1\xb6V\x843\b\xb2\xeblh\x99\xd3\xec\xa6\xf7\x91\x9c\x85\xbb\xc3T\xb7\x98\x11\x0f\xa7\x7f\xdf=\x96C\xc8\x84\xf3\xf9\x19\x83\xe31\x90\xd1w2\x12\xf1\xc7\xab)\x80E\xc9\x0f\xc8\aD\x93Xb-?0\x12\x8b\x99+\xec\xca\x9e\xf6\xb2\xcc@\xe6A\xaa\xae\x8a\xc8\x99\x81\x80\xe6\xbc\x1fB\x96\xf1x\xadj\xab\xc0\xf8\x7f&\x13\xf1\x96\x00\x8fS\x8d\xfd\xcad\x19\x03\x91L\x1e\xe9\xd7\x8b\xdd\x8b:\xd3\x97\xa3\x15\x8bH\xf3M\f\x1b4\xc3\xa0\xe6l\xde\xd0\xca*(\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbf>', 0x0) fcntl$setlease(r0, 0x400, 0x0) exit(0x0) fcntl$setown(r0, 0x8, 0x0) 20:02:30 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) openat2(0xffffffffffffff9c, 0x0, 0x0, 0x0) 20:02:30 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x2) io_setup(0x800, &(0x7f0000001440)) 20:02:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}, 0x1c) 20:02:31 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x2) io_setup(0x800, &(0x7f0000001440)) 20:02:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}, 0x1c) 20:02:31 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) openat2(0xffffffffffffff9c, 0x0, 0x0, 0x0) 20:02:31 executing program 3: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x2) io_setup(0x800, &(0x7f0000001440)) 20:02:31 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x6, 0x4d032, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 20:02:31 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) openat2(0xffffffffffffff9c, 0x0, 0x0, 0x0) 20:02:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}, 0x1c) 20:02:31 executing program 2: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080), 0x48) 20:02:31 executing program 1: r0 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@N\xff\x03\x00\x00\x00\x00\x00\x00\x04\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\xf2\aw\xa8\x91\xc5\xb1\xab\x1a\xd8a\xb6=\xee\x16\x9b\x8c\xa7k\n\x86\xc3.\xd5\x9a\xaa\xcd(ovjd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&#FX\xb1\xb6V\x843\b\xb2\xeblh\x99\xd3\xec\xa6\xf7\x91\x9c\x85\xbb\xc3T\xb7\x98\x11\x0f\xa7\x7f\xdf=\x96C\xc8\x84\xf3\xf9\x19\x83\xe31\x90\xd1w2\x12\xf1\xc7\xab)\x80E\xc9\x0f\xc8\aD\x93Xb-?0\x12\x8b\x99+\xec\xca\x9e\xf6\xb2\xcc@\xe6A\xaa\xae\x8a\xc8\x99\x81\x80\xe6\xbc\x1fB\x96\xf1x\xadj\xab\xc0\xf8\x7f&\x13\xf1\x96\x00\x8fS\x8d\xfd\xcad\x19\x03\x91L\x1e\xe9\xd7\x8b\xdd\x8b:\xd3\x97\xa3\x15\x8bH\xf3M\f\x1b4\xc3\xa0\xe6l\xde\xd0\xca*(\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbf>', 0x0) fcntl$setlease(r0, 0x400, 0x0) exit(0x0) fcntl$setown(r0, 0x8, 0x0) 20:02:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) ftruncate(r2, 0x12081ff) pwritev2(r2, &(0x7f0000000180)=[{&(0x7f00000002c0)='Y', 0x1}], 0x1, 0x0, 0x0, 0x12) r3 = open(&(0x7f0000000040)='./file0\x00', 0x14b042, 0x0) write$binfmt_elf32(r3, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000140)={0x0, r1}) 20:02:31 executing program 3: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x2) io_setup(0x800, &(0x7f0000001440)) 20:02:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}, 0x1c) 20:02:31 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x6, 0x4d032, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 20:02:31 executing program 2: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080), 0x48) 20:02:31 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x6, 0x4d032, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 20:02:31 executing program 5: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000005e001f3814584707f9f4ffffff0000000200000022f80000", 0x37) 20:02:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) ftruncate(r2, 0x12081ff) pwritev2(r2, &(0x7f0000000180)=[{&(0x7f00000002c0)='Y', 0x1}], 0x1, 0x0, 0x0, 0x12) r3 = open(&(0x7f0000000040)='./file0\x00', 0x14b042, 0x0) write$binfmt_elf32(r3, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000140)={0x0, r1}) 20:02:31 executing program 2: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080), 0x48) 20:02:31 executing program 5: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000005e001f3814584707f9f4ffffff0000000200000022f80000", 0x37) 20:02:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) ftruncate(r2, 0x12081ff) pwritev2(r2, &(0x7f0000000180)=[{&(0x7f00000002c0)='Y', 0x1}], 0x1, 0x0, 0x0, 0x12) r3 = open(&(0x7f0000000040)='./file0\x00', 0x14b042, 0x0) write$binfmt_elf32(r3, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000140)={0x0, r1}) 20:02:32 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) ftruncate(r2, 0x12081ff) pwritev2(r2, &(0x7f0000000180)=[{&(0x7f00000002c0)='Y', 0x1}], 0x1, 0x0, 0x0, 0x12) r3 = open(&(0x7f0000000040)='./file0\x00', 0x14b042, 0x0) write$binfmt_elf32(r3, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000140)={0x0, r1}) 20:02:32 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_TEE={0x21, 0xa, 0x0, @fd=r0, 0x0, 0x0, 0x0, 0x1099c3b975e29e1b}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 20:02:32 executing program 5: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000005e001f3814584707f9f4ffffff0000000200000022f80000", 0x37) 20:02:32 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x6, 0x4d032, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 20:02:32 executing program 2: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080), 0x48) 20:02:32 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\xafa\xac', 0x3) write$binfmt_misc(r3, &(0x7f0000000180)=ANY=[], 0x8) sendfile(r2, r3, &(0x7f00000001c0), 0xffff) fcntl$addseals(r3, 0x409, 0x8) fallocate(r3, 0x3, 0x2, 0x81) dup3(r1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r4, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) 20:02:32 executing program 2: set_mempolicy(0x1, &(0x7f0000000100)=0x1, 0x7) set_mempolicy(0x4000, &(0x7f0000000000), 0x0) set_mempolicy(0x8000, &(0x7f0000000080)=0x7fffffff, 0x2) r0 = syz_open_dev$vcsa(&(0x7f00000000c0), 0x5, 0x0) ppoll(&(0x7f0000000040)=[{r0, 0x2500}], 0x1, 0x0, 0x0, 0x0) r1 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendto$packet(r1, 0x0, 0x0, 0x4810, &(0x7f0000000180)={0x11, 0x0, r2}, 0x14) r3 = socket$packet(0x11, 0x2, 0x300) r4 = socket(0x11, 0x2, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendto$packet(r3, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xa}}, 0x14) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000340)={&(0x7f00000005c0)=ANY=[@ANYBLOB="f400000034b69da864439e4b7fee9c6b4f9ee0f220451cc283fbd83f3d5ba0462f23be5682b58cd7a259fcb207f2384dbd72adfc9f23da0bf88cd367b85da646413d9e8482788f91f9d9d432dce2fc86bbd5d83be7a95c249bb11d7080dbb81ee4c31934c7c53ed9a46ecea2b1433abecf84351e8433f73091a43849e7ced0aa38c2a015f17ec0ebb4622074253156126d46b2b482618a833f80d11dbc9cf55dcf4013aed7358ee25fe6748597dbe6389b879866185e0a8f252a671a9478262f092b89a2c0", @ANYRES16=0x0, @ANYBLOB="00022cbd7000ffdbdf25070000000c00018008000300010000001400018008000100", @ANYRES32=0x0, @ANYBLOB="00040000", @ANYRES32=0x0, @ANYRESHEX=r4, @ANYRES32=0x0, @ANYBLOB="1400020069705f7674693000000000000000000004000180840001801400020073797a6b616c6c65723000000000000008000300050000001400020076657468305f746f5f626f6e6400000014000200766574683000000000000000000000001400020068737230000000000000000000000000080003000200000008000300020000000800030003000000080003000200000008000100", @ANYRES32=r5, @ANYRES16=r4], 0xf4}, 0x1, 0x0, 0x0, 0x1}, 0x2000c004) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0) r7 = ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r7) 20:02:32 executing program 5: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000005e001f3814584707f9f4ffffff0000000200000022f80000", 0x37) 20:02:32 executing program 0: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/238, 0xee) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000200)={{0xb1}, 'port0\x00'}) tkill(r0, 0xb) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000180)) 20:02:32 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_TEE={0x21, 0xa, 0x0, @fd=r0, 0x0, 0x0, 0x0, 0x1099c3b975e29e1b}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 20:02:32 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') write$cgroup_int(r0, &(0x7f0000000040)=0x7fff, 0x12) 20:02:32 executing program 5: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x5) syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') 20:02:32 executing program 2: set_mempolicy(0x1, &(0x7f0000000100)=0x1, 0x7) set_mempolicy(0x4000, &(0x7f0000000000), 0x0) set_mempolicy(0x8000, &(0x7f0000000080)=0x7fffffff, 0x2) r0 = syz_open_dev$vcsa(&(0x7f00000000c0), 0x5, 0x0) ppoll(&(0x7f0000000040)=[{r0, 0x2500}], 0x1, 0x0, 0x0, 0x0) r1 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendto$packet(r1, 0x0, 0x0, 0x4810, &(0x7f0000000180)={0x11, 0x0, r2}, 0x14) r3 = socket$packet(0x11, 0x2, 0x300) r4 = socket(0x11, 0x2, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendto$packet(r3, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xa}}, 0x14) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000340)={&(0x7f00000005c0)=ANY=[@ANYBLOB="f400000034b69da864439e4b7fee9c6b4f9ee0f220451cc283fbd83f3d5ba0462f23be5682b58cd7a259fcb207f2384dbd72adfc9f23da0bf88cd367b85da646413d9e8482788f91f9d9d432dce2fc86bbd5d83be7a95c249bb11d7080dbb81ee4c31934c7c53ed9a46ecea2b1433abecf84351e8433f73091a43849e7ced0aa38c2a015f17ec0ebb4622074253156126d46b2b482618a833f80d11dbc9cf55dcf4013aed7358ee25fe6748597dbe6389b879866185e0a8f252a671a9478262f092b89a2c0", @ANYRES16=0x0, @ANYBLOB="00022cbd7000ffdbdf25070000000c00018008000300010000001400018008000100", @ANYRES32=0x0, @ANYBLOB="00040000", @ANYRES32=0x0, @ANYRESHEX=r4, @ANYRES32=0x0, @ANYBLOB="1400020069705f7674693000000000000000000004000180840001801400020073797a6b616c6c65723000000000000008000300050000001400020076657468305f746f5f626f6e6400000014000200766574683000000000000000000000001400020068737230000000000000000000000000080003000200000008000300020000000800030003000000080003000200000008000100", @ANYRES32=r5, @ANYRES16=r4], 0xf4}, 0x1, 0x0, 0x0, 0x1}, 0x2000c004) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0) r7 = ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r7) 20:02:32 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_TEE={0x21, 0xa, 0x0, @fd=r0, 0x0, 0x0, 0x0, 0x1099c3b975e29e1b}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 20:02:32 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') write$cgroup_int(r0, &(0x7f0000000040)=0x7fff, 0x12) 20:02:32 executing program 5: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x5) syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') 20:02:32 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_TEE={0x21, 0xa, 0x0, @fd=r0, 0x0, 0x0, 0x0, 0x1099c3b975e29e1b}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 20:02:32 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\xafa\xac', 0x3) write$binfmt_misc(r3, &(0x7f0000000180)=ANY=[], 0x8) sendfile(r2, r3, &(0x7f00000001c0), 0xffff) fcntl$addseals(r3, 0x409, 0x8) fallocate(r3, 0x3, 0x2, 0x81) dup3(r1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r4, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) 20:02:32 executing program 2: set_mempolicy(0x1, &(0x7f0000000100)=0x1, 0x7) set_mempolicy(0x4000, &(0x7f0000000000), 0x0) set_mempolicy(0x8000, &(0x7f0000000080)=0x7fffffff, 0x2) r0 = syz_open_dev$vcsa(&(0x7f00000000c0), 0x5, 0x0) ppoll(&(0x7f0000000040)=[{r0, 0x2500}], 0x1, 0x0, 0x0, 0x0) r1 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendto$packet(r1, 0x0, 0x0, 0x4810, &(0x7f0000000180)={0x11, 0x0, r2}, 0x14) r3 = socket$packet(0x11, 0x2, 0x300) r4 = socket(0x11, 0x2, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendto$packet(r3, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xa}}, 0x14) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000340)={&(0x7f00000005c0)=ANY=[@ANYBLOB="f400000034b69da864439e4b7fee9c6b4f9ee0f220451cc283fbd83f3d5ba0462f23be5682b58cd7a259fcb207f2384dbd72adfc9f23da0bf88cd367b85da646413d9e8482788f91f9d9d432dce2fc86bbd5d83be7a95c249bb11d7080dbb81ee4c31934c7c53ed9a46ecea2b1433abecf84351e8433f73091a43849e7ced0aa38c2a015f17ec0ebb4622074253156126d46b2b482618a833f80d11dbc9cf55dcf4013aed7358ee25fe6748597dbe6389b879866185e0a8f252a671a9478262f092b89a2c0", @ANYRES16=0x0, @ANYBLOB="00022cbd7000ffdbdf25070000000c00018008000300010000001400018008000100", @ANYRES32=0x0, @ANYBLOB="00040000", @ANYRES32=0x0, @ANYRESHEX=r4, @ANYRES32=0x0, @ANYBLOB="1400020069705f7674693000000000000000000004000180840001801400020073797a6b616c6c65723000000000000008000300050000001400020076657468305f746f5f626f6e6400000014000200766574683000000000000000000000001400020068737230000000000000000000000000080003000200000008000300020000000800030003000000080003000200000008000100", @ANYRES32=r5, @ANYRES16=r4], 0xf4}, 0x1, 0x0, 0x0, 0x1}, 0x2000c004) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0) r7 = ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r7) 20:02:32 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') write$cgroup_int(r0, &(0x7f0000000040)=0x7fff, 0x12) 20:02:32 executing program 0: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/238, 0xee) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000200)={{0xb1}, 'port0\x00'}) tkill(r0, 0xb) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000180)) 20:02:32 executing program 5: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x5) syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') 20:02:32 executing program 3: set_mempolicy(0x1, &(0x7f0000000100)=0x1, 0x7) set_mempolicy(0x4000, &(0x7f0000000000), 0x0) set_mempolicy(0x8000, &(0x7f0000000080)=0x7fffffff, 0x2) r0 = syz_open_dev$vcsa(&(0x7f00000000c0), 0x5, 0x0) ppoll(&(0x7f0000000040)=[{r0, 0x2500}], 0x1, 0x0, 0x0, 0x0) r1 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendto$packet(r1, 0x0, 0x0, 0x4810, &(0x7f0000000180)={0x11, 0x0, r2}, 0x14) r3 = socket$packet(0x11, 0x2, 0x300) r4 = socket(0x11, 0x2, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendto$packet(r3, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xa}}, 0x14) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000340)={&(0x7f00000005c0)=ANY=[@ANYBLOB="f400000034b69da864439e4b7fee9c6b4f9ee0f220451cc283fbd83f3d5ba0462f23be5682b58cd7a259fcb207f2384dbd72adfc9f23da0bf88cd367b85da646413d9e8482788f91f9d9d432dce2fc86bbd5d83be7a95c249bb11d7080dbb81ee4c31934c7c53ed9a46ecea2b1433abecf84351e8433f73091a43849e7ced0aa38c2a015f17ec0ebb4622074253156126d46b2b482618a833f80d11dbc9cf55dcf4013aed7358ee25fe6748597dbe6389b879866185e0a8f252a671a9478262f092b89a2c0", @ANYRES16=0x0, @ANYBLOB="00022cbd7000ffdbdf25070000000c00018008000300010000001400018008000100", @ANYRES32=0x0, @ANYBLOB="00040000", @ANYRES32=0x0, @ANYRESHEX=r4, @ANYRES32=0x0, @ANYBLOB="1400020069705f7674693000000000000000000004000180840001801400020073797a6b616c6c65723000000000000008000300050000001400020076657468305f746f5f626f6e6400000014000200766574683000000000000000000000001400020068737230000000000000000000000000080003000200000008000300020000000800030003000000080003000200000008000100", @ANYRES32=r5, @ANYRES16=r4], 0xf4}, 0x1, 0x0, 0x0, 0x1}, 0x2000c004) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0) r7 = ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r7) 20:02:32 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') write$cgroup_int(r0, &(0x7f0000000040)=0x7fff, 0x12) 20:02:32 executing program 2: set_mempolicy(0x1, &(0x7f0000000100)=0x1, 0x7) set_mempolicy(0x4000, &(0x7f0000000000), 0x0) set_mempolicy(0x8000, &(0x7f0000000080)=0x7fffffff, 0x2) r0 = syz_open_dev$vcsa(&(0x7f00000000c0), 0x5, 0x0) ppoll(&(0x7f0000000040)=[{r0, 0x2500}], 0x1, 0x0, 0x0, 0x0) r1 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendto$packet(r1, 0x0, 0x0, 0x4810, &(0x7f0000000180)={0x11, 0x0, r2}, 0x14) r3 = socket$packet(0x11, 0x2, 0x300) r4 = socket(0x11, 0x2, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendto$packet(r3, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xa}}, 0x14) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000340)={&(0x7f00000005c0)=ANY=[@ANYBLOB="f400000034b69da864439e4b7fee9c6b4f9ee0f220451cc283fbd83f3d5ba0462f23be5682b58cd7a259fcb207f2384dbd72adfc9f23da0bf88cd367b85da646413d9e8482788f91f9d9d432dce2fc86bbd5d83be7a95c249bb11d7080dbb81ee4c31934c7c53ed9a46ecea2b1433abecf84351e8433f73091a43849e7ced0aa38c2a015f17ec0ebb4622074253156126d46b2b482618a833f80d11dbc9cf55dcf4013aed7358ee25fe6748597dbe6389b879866185e0a8f252a671a9478262f092b89a2c0", @ANYRES16=0x0, @ANYBLOB="00022cbd7000ffdbdf25070000000c00018008000300010000001400018008000100", @ANYRES32=0x0, @ANYBLOB="00040000", @ANYRES32=0x0, @ANYRESHEX=r4, @ANYRES32=0x0, @ANYBLOB="1400020069705f7674693000000000000000000004000180840001801400020073797a6b616c6c65723000000000000008000300050000001400020076657468305f746f5f626f6e6400000014000200766574683000000000000000000000001400020068737230000000000000000000000000080003000200000008000300020000000800030003000000080003000200000008000100", @ANYRES32=r5, @ANYRES16=r4], 0xf4}, 0x1, 0x0, 0x0, 0x1}, 0x2000c004) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0) r7 = ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r7) 20:02:32 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\xafa\xac', 0x3) write$binfmt_misc(r3, &(0x7f0000000180)=ANY=[], 0x8) sendfile(r2, r3, &(0x7f00000001c0), 0xffff) fcntl$addseals(r3, 0x409, 0x8) fallocate(r3, 0x3, 0x2, 0x81) dup3(r1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r4, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) 20:02:32 executing program 5: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x5) syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') 20:02:32 executing program 3: set_mempolicy(0x1, &(0x7f0000000100)=0x1, 0x7) set_mempolicy(0x4000, &(0x7f0000000000), 0x0) set_mempolicy(0x8000, &(0x7f0000000080)=0x7fffffff, 0x2) r0 = syz_open_dev$vcsa(&(0x7f00000000c0), 0x5, 0x0) ppoll(&(0x7f0000000040)=[{r0, 0x2500}], 0x1, 0x0, 0x0, 0x0) r1 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendto$packet(r1, 0x0, 0x0, 0x4810, &(0x7f0000000180)={0x11, 0x0, r2}, 0x14) r3 = socket$packet(0x11, 0x2, 0x300) r4 = socket(0x11, 0x2, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendto$packet(r3, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xa}}, 0x14) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000340)={&(0x7f00000005c0)=ANY=[@ANYBLOB="f400000034b69da864439e4b7fee9c6b4f9ee0f220451cc283fbd83f3d5ba0462f23be5682b58cd7a259fcb207f2384dbd72adfc9f23da0bf88cd367b85da646413d9e8482788f91f9d9d432dce2fc86bbd5d83be7a95c249bb11d7080dbb81ee4c31934c7c53ed9a46ecea2b1433abecf84351e8433f73091a43849e7ced0aa38c2a015f17ec0ebb4622074253156126d46b2b482618a833f80d11dbc9cf55dcf4013aed7358ee25fe6748597dbe6389b879866185e0a8f252a671a9478262f092b89a2c0", @ANYRES16=0x0, @ANYBLOB="00022cbd7000ffdbdf25070000000c00018008000300010000001400018008000100", @ANYRES32=0x0, @ANYBLOB="00040000", @ANYRES32=0x0, @ANYRESHEX=r4, @ANYRES32=0x0, @ANYBLOB="1400020069705f7674693000000000000000000004000180840001801400020073797a6b616c6c65723000000000000008000300050000001400020076657468305f746f5f626f6e6400000014000200766574683000000000000000000000001400020068737230000000000000000000000000080003000200000008000300020000000800030003000000080003000200000008000100", @ANYRES32=r5, @ANYRES16=r4], 0xf4}, 0x1, 0x0, 0x0, 0x1}, 0x2000c004) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0) r7 = ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r7) 20:02:32 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) request_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0xfffffffffffffffb) 20:02:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000c80), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_REG(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}, @NL80211_ATTR_REG_RULES={0x10, 0x22, 0x0, 0x1, [{0x4}, {0x4}, {0x4}]}]}, 0x2c}}, 0x0) 20:02:32 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f00000001c0)=0xee, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0x2, 0x0, 0x0, @empty}, 0x1c) 20:02:32 executing program 3: set_mempolicy(0x1, &(0x7f0000000100)=0x1, 0x7) set_mempolicy(0x4000, &(0x7f0000000000), 0x0) set_mempolicy(0x8000, &(0x7f0000000080)=0x7fffffff, 0x2) r0 = syz_open_dev$vcsa(&(0x7f00000000c0), 0x5, 0x0) ppoll(&(0x7f0000000040)=[{r0, 0x2500}], 0x1, 0x0, 0x0, 0x0) r1 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendto$packet(r1, 0x0, 0x0, 0x4810, &(0x7f0000000180)={0x11, 0x0, r2}, 0x14) r3 = socket$packet(0x11, 0x2, 0x300) r4 = socket(0x11, 0x2, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendto$packet(r3, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xa}}, 0x14) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000340)={&(0x7f00000005c0)=ANY=[@ANYBLOB="f400000034b69da864439e4b7fee9c6b4f9ee0f220451cc283fbd83f3d5ba0462f23be5682b58cd7a259fcb207f2384dbd72adfc9f23da0bf88cd367b85da646413d9e8482788f91f9d9d432dce2fc86bbd5d83be7a95c249bb11d7080dbb81ee4c31934c7c53ed9a46ecea2b1433abecf84351e8433f73091a43849e7ced0aa38c2a015f17ec0ebb4622074253156126d46b2b482618a833f80d11dbc9cf55dcf4013aed7358ee25fe6748597dbe6389b879866185e0a8f252a671a9478262f092b89a2c0", @ANYRES16=0x0, @ANYBLOB="00022cbd7000ffdbdf25070000000c00018008000300010000001400018008000100", @ANYRES32=0x0, @ANYBLOB="00040000", @ANYRES32=0x0, @ANYRESHEX=r4, @ANYRES32=0x0, @ANYBLOB="1400020069705f7674693000000000000000000004000180840001801400020073797a6b616c6c65723000000000000008000300050000001400020076657468305f746f5f626f6e6400000014000200766574683000000000000000000000001400020068737230000000000000000000000000080003000200000008000300020000000800030003000000080003000200000008000100", @ANYRES32=r5, @ANYRES16=r4], 0xf4}, 0x1, 0x0, 0x0, 0x1}, 0x2000c004) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0) r7 = ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r7) 20:02:33 executing program 0: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/238, 0xee) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000200)={{0xb1}, 'port0\x00'}) tkill(r0, 0xb) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000180)) 20:02:33 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) request_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0xfffffffffffffffb) 20:02:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000c80), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_REG(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}, @NL80211_ATTR_REG_RULES={0x10, 0x22, 0x0, 0x1, [{0x4}, {0x4}, {0x4}]}]}, 0x2c}}, 0x0) 20:02:33 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sysvipc/sem\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000080)=""/27, 0x1b, 0x75) 20:02:33 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f00000001c0)=0xee, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0x2, 0x0, 0x0, @empty}, 0x1c) 20:02:33 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\xafa\xac', 0x3) write$binfmt_misc(r3, &(0x7f0000000180)=ANY=[], 0x8) sendfile(r2, r3, &(0x7f00000001c0), 0xffff) fcntl$addseals(r3, 0x409, 0x8) fallocate(r3, 0x3, 0x2, 0x81) dup3(r1, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r4, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) 20:02:33 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sysvipc/sem\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000080)=""/27, 0x1b, 0x75) 20:02:33 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) request_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0xfffffffffffffffb) 20:02:33 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f00000001c0)=0xee, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0x2, 0x0, 0x0, @empty}, 0x1c) 20:02:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000c80), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_REG(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}, @NL80211_ATTR_REG_RULES={0x10, 0x22, 0x0, 0x1, [{0x4}, {0x4}, {0x4}]}]}, 0x2c}}, 0x0) 20:02:33 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f00000001c0)=0xee, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0x2, 0x0, 0x0, @empty}, 0x1c) 20:02:33 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) request_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0xfffffffffffffffb) 20:02:33 executing program 0: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/238, 0xee) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000200)={{0xb1}, 'port0\x00'}) tkill(r0, 0xb) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000180)) 20:02:33 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sysvipc/sem\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000080)=""/27, 0x1b, 0x75) 20:02:33 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$inet_int(r0, 0x0, 0x19, &(0x7f0000000000)=0x85f, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) recvmmsg(r0, &(0x7f0000001b00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 20:02:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000c80), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_REG(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}, @NL80211_ATTR_REG_RULES={0x10, 0x22, 0x0, 0x1, [{0x4}, {0x4}, {0x4}]}]}, 0x2c}}, 0x0) 20:02:33 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x04\x00\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xa1\x9c\x86x\x1c\"p^\xc1\x0f\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\xb8}8', 0x0) fallocate(r0, 0x0, 0x0, 0x40) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x12, r0, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 20:02:33 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$inet_int(r0, 0x0, 0x19, &(0x7f0000000000)=0x85f, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) recvmmsg(r0, &(0x7f0000001b00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 20:02:33 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000000040), &(0x7f0000000080)=0x10) 20:02:33 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sysvipc/sem\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000080)=""/27, 0x1b, 0x75) 20:02:33 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x04\x00\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xa1\x9c\x86x\x1c\"p^\xc1\x0f\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\xb8}8', 0x0) fallocate(r0, 0x0, 0x0, 0x40) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x12, r0, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 20:02:33 executing program 1: sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9409b0d1b849ac00200a57802", 0x15, 0x0, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="4100000013000100000000000001000007"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a73, 0x4004800, 0x0, 0xffffff7c) 20:02:33 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$inet_int(r0, 0x0, 0x19, &(0x7f0000000000)=0x85f, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) recvmmsg(r0, &(0x7f0000001b00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 20:02:33 executing program 3: syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) select(0x40, &(0x7f0000000100), 0x0, &(0x7f0000000180)={0x9}, &(0x7f00000001c0)={0x0, 0xea60}) 20:02:33 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$inet_int(r0, 0x0, 0x19, &(0x7f0000000000)=0x85f, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) recvmmsg(r0, &(0x7f0000001b00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 20:02:33 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x04\x00\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xa1\x9c\x86x\x1c\"p^\xc1\x0f\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\xb8}8', 0x0) fallocate(r0, 0x0, 0x0, 0x40) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x12, r0, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 20:02:33 executing program 1: sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9409b0d1b849ac00200a57802", 0x15, 0x0, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="4100000013000100000000000001000007"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a73, 0x4004800, 0x0, 0xffffff7c) 20:02:33 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000000040), &(0x7f0000000080)=0x10) 20:02:33 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@ipv4={'\x00', '\xff\xff', @empty}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@dev, 0x0, 0x33}, 0x0, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0xe8) sendmmsg(r0, &(0x7f0000000200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 20:02:33 executing program 3: syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) select(0x40, &(0x7f0000000100), 0x0, &(0x7f0000000180)={0x9}, &(0x7f00000001c0)={0x0, 0xea60}) 20:02:33 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x04\x00\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xa1\x9c\x86x\x1c\"p^\xc1\x0f\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\xb8}8', 0x0) fallocate(r0, 0x0, 0x0, 0x40) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x12, r0, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 20:02:33 executing program 1: sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9409b0d1b849ac00200a57802", 0x15, 0x0, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="4100000013000100000000000001000007"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a73, 0x4004800, 0x0, 0xffffff7c) 20:02:33 executing program 1: sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9409b0d1b849ac00200a57802", 0x15, 0x0, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="4100000013000100000000000001000007"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a73, 0x4004800, 0x0, 0xffffff7c) 20:02:33 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="66530700ae897094d2f055de8098ab5bfbe42829a773c0c9605aa0bba5fd63343239d4a279d31a0c5f0386191c7aee3115ef0441c40671bec467d4182e6eb56585656007a1062c4b64862cff00b01e1855c534b65be0eedd05848f5ecb0c086e8b84da09eeb02836143c8e7ecc8b1e02349a9842fa34c477e1870cac150039040657f953024d6d4ba601ab", 0x8b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 20:02:33 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000000040), &(0x7f0000000080)=0x10) 20:02:33 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f07ff050c100800080012000a000000140000001a00ffffba16a0aa1c0900000a000000", 0x38}], 0x1}, 0x0) 20:02:33 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@ipv4={'\x00', '\xff\xff', @empty}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@dev, 0x0, 0x33}, 0x0, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0xe8) sendmmsg(r0, &(0x7f0000000200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 20:02:33 executing program 1: r0 = syz_io_uring_setup(0x2de1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f00003a1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0xd0f8, 0x0, 0x0, 0xffffffe1}, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) 20:02:33 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000000040), &(0x7f0000000080)=0x10) 20:02:33 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f07ff050c100800080012000a000000140000001a00ffffba16a0aa1c0900000a000000", 0x38}], 0x1}, 0x0) 20:02:33 executing program 3: syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) select(0x40, &(0x7f0000000100), 0x0, &(0x7f0000000180)={0x9}, &(0x7f00000001c0)={0x0, 0xea60}) 20:02:33 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f07ff050c100800080012000a000000140000001a00ffffba16a0aa1c0900000a000000", 0x38}], 0x1}, 0x0) 20:02:33 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="66530700ae897094d2f055de8098ab5bfbe42829a773c0c9605aa0bba5fd63343239d4a279d31a0c5f0386191c7aee3115ef0441c40671bec467d4182e6eb56585656007a1062c4b64862cff00b01e1855c534b65be0eedd05848f5ecb0c086e8b84da09eeb02836143c8e7ecc8b1e02349a9842fa34c477e1870cac150039040657f953024d6d4ba601ab", 0x8b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 20:02:33 executing program 2: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 20:02:33 executing program 1: r0 = syz_io_uring_setup(0x2de1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f00003a1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0xd0f8, 0x0, 0x0, 0xffffffe1}, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) 20:02:33 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@ipv4={'\x00', '\xff\xff', @empty}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@dev, 0x0, 0x33}, 0x0, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0xe8) sendmmsg(r0, &(0x7f0000000200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 20:02:33 executing program 1: r0 = syz_io_uring_setup(0x2de1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f00003a1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0xd0f8, 0x0, 0x0, 0xffffffe1}, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) 20:02:33 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f07ff050c100800080012000a000000140000001a00ffffba16a0aa1c0900000a000000", 0x38}], 0x1}, 0x0) 20:02:33 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="66530700ae897094d2f055de8098ab5bfbe42829a773c0c9605aa0bba5fd63343239d4a279d31a0c5f0386191c7aee3115ef0441c40671bec467d4182e6eb56585656007a1062c4b64862cff00b01e1855c534b65be0eedd05848f5ecb0c086e8b84da09eeb02836143c8e7ecc8b1e02349a9842fa34c477e1870cac150039040657f953024d6d4ba601ab", 0x8b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 20:02:33 executing program 3: syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) select(0x40, &(0x7f0000000100), 0x0, &(0x7f0000000180)={0x9}, &(0x7f00000001c0)={0x0, 0xea60}) 20:02:33 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@ipv4={'\x00', '\xff\xff', @empty}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@dev, 0x0, 0x33}, 0x0, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0xe8) sendmmsg(r0, &(0x7f0000000200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 20:02:33 executing program 1: r0 = syz_io_uring_setup(0x2de1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f00003a1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0xd0f8, 0x0, 0x0, 0xffffffe1}, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) 20:02:33 executing program 5: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmmsg(r0, &(0x7f0000003600)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000780), 0x2f3}}], 0x400000000000316, 0x0) 20:02:33 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)=@newpolicy={0xfc, 0x13, 0xd5b338019eeacfa5, 0x0, 0x0, {{@in=@multicast1, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee01}}, [@tmpl={0x44, 0x5, [{{@in6=@private0}, 0x3, @in6=@remote, 0x0, 0x1}]}]}, 0xfc}}, 0x0) 20:02:33 executing program 1: r0 = socket(0x10, 0x2, 0x0) sendmsg$NL80211_CMD_UPDATE_CONNECT_PARAMS(r0, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001540)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0x68}}}, [@NL80211_ATTR_IE={0x181, 0x2a, [@challenge={0x10, 0x1}, @peer_mgmt={0x75, 0x8, {0x0, 0x0, @val, @val, @void}}, @tim={0x5, 0x7d, {0x0, 0x0, 0x0, "711c07d5bd52573ee6b04bcad9f6c34986262382bace1ec21f1f54f1c89b26620819036de82504e66b8bc127ad664718510284ba5e68e4305d57281f18dc312756dc5b07147e63a555f0b124f25c024cbef7afeec7505ec8cc5e80c1422171244cac499ffa1f243e129572bba64d6894dc9ed444606084327371"}}, @tim={0x5, 0xef, {0x0, 0x0, 0x0, "06ac6bf451237c21d7b6d67b1dbff238f1031d68d1d918469989441504fb80e831face9649ce31c33ea96a61793767c138d79cc297e34ac8b7351d2974b4d7967a06f8ae31d93c32dfebfc319a2ac40f0388dc4e953a555bcafc3baabad009935aa561591d4dfbee69ade0a25eb603a41ffa387a53cd3514fa31d4b257a6c0b139019077d424ef16db80b1db6ba299c860b78c852609dd3a8efeb11d3f0d538d5f4cd2a6b8699c22aec72600a21e7549a5ad10a69ac7aadd8f16e63f518e6e002e381f5eb2f53b068d193024072389f051dc76f088838a94c18e82a35ed6a0a6c32cc371c88211bd5c283c46"}}]}, @NL80211_ATTR_IE={0x29, 0x2a, [@channel_switch={0x25, 0x3}, @ext_channel_switch={0x3c, 0x4}, @peer_mgmt={0x75, 0x18, {0x0, 0x0, @val, @val, @val="2dd4fb30d76a23ce1615baef4f0e9d36"}}]}, @fils_params=[@NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6}, @NL80211_ATTR_FILS_ERP_REALM={0x19, 0xfa, "f191a1fdd238399138a8303d40e719e8967f0e798e"}, @NL80211_ATTR_FILS_ERP_USERNAME={0x9, 0xf9, "43f04d6abe"}, @NL80211_ATTR_FILS_ERP_REALM={0x81, 0xfa, "9236efd3a46725882cfb1692a30e2a75cd7675636ebc8c15b59356c2f927f57d5fec902054b573f75ea3328c8c5178420288c26ea02d7eef2f8b33c3d1227e39182c4b893db16e9543bd80905d44624005e083dd79ab2e470cab1ffa380fa7d77b5d5cb5e4ac78da0e8fe930aadc5444386bc26f5497381cfa87f5c0eb"}], @fils_params=[@NL80211_ATTR_FILS_ERP_RRK={0x45, 0xfc, "0c37b271c762ea66c01538f666636b9679d939cd88f052d0152ca6025593adbfc4633d7ead058f5e424e1747df385c057bbf01c099df0670ebf31085649f328e7a"}, @NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6}, @NL80211_ATTR_FILS_ERP_USERNAME={0xd, 0xf9, "46e2800a467c41cbb0"}, @NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6}, @NL80211_ATTR_FILS_ERP_RRK={0x15, 0xfc, "a97f42ba8156ec15687fb10848253e17f0"}], @fils_params=[@NL80211_ATTR_FILS_ERP_USERNAME={0xd, 0xf9, "425ab2fc23634c35c8"}], @NL80211_ATTR_IE={0x4}, @fils_params=[@NL80211_ATTR_FILS_ERP_REALM={0x61, 0xfa, "54b972a7fd98819b183d70a458337d51485c283adb24bf075204048ca9da4d66abb06864cd5731230f2ac3ae169e5792344900fde1e3711fcf444ef8658233781c85915f481c45f6a8c337a52142ede2657a0f79f4f1ff053a5a618fe9"}], @fils_params=[@NL80211_ATTR_FILS_ERP_REALM={0xb45, 0xfa, "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"}]]}, 0xec4}}, 0x0) [ 431.017536][T20389] selinux_netlink_send: 126 callbacks suppressed [ 431.017588][T20389] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20389 comm=syz-executor.1 20:02:36 executing program 2: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 20:02:36 executing program 5: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmmsg(r0, &(0x7f0000003600)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000780), 0x2f3}}], 0x400000000000316, 0x0) 20:02:36 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') lseek(r0, 0x10000, 0x0) 20:02:36 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)=@newpolicy={0xfc, 0x13, 0xd5b338019eeacfa5, 0x0, 0x0, {{@in=@multicast1, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee01}}, [@tmpl={0x44, 0x5, [{{@in6=@private0}, 0x3, @in6=@remote, 0x0, 0x1}]}]}, 0xfc}}, 0x0) 20:02:36 executing program 1: r0 = socket(0x10, 0x2, 0x0) sendmsg$NL80211_CMD_UPDATE_CONNECT_PARAMS(r0, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001540)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0x68}}}, [@NL80211_ATTR_IE={0x181, 0x2a, [@challenge={0x10, 0x1}, @peer_mgmt={0x75, 0x8, {0x0, 0x0, @val, @val, @void}}, @tim={0x5, 0x7d, {0x0, 0x0, 0x0, "711c07d5bd52573ee6b04bcad9f6c34986262382bace1ec21f1f54f1c89b26620819036de82504e66b8bc127ad664718510284ba5e68e4305d57281f18dc312756dc5b07147e63a555f0b124f25c024cbef7afeec7505ec8cc5e80c1422171244cac499ffa1f243e129572bba64d6894dc9ed444606084327371"}}, @tim={0x5, 0xef, {0x0, 0x0, 0x0, "06ac6bf451237c21d7b6d67b1dbff238f1031d68d1d918469989441504fb80e831face9649ce31c33ea96a61793767c138d79cc297e34ac8b7351d2974b4d7967a06f8ae31d93c32dfebfc319a2ac40f0388dc4e953a555bcafc3baabad009935aa561591d4dfbee69ade0a25eb603a41ffa387a53cd3514fa31d4b257a6c0b139019077d424ef16db80b1db6ba299c860b78c852609dd3a8efeb11d3f0d538d5f4cd2a6b8699c22aec72600a21e7549a5ad10a69ac7aadd8f16e63f518e6e002e381f5eb2f53b068d193024072389f051dc76f088838a94c18e82a35ed6a0a6c32cc371c88211bd5c283c46"}}]}, @NL80211_ATTR_IE={0x29, 0x2a, [@channel_switch={0x25, 0x3}, @ext_channel_switch={0x3c, 0x4}, @peer_mgmt={0x75, 0x18, {0x0, 0x0, @val, @val, @val="2dd4fb30d76a23ce1615baef4f0e9d36"}}]}, @fils_params=[@NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6}, @NL80211_ATTR_FILS_ERP_REALM={0x19, 0xfa, "f191a1fdd238399138a8303d40e719e8967f0e798e"}, @NL80211_ATTR_FILS_ERP_USERNAME={0x9, 0xf9, "43f04d6abe"}, @NL80211_ATTR_FILS_ERP_REALM={0x81, 0xfa, "9236efd3a46725882cfb1692a30e2a75cd7675636ebc8c15b59356c2f927f57d5fec902054b573f75ea3328c8c5178420288c26ea02d7eef2f8b33c3d1227e39182c4b893db16e9543bd80905d44624005e083dd79ab2e470cab1ffa380fa7d77b5d5cb5e4ac78da0e8fe930aadc5444386bc26f5497381cfa87f5c0eb"}], @fils_params=[@NL80211_ATTR_FILS_ERP_RRK={0x45, 0xfc, "0c37b271c762ea66c01538f666636b9679d939cd88f052d0152ca6025593adbfc4633d7ead058f5e424e1747df385c057bbf01c099df0670ebf31085649f328e7a"}, @NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6}, @NL80211_ATTR_FILS_ERP_USERNAME={0xd, 0xf9, "46e2800a467c41cbb0"}, @NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6}, @NL80211_ATTR_FILS_ERP_RRK={0x15, 0xfc, "a97f42ba8156ec15687fb10848253e17f0"}], @fils_params=[@NL80211_ATTR_FILS_ERP_USERNAME={0xd, 0xf9, "425ab2fc23634c35c8"}], @NL80211_ATTR_IE={0x4}, @fils_params=[@NL80211_ATTR_FILS_ERP_REALM={0x61, 0xfa, "54b972a7fd98819b183d70a458337d51485c283adb24bf075204048ca9da4d66abb06864cd5731230f2ac3ae169e5792344900fde1e3711fcf444ef8658233781c85915f481c45f6a8c337a52142ede2657a0f79f4f1ff053a5a618fe9"}], @fils_params=[@NL80211_ATTR_FILS_ERP_REALM={0xb45, 0xfa, "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"}]]}, 0xec4}}, 0x0) 20:02:36 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="66530700ae897094d2f055de8098ab5bfbe42829a773c0c9605aa0bba5fd63343239d4a279d31a0c5f0386191c7aee3115ef0441c40671bec467d4182e6eb56585656007a1062c4b64862cff00b01e1855c534b65be0eedd05848f5ecb0c086e8b84da09eeb02836143c8e7ecc8b1e02349a9842fa34c477e1870cac150039040657f953024d6d4ba601ab", 0x8b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 20:02:36 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') lseek(r0, 0x10000, 0x0) 20:02:36 executing program 5: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmmsg(r0, &(0x7f0000003600)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000780), 0x2f3}}], 0x400000000000316, 0x0) 20:02:36 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)=@newpolicy={0xfc, 0x13, 0xd5b338019eeacfa5, 0x0, 0x0, {{@in=@multicast1, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee01}}, [@tmpl={0x44, 0x5, [{{@in6=@private0}, 0x3, @in6=@remote, 0x0, 0x1}]}]}, 0xfc}}, 0x0) 20:02:36 executing program 1: r0 = socket(0x10, 0x2, 0x0) sendmsg$NL80211_CMD_UPDATE_CONNECT_PARAMS(r0, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001540)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0x68}}}, [@NL80211_ATTR_IE={0x181, 0x2a, [@challenge={0x10, 0x1}, @peer_mgmt={0x75, 0x8, {0x0, 0x0, @val, @val, @void}}, @tim={0x5, 0x7d, {0x0, 0x0, 0x0, "711c07d5bd52573ee6b04bcad9f6c34986262382bace1ec21f1f54f1c89b26620819036de82504e66b8bc127ad664718510284ba5e68e4305d57281f18dc312756dc5b07147e63a555f0b124f25c024cbef7afeec7505ec8cc5e80c1422171244cac499ffa1f243e129572bba64d6894dc9ed444606084327371"}}, @tim={0x5, 0xef, {0x0, 0x0, 0x0, "06ac6bf451237c21d7b6d67b1dbff238f1031d68d1d918469989441504fb80e831face9649ce31c33ea96a61793767c138d79cc297e34ac8b7351d2974b4d7967a06f8ae31d93c32dfebfc319a2ac40f0388dc4e953a555bcafc3baabad009935aa561591d4dfbee69ade0a25eb603a41ffa387a53cd3514fa31d4b257a6c0b139019077d424ef16db80b1db6ba299c860b78c852609dd3a8efeb11d3f0d538d5f4cd2a6b8699c22aec72600a21e7549a5ad10a69ac7aadd8f16e63f518e6e002e381f5eb2f53b068d193024072389f051dc76f088838a94c18e82a35ed6a0a6c32cc371c88211bd5c283c46"}}]}, @NL80211_ATTR_IE={0x29, 0x2a, [@channel_switch={0x25, 0x3}, @ext_channel_switch={0x3c, 0x4}, @peer_mgmt={0x75, 0x18, {0x0, 0x0, @val, @val, @val="2dd4fb30d76a23ce1615baef4f0e9d36"}}]}, @fils_params=[@NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6}, @NL80211_ATTR_FILS_ERP_REALM={0x19, 0xfa, "f191a1fdd238399138a8303d40e719e8967f0e798e"}, @NL80211_ATTR_FILS_ERP_USERNAME={0x9, 0xf9, "43f04d6abe"}, @NL80211_ATTR_FILS_ERP_REALM={0x81, 0xfa, "9236efd3a46725882cfb1692a30e2a75cd7675636ebc8c15b59356c2f927f57d5fec902054b573f75ea3328c8c5178420288c26ea02d7eef2f8b33c3d1227e39182c4b893db16e9543bd80905d44624005e083dd79ab2e470cab1ffa380fa7d77b5d5cb5e4ac78da0e8fe930aadc5444386bc26f5497381cfa87f5c0eb"}], @fils_params=[@NL80211_ATTR_FILS_ERP_RRK={0x45, 0xfc, "0c37b271c762ea66c01538f666636b9679d939cd88f052d0152ca6025593adbfc4633d7ead058f5e424e1747df385c057bbf01c099df0670ebf31085649f328e7a"}, @NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6}, @NL80211_ATTR_FILS_ERP_USERNAME={0xd, 0xf9, "46e2800a467c41cbb0"}, @NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6}, @NL80211_ATTR_FILS_ERP_RRK={0x15, 0xfc, "a97f42ba8156ec15687fb10848253e17f0"}], @fils_params=[@NL80211_ATTR_FILS_ERP_USERNAME={0xd, 0xf9, "425ab2fc23634c35c8"}], @NL80211_ATTR_IE={0x4}, @fils_params=[@NL80211_ATTR_FILS_ERP_REALM={0x61, 0xfa, "54b972a7fd98819b183d70a458337d51485c283adb24bf075204048ca9da4d66abb06864cd5731230f2ac3ae169e5792344900fde1e3711fcf444ef8658233781c85915f481c45f6a8c337a52142ede2657a0f79f4f1ff053a5a618fe9"}], @fils_params=[@NL80211_ATTR_FILS_ERP_REALM={0xb45, 0xfa, "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"}]]}, 0xec4}}, 0x0) [ 433.894664][T20402] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20402 comm=syz-executor.1 20:02:36 executing program 5: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmmsg(r0, &(0x7f0000003600)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000780), 0x2f3}}], 0x400000000000316, 0x0) 20:02:36 executing program 1: r0 = socket(0x10, 0x2, 0x0) sendmsg$NL80211_CMD_UPDATE_CONNECT_PARAMS(r0, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001540)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0x68}}}, [@NL80211_ATTR_IE={0x181, 0x2a, [@challenge={0x10, 0x1}, @peer_mgmt={0x75, 0x8, {0x0, 0x0, @val, @val, @void}}, @tim={0x5, 0x7d, {0x0, 0x0, 0x0, "711c07d5bd52573ee6b04bcad9f6c34986262382bace1ec21f1f54f1c89b26620819036de82504e66b8bc127ad664718510284ba5e68e4305d57281f18dc312756dc5b07147e63a555f0b124f25c024cbef7afeec7505ec8cc5e80c1422171244cac499ffa1f243e129572bba64d6894dc9ed444606084327371"}}, @tim={0x5, 0xef, {0x0, 0x0, 0x0, "06ac6bf451237c21d7b6d67b1dbff238f1031d68d1d918469989441504fb80e831face9649ce31c33ea96a61793767c138d79cc297e34ac8b7351d2974b4d7967a06f8ae31d93c32dfebfc319a2ac40f0388dc4e953a555bcafc3baabad009935aa561591d4dfbee69ade0a25eb603a41ffa387a53cd3514fa31d4b257a6c0b139019077d424ef16db80b1db6ba299c860b78c852609dd3a8efeb11d3f0d538d5f4cd2a6b8699c22aec72600a21e7549a5ad10a69ac7aadd8f16e63f518e6e002e381f5eb2f53b068d193024072389f051dc76f088838a94c18e82a35ed6a0a6c32cc371c88211bd5c283c46"}}]}, @NL80211_ATTR_IE={0x29, 0x2a, [@channel_switch={0x25, 0x3}, @ext_channel_switch={0x3c, 0x4}, @peer_mgmt={0x75, 0x18, {0x0, 0x0, @val, @val, @val="2dd4fb30d76a23ce1615baef4f0e9d36"}}]}, @fils_params=[@NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6}, @NL80211_ATTR_FILS_ERP_REALM={0x19, 0xfa, "f191a1fdd238399138a8303d40e719e8967f0e798e"}, @NL80211_ATTR_FILS_ERP_USERNAME={0x9, 0xf9, "43f04d6abe"}, @NL80211_ATTR_FILS_ERP_REALM={0x81, 0xfa, "9236efd3a46725882cfb1692a30e2a75cd7675636ebc8c15b59356c2f927f57d5fec902054b573f75ea3328c8c5178420288c26ea02d7eef2f8b33c3d1227e39182c4b893db16e9543bd80905d44624005e083dd79ab2e470cab1ffa380fa7d77b5d5cb5e4ac78da0e8fe930aadc5444386bc26f5497381cfa87f5c0eb"}], @fils_params=[@NL80211_ATTR_FILS_ERP_RRK={0x45, 0xfc, "0c37b271c762ea66c01538f666636b9679d939cd88f052d0152ca6025593adbfc4633d7ead058f5e424e1747df385c057bbf01c099df0670ebf31085649f328e7a"}, @NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6}, @NL80211_ATTR_FILS_ERP_USERNAME={0xd, 0xf9, "46e2800a467c41cbb0"}, @NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6}, @NL80211_ATTR_FILS_ERP_RRK={0x15, 0xfc, "a97f42ba8156ec15687fb10848253e17f0"}], @fils_params=[@NL80211_ATTR_FILS_ERP_USERNAME={0xd, 0xf9, "425ab2fc23634c35c8"}], @NL80211_ATTR_IE={0x4}, @fils_params=[@NL80211_ATTR_FILS_ERP_REALM={0x61, 0xfa, "54b972a7fd98819b183d70a458337d51485c283adb24bf075204048ca9da4d66abb06864cd5731230f2ac3ae169e5792344900fde1e3711fcf444ef8658233781c85915f481c45f6a8c337a52142ede2657a0f79f4f1ff053a5a618fe9"}], @fils_params=[@NL80211_ATTR_FILS_ERP_REALM={0xb45, 0xfa, "720d82c1a7979c5bb3fb939e2f273a1cecb00c65ea902514e0a1c7a252278b6b8e1f6a2b16437879d65ba9ee3484f9f1845f6b276a411ecd126fffaa3f83256ef445a54dde7c8c3dec691312aabc50cf0e38d7d803a666e02bcd3beae19dc076021e4c1a13934b32eeaf708e6a77e6bead288eb762f567e7e56e4a111182ab34d7d2c9b80cdd459f1d45c4f1d570dd05456bc16d769269503282d1c98c2c29151ad39d968a229bf8fdee82f97f2e3dbfee292299eb76a93590dcae8e8843422372a4ce81e0f84e4bdb403e6e2cad85a8bda59be1ff8e03c79a1de9c9241da465066c9d1ae6d7f2068ff701ef92e8001cd431fa89fe8630cd17bf4dcef69b632f68e85ea86de7eee061567bffb56e32f090623d0df56a69bed9ed13bfe9b864eb8a81f3cae67bee6a7621a6a7262fa13799d52b154b107c8721aed7074aea69a5695f6efa109aecfb2156a86a6cafd8bda710402c439f67ddf3fb81540d751a92dc45ea48a06591cda140063251450857f0dc581aa203e61b481b5673e3fd24a58211650c646785c529338592f149dfb1b097d48a51ebe3b58b10564a5574a36b80d56f22c387592287130350b18204fc5cfd54a7dc066466a95737716c26c2c7ca17abc7b42680bcdf101e6910df2f578cf155d7c90637653bd0e5d7e20e24da54702cde3cb28a262be653b11e3e65fda4c26ed00eaa9c7051ed4bbb6239e5989d704a37f9a2de644a6807a9f7317688ee6f3a62adf990c82ec8022c68193b8a21b37167d1a38108156b225dc0e69a485caa513819dee0719def3d2c398577bd7c907eef4cf032be7503145216c3df5aa46e99c85c9f84ff759848a8fc30c24acb2ad2e7c4dffa1bd88799b07b48920642e8abd5d9c57a716f68e25859ddb197765a076e5d1b7dbc76f1098bf8ddefa905ed38cf4e8235973529ddc51516b8d3f755e5b206dd29d01e9e230006a644b1a457ad72c9296884efc3fde4ee72f8071aa917673a273852161ae5a1e852e46fef59cf0ebc1b0e652a292130ebbc13072a56a961b40ea654abffc1bb48bf14694515dda271a502bda8fcafe0de475380d04158f9f3a9a3995ed4e6cbea9ff8d4c2c00936aea3d86f40f8f790ed3a54e82dbdf01b5bfb446b096c372fd9eec2f92fbd9571f6d46a1b26ff35467a644ba1b4fac537100ce570689fdecf1539a14bef761a7c757cbe497dc2d20bed7af24743021706af4a80e556f198fe172e2153ad0837c7522e9ed308ec468269e0331d8836b39150c82ff092150f0887fb144b6ca26f537edaa39e6a4ef953756182580873e7496a3a7e57eddd944a75eed460e4378228516ebb1ccca0f23076203820f78fa04ed85af709c5f6f54f2af6c9e8e372c3ba6b2043806d6c8ec99e0df866815466337642e13898b0bc127aca6dc39efee0fa4d98c431640149172fec2a943eb538a029cac789d0ab4d6162e244b07d24e835ff57104cf0954553f1ac67c3ec6e87bd5c2f5fb77f5f62086f1c91e1d98295ba2192617f3cef44193dfdc8166a5b9cd12381fb960179b15385e062ef6323cbd3e2ac7c375db35a4008fbd23fbb3aae141f54e008b1856bc93c6302e1b67e65c5004013afad581d011753b842061f6f096bd336b33f2a490669042890c7d96fcc703139cde0d042488efeb890dbeb92bb44b19818a17fa00f1654bc27c7a13c44e9ee3af3f03686907a37399f8ab61f46084b8a94a366506e7808267b09a2647a1452cb6671a74e4f2cdb8d4043ebe121d5e8ddba7276f786a68db6fd54b924b5b6abd917617676d129329e641884b1e7d87669e3cf880250bd749dcfecec2701ca924fb74cce903bd45bea5f59948b235d38a92666d6372ea5d51b561dbb7d44d96b9489e1a18f4dc48324bc3782e34ac8c7e60c7ffdaa8cd852670e2b48fe0d76253ea493b15a8f9bd8603231bc1cbe7d8545db0b447f44e001cf9500c4705cb7f7c32101a8155803914c2f9fa799c0c044ac1d1ce487f6efda4de8009c9065ded6ef5cb37471c46bb5a5dc8a8c117fd955a1a16cbe9f5782304aa806f567083802fa16da738a8d89099b002adfa8ec8f6ad491e488349dbe9b8ae6a7c27e7174a61f9280eae9ba4eac25aeb1bc34b54344435e7c81b0d64a4027fae3b23e60fb798648086bc96de829e6be713c038fef3403c7f4f5c0ecc0fe93829c9aac035694933683c2b87870f695955e8d3b005cc29b14ad421dbb329e44ced11c4ff644a0b81793f59fd53b9d3c9dab84eef386bba32d3a9db409183246c3ba187d31e28df84b0ec915da7803e7a6c464e827d83eaf0e4fe013bc72df89dd571af21b168ed23670519770f047c5bb038882cd8b16ae438063b18575957225b23461bb5322c4e80d60fec5f4b8f0b7449d6db4e6d96cf1d664c8f6a4cea409005660f42c558cfe55c7ffa852557006e2b40a865c180bab9c453dc6f18ceb527e90a4a82ca31981ea01894cf177de910516cce945ab5a5ebdcaf152be763ded882089a4e67c11232ebec93fd403d102e5766e8211939128c7a87be0c1a551ae60ad80ec7e2a28f3fd7b863b23f99d1e39bbe1b54fe028379dd430318197719e37c2074f5327280cbcfb924a97c0df87b9b33d24df225b2b8d8b7b4663f29b9056d039a49f60d205a4b06fde3cb6965f476cff55a74c70c8d31019d34f16d2d393eb65b3b927f5fbdde01ce7185c3fe272e23d4f53bfb4390ca87f3d460c9ee27681cd5c3820a090e50fb175089951aaa8967e2a83392e43e6b7edd6175cc71cff42aae4d9247effa330f464cf0500d6c61c14de7972309842d50bdfaa21ea70ca5211c17e203a0c54b19e40583dbc8afa185165edd9c0356672f879263e5fdf2e967caac035070dd32e8e5d086453c8799aa062f9871e7ee2ce154c6f1fabd8f84d7ea6850baa6c9b513605e95da57c8e08990f5752bb0c7b321944d7aedf45e1b72c565b6e73a921868e7fdea645225b6c784a939686a58d6dd1dd8bbebbc23af813389e656a639757f864704ab00ccd5a5f29d9a328c7fb649d2fddd03832faf46f56ea3a83f38b8b898ac9e4ab3060ceecc176553ca23efa9b4f855c2a10fec1d982f00cd7482eac7dbbdb83a94a6665755417dc4eda2d9a19c9a74f5c0cc225c761b77c843c0dfc9265daff028b80e86a82228833cee0b6ed664458e357f0b8382a6c4ca8a1e9da45fc276fdceef94d1f9dd72d64ba70053713d6cb636ebf5bd4a487b1c2cd966537ec3117f5a47c9b4a63842c26de729c25332bac6e531eda8eccb786857445e17667a1df258d8d02d4dbbf90b746b2d9182891d5b0230d32b0c6b270d4a50e057f0abbb640e55cada17201b6cd307413d94df61b93cd43e4105ec7a4bab46357aca6e05cc1a139a87b24cc2f8d320c1337ba09c1f910ba4d47dd530196264281a0c1287aee71eedca9be36127220c8bcbd0a213b82e3f3681d3fe99e62f89ed045321064e4e4c33ce6b8a44b3864d3aaf2e1ae7614001a9f0915b4eae1f28b9c79567f3eafa379c27b6eae2745574d26cfe17cacd29577e59c24aa178410aefc9d05c3833a553a2d078cea2185b54969178c09c652536fc6a958be77bd4aca227b40ac28750b043e8557deb5f5a885833b4f48f833f5e727802387022cc90e6700f4382c83347032b8083ee81ec84951c120898c50f0e09ec452fcf99d0cf8501971664d60aa3b5e979d9f73a63b17067ea5481b956e7bd85861a709c4a15f0270e1b14ae40d68e3460ae6e6239c8279a41bc68c34b9eeb84e002f779b298443182118ae3e8718535d9e2f0f0e11585cc6776f08c0d0281b32052da9bc94a6573b9cb1665edd4f6cb3b0d67044f06570add0f0cb271eddd775841e0eaed0bccb0e622b5e83e15b79c9e3b8dcb1dd5728cc5626b871a997e81865a9311ad0e3d6b199c528dd336363a7127ae6bac20b494c2362ee94391713b0f899c169b361c725f20fb210b8b8e41ac0340c52ebe4e4eb239009343730cb9f3cd462f202a517e9164e4b84b3dd51aaa2acbbd00c80fbcd454c1b8373eca85d2454e78908a28f4de890667a493d"}]]}, 0xec4}}, 0x0) [ 433.958840][T20416] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20416 comm=syz-executor.1 [ 434.013723][T20422] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20422 comm=syz-executor.1 20:02:39 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') lseek(r0, 0x10000, 0x0) 20:02:39 executing program 2: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 20:02:39 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)=@newpolicy={0xfc, 0x13, 0xd5b338019eeacfa5, 0x0, 0x0, {{@in=@multicast1, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee01}}, [@tmpl={0x44, 0x5, [{{@in6=@private0}, 0x3, @in6=@remote, 0x0, 0x1}]}]}, 0xfc}}, 0x0) 20:02:39 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/bus/input/handlers\x00', 0x0, 0x0) 20:02:39 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) read(r1, 0x0, 0x2000) read(r1, 0x0, 0x0) dup3(r1, r0, 0x0) 20:02:39 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/bus/input/handlers\x00', 0x0, 0x0) 20:02:39 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') lseek(r0, 0x10000, 0x0) 20:02:39 executing program 0: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x7000) syz_btf_id_by_name$bpf_lsm(0x0) 20:02:39 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000040)=@generic={0x0, "a1d381963bf0a63205d978f76abcb793af40b2a127f6c58ca70b3f92d7e5e6cfb5bd1a01ccb03e8a46daca95027838d928491eb0cedee8d302bde9797f6581aff92b0b3e76c8909c8ed655fde3d1810c1075a3ad58f5785b71dc37d004ba122b0e013a165b419ed0c15016f6031fb3846d5a1706a82cd04e287ece2894d3"}, 0x80) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="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"/296, 0x128}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x36) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 20:02:39 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x0, @broadcast}, 0x28, {0x2, 0x0, @private}}) 20:02:39 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/bus/input/handlers\x00', 0x0, 0x0) 20:02:39 executing program 0: r0 = socket(0x10, 0x2, 0x0) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000e40)={0x0, 0x0, &(0x7f0000000e00)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x48}}, 0x0) 20:02:39 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x0, @broadcast}, 0x28, {0x2, 0x0, @private}}) [ 437.070489][T20465] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20465 comm=syz-executor.0 [ 437.083390][T20465] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. 20:02:42 executing program 2: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 20:02:42 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) read(r1, 0x0, 0x2000) read(r1, 0x0, 0x0) dup3(r1, r0, 0x0) 20:02:42 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/bus/input/handlers\x00', 0x0, 0x0) 20:02:42 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x0, @broadcast}, 0x28, {0x2, 0x0, @private}}) 20:02:42 executing program 0: r0 = socket(0x10, 0x2, 0x0) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000e40)={0x0, 0x0, &(0x7f0000000e00)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x48}}, 0x0) 20:02:42 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x0, @broadcast}, 0x28, {0x2, 0x0, @private}}) 20:02:42 executing program 0: r0 = socket(0x10, 0x2, 0x0) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000e40)={0x0, 0x0, &(0x7f0000000e00)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x48}}, 0x0) 20:02:42 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = gettid() tkill(r1, 0x1000000000016) ptrace(0x4206, r0) ptrace(0x4208, r0) wait4(0x0, 0x0, 0x1, 0x0) [ 439.977660][T20475] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20475 comm=syz-executor.0 [ 439.990544][T20475] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. 20:02:42 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) ppoll(&(0x7f0000000000)=[{r0, 0x100}], 0x1, 0x0, 0x0, 0x0) 20:02:42 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/drivers\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 20:02:42 executing program 0: r0 = socket(0x10, 0x2, 0x0) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000e40)={0x0, 0x0, &(0x7f0000000e00)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x48}}, 0x0) [ 440.051633][T20488] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20488 comm=syz-executor.0 [ 440.064527][T20488] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. 20:02:42 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) ppoll(&(0x7f0000000000)=[{r0, 0x100}], 0x1, 0x0, 0x0, 0x0) [ 440.110120][T20502] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20502 comm=syz-executor.0 [ 440.122961][T20502] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. 20:02:45 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) ppoll(&(0x7f0000000000)=[{r0, 0x100}], 0x1, 0x0, 0x0, 0x0) 20:02:45 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/drivers\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 20:02:45 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) read(r1, 0x0, 0x2000) read(r1, 0x0, 0x0) dup3(r1, r0, 0x0) 20:02:45 executing program 0: r0 = syz_io_uring_setup(0x187, &(0x7f0000000200), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000033000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x989680}}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000680)=@IORING_OP_LINK_TIMEOUT={0xf, 0x3, 0x0, 0x0, 0x0, &(0x7f0000000640)}, 0x4) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x8001) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) 20:02:45 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="010080f4547efeb9558d7a"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe69}, {0x0}, {&(0x7f00000193c0)=""/102385, 0x6fe4}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x1e) 20:02:45 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/drivers\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 20:02:45 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="010080f4547efeb9558d7a"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe69}, {0x0}, {&(0x7f00000193c0)=""/102385, 0x6fe4}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x1e) 20:02:45 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = gettid() tkill(r1, 0x1000000000016) ptrace(0x4206, r0) ptrace(0x4208, r0) wait4(0x0, 0x0, 0x1, 0x0) 20:02:45 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) ppoll(&(0x7f0000000000)=[{r0, 0x100}], 0x1, 0x0, 0x0, 0x0) 20:02:45 executing program 0: r0 = syz_io_uring_setup(0x187, &(0x7f0000000200), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000033000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x989680}}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000680)=@IORING_OP_LINK_TIMEOUT={0xf, 0x3, 0x0, 0x0, 0x0, &(0x7f0000000640)}, 0x4) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x8001) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) 20:02:45 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="010080f4547efeb9558d7a"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe69}, {0x0}, {&(0x7f00000193c0)=""/102385, 0x6fe4}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x1e) 20:02:45 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/drivers\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 20:02:45 executing program 0: r0 = syz_io_uring_setup(0x187, &(0x7f0000000200), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000033000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x989680}}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000680)=@IORING_OP_LINK_TIMEOUT={0xf, 0x3, 0x0, 0x0, 0x0, &(0x7f0000000640)}, 0x4) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x8001) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) 20:02:45 executing program 3: set_mempolicy(0x1, 0x0, 0x0) r0 = creat(&(0x7f00000006c0)='./file0\x00', 0x0) fcntl$lock(r0, 0x5, &(0x7f0000000240)) 20:02:45 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) read(r1, 0x0, 0x2000) read(r1, 0x0, 0x0) dup3(r1, r0, 0x0) 20:02:45 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="010080f4547efeb9558d7a"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe69}, {0x0}, {&(0x7f00000193c0)=""/102385, 0x6fe4}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x1e) 20:02:45 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f0000000480)=""/246, 0xf6}], 0x1, 0x0, 0x0) pread64(r0, &(0x7f0000000080)=""/161, 0xa1, 0x401) 20:02:45 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000200)=0x1c, 0x4) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r0, &(0x7f0000004880)=[{&(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e, 0x0}], 0x1, 0x0) 20:02:46 executing program 0: r0 = syz_io_uring_setup(0x187, &(0x7f0000000200), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000033000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x989680}}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000680)=@IORING_OP_LINK_TIMEOUT={0xf, 0x3, 0x0, 0x0, 0x0, &(0x7f0000000640)}, 0x4) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x8001) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) 20:02:46 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = gettid() tkill(r1, 0x1000000000016) ptrace(0x4206, r0) ptrace(0x4208, r0) wait4(0x0, 0x0, 0x1, 0x0) 20:02:46 executing program 3: set_mempolicy(0x1, 0x0, 0x0) r0 = creat(&(0x7f00000006c0)='./file0\x00', 0x0) fcntl$lock(r0, 0x5, &(0x7f0000000240)) 20:02:46 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f0000000480)=""/246, 0xf6}], 0x1, 0x0, 0x0) pread64(r0, &(0x7f0000000080)=""/161, 0xa1, 0x401) 20:02:46 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f0000000480)=""/246, 0xf6}], 0x1, 0x0, 0x0) pread64(r0, &(0x7f0000000080)=""/161, 0xa1, 0x401) 20:02:46 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000200)=0x1c, 0x4) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r0, &(0x7f0000004880)=[{&(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e, 0x0}], 0x1, 0x0) 20:02:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000500)={{r0}}) 20:02:46 executing program 3: set_mempolicy(0x1, 0x0, 0x0) r0 = creat(&(0x7f00000006c0)='./file0\x00', 0x0) fcntl$lock(r0, 0x5, &(0x7f0000000240)) 20:02:46 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f0000000480)=""/246, 0xf6}], 0x1, 0x0, 0x0) pread64(r0, &(0x7f0000000080)=""/161, 0xa1, 0x401) 20:02:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000500)={{r0}}) 20:02:46 executing program 3: set_mempolicy(0x1, 0x0, 0x0) r0 = creat(&(0x7f00000006c0)='./file0\x00', 0x0) fcntl$lock(r0, 0x5, &(0x7f0000000240)) 20:02:46 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f0000000480)=""/246, 0xf6}], 0x1, 0x0, 0x0) pread64(r0, &(0x7f0000000080)=""/161, 0xa1, 0x401) 20:02:46 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000200)=0x1c, 0x4) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r0, &(0x7f0000004880)=[{&(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e, 0x0}], 0x1, 0x0) 20:02:47 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = gettid() tkill(r1, 0x1000000000016) ptrace(0x4206, r0) ptrace(0x4208, r0) wait4(0x0, 0x0, 0x1, 0x0) 20:02:47 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f0000000480)=""/246, 0xf6}], 0x1, 0x0, 0x0) pread64(r0, &(0x7f0000000080)=""/161, 0xa1, 0x401) 20:02:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000500)={{r0}}) 20:02:47 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000200)=0x1c, 0x4) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg$unix(r0, &(0x7f0000004880)=[{&(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e, 0x0}], 0x1, 0x0) 20:02:47 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f0000000480)=""/246, 0xf6}], 0x1, 0x0, 0x0) pread64(r0, &(0x7f0000000080)=""/161, 0xa1, 0x401) 20:02:47 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) fdatasync(r0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0x7ffff000}], 0x1, 0x100000, 0x0) 20:02:47 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000140)=0x3f) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000240)="ae88bff8240b01005aa6ca9566d98e06c896fdffffffffffffffdd0000fffffffffbfffff000000000000f60a6dc33191c71fb828e976e36321fc5e899ccb93167247a38f43c51b0cf73046a79df58b5b7f938cf30b0a1f4b3cc35a4cb7455834686ea6bf9835926d004b410b24e2ea25bfd9b2aa91d2459bf4126e49c5323a7f9a44e33e2d4b41772981b806747c350e79f03", 0x93}], 0x1) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 20:02:47 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x0, 0x1}, {0x20}, {0x6, 0x0, 0x0, 0x7fff7ffe}]}) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) 20:02:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000500)={{r0}}) 20:02:47 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x1c, 0x1, 0x4, 0x5, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x1}]}, 0x1c}}, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x20, 0x1, 0x4, 0x401, 0x0, 0x0, {}, [@NFULA_CFG_MODE={0xa, 0x2, {0x0, 0x2}}]}, 0x20}}, 0x0) 20:02:47 executing program 1: mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0xc4831, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) [ 444.912840][T20626] sg_write: data in/out 68352/48 bytes for SCSI command 0xf0-- guessing data in; [ 444.912840][T20626] program syz-executor.2 not setting count and/or reply_len properly 20:02:47 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x1c, 0x1, 0x4, 0x5, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x1}]}, 0x1c}}, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x20, 0x1, 0x4, 0x401, 0x0, 0x0, {}, [@NFULA_CFG_MODE={0xa, 0x2, {0x0, 0x2}}]}, 0x20}}, 0x0) [ 444.973354][T20636] sg_write: data in/out 68352/101 bytes for SCSI command 0xf0-- guessing data in; [ 444.973354][T20636] program syz-executor.2 not setting count and/or reply_len properly 20:02:48 executing program 1: mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0xc4831, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) 20:02:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000a, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$netlink(0xffffffffffffffff, 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000000c0)={[{@mode={'mode', 0x3d, 0x2010000000000000}, 0x33}], [{@dont_measure}]}) 20:02:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) fdatasync(r0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0x7ffff000}], 0x1, 0x100000, 0x0) 20:02:48 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) fdatasync(r0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0x7ffff000}], 0x1, 0x100000, 0x0) 20:02:48 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x1c, 0x1, 0x4, 0x5, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x1}]}, 0x1c}}, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x20, 0x1, 0x4, 0x401, 0x0, 0x0, {}, [@NFULA_CFG_MODE={0xa, 0x2, {0x0, 0x2}}]}, 0x20}}, 0x0) 20:02:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x17, &(0x7f00000002c0)="f47970da7c2fd541e0656c5762306aa606a0c2a76e59b6"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 20:02:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000a, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$netlink(0xffffffffffffffff, 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000000c0)={[{@mode={'mode', 0x3d, 0x2010000000000000}, 0x33}], [{@dont_measure}]}) 20:02:48 executing program 1: mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0xc4831, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) [ 445.737465][T20652] tmpfs: Bad value for 'mode' 20:02:48 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x1c, 0x1, 0x4, 0x5, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x1}]}, 0x1c}}, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x20, 0x1, 0x4, 0x401, 0x0, 0x0, {}, [@NFULA_CFG_MODE={0xa, 0x2, {0x0, 0x2}}]}, 0x20}}, 0x0) 20:02:48 executing program 1: mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0xc4831, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) 20:02:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000000), 0x4) 20:02:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000a, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$netlink(0xffffffffffffffff, 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000000c0)={[{@mode={'mode', 0x3d, 0x2010000000000000}, 0x33}], [{@dont_measure}]}) [ 445.813056][T20669] tmpfs: Bad value for 'mode' 20:02:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000a, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$netlink(0xffffffffffffffff, 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000000c0)={[{@mode={'mode', 0x3d, 0x2010000000000000}, 0x33}], [{@dont_measure}]}) [ 445.865137][T20681] tmpfs: Bad value for 'mode' 20:02:48 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x401870cc, 0x0) [ 445.902943][T20685] tmpfs: Bad value for 'mode' 20:02:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) fdatasync(r0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0x7ffff000}], 0x1, 0x100000, 0x0) 20:02:48 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) fdatasync(r0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0x7ffff000}], 0x1, 0x100000, 0x0) 20:02:48 executing program 1: io_getevents(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) 20:02:51 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x401870cc, 0x0) 20:02:51 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x2, &(0x7f0000001000)=@buf) 20:02:51 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4052, r0, 0x0) r1 = mq_open(&(0x7f0000000000)='eth0\x00', 0x842, 0x0, 0x0) mq_timedsend(r1, &(0x7f00000003c0)="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", 0xfd1, 0x0, 0x0) 20:02:51 executing program 1: io_getevents(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) 20:02:51 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) fdatasync(r0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0x7ffff000}], 0x1, 0x100000, 0x0) 20:02:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) fdatasync(r0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0x7ffff000}], 0x1, 0x100000, 0x0) 20:02:51 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4052, r0, 0x0) r1 = mq_open(&(0x7f0000000000)='eth0\x00', 0x842, 0x0, 0x0) mq_timedsend(r1, &(0x7f00000003c0)="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", 0xfd1, 0x0, 0x0) 20:02:51 executing program 1: io_getevents(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) 20:02:51 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x401870cc, 0x0) 20:02:51 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="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", 0x10d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x30) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x1) 20:02:51 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4052, r0, 0x0) r1 = mq_open(&(0x7f0000000000)='eth0\x00', 0x842, 0x0, 0x0) mq_timedsend(r1, &(0x7f00000003c0)="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", 0xfd1, 0x0, 0x0) 20:02:51 executing program 1: io_getevents(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) 20:02:51 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x401870cc, 0x0) 20:02:51 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4052, r0, 0x0) r1 = mq_open(&(0x7f0000000000)='eth0\x00', 0x842, 0x0, 0x0) mq_timedsend(r1, &(0x7f00000003c0)="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", 0xfd1, 0x0, 0x0) 20:02:51 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="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", 0x10d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x30) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x1) 20:02:51 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040), r0) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IFACE={0x4, 0x6, 'veth0_to_hsr\x00'}]}, 0x28}}, 0x0) 20:02:51 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8994, &(0x7f0000003b80)={'sit0\x00', 0x0}) 20:02:51 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7c}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="0500000000000000000021"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 20:02:51 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x80000000000a01, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000040)={0x0, 0x0, 0x9, 0xffffffff, 0x0, "e91807251ced3193b8355109ff05260cfb6e99"}) r1 = syz_open_pts(r0, 0x0) r2 = dup(r1) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000000000)=0x6) 20:02:51 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2001, 0xd2710, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8000, 0x0, 0x400001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7eda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x200000000011, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) readv(r3, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1002}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 20:02:51 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7c}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="0500000000000000000021"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 20:02:51 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8994, &(0x7f0000003b80)={'sit0\x00', 0x0}) 20:02:51 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040), r0) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IFACE={0x4, 0x6, 'veth0_to_hsr\x00'}]}, 0x28}}, 0x0) 20:02:51 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040), r0) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IFACE={0x4, 0x6, 'veth0_to_hsr\x00'}]}, 0x28}}, 0x0) 20:02:51 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7c}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="0500000000000000000021"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 20:02:51 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8994, &(0x7f0000003b80)={'sit0\x00', 0x0}) 20:02:54 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040), r0) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IFACE={0x4, 0x6, 'veth0_to_hsr\x00'}]}, 0x28}}, 0x0) 20:02:54 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="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", 0x10d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x30) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x1) 20:02:54 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2001, 0xd2710, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8000, 0x0, 0x400001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7eda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x200000000011, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) readv(r3, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1002}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 20:02:54 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8994, &(0x7f0000003b80)={'sit0\x00', 0x0}) 20:02:54 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp, 0x0, 0x7, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000080), 0x10001, 0x10b382) r2 = memfd_create(&(0x7f0000000900)='.^\xe5\xce\xb2\xc1b#\xf4\x91\xfcS\x96(\xe2\x90\xba-L\xb1^\xe3\xa7\x9b0\xefHEG\x18\xcb\x15\xc1\x1b\x18\xbd\xb6\x14\xe9G\xa6\xbb*\xdff\xe4{2\xd0\x91\x874\xdc(\xa4\xa8?Q\xa6\xee\xb54\xd0\x05.`\xe7\x04@\xff\x83\n\xb9\x12\xaf\x83\x04\x1e\x8b\xca\x17Y\xb6\x94\x99\x90\x9f\xac\xcf\xc1\xb4\xfb\x9c)\xa0xY4\xaf\xe3\xd5R\x012\xd2R', 0x0) fchdir(r0) pwritev(r2, &(0x7f00000004c0)=[{}, {&(0x7f0000000440)="813586c3c380fec40dc94a4d09e82dd7a0a184dec7457c0632b7b8579e01df2f81f750", 0x23}, {&(0x7f0000000580)="f374f709e40b01f33018c9f2efed195927a1c55e2bd180187b3e3e3652f72b735f7b18a1448a70b138788112443abadf137a5eadb24b1d8cf4633334042fa371448ecb1d9f225f1b9d5c92bd1b1370f3936e7d72c9b29a602983ef01d1885aee9b327786fc484dcd751bf072985b4840900d5b5efc9137235c0c3dee77c27a81a57af8d9136309e9d04cc9eb204e125826b802250527ba721a6c84d10a8188212ce07c4c", 0xa4}, {0x0}, {&(0x7f0000000740)}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x81805, 0x2) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r0, r1, 0x0, 0x24002d00) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001540)='/proc/slabinfo\x00', 0x0, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000640)=@req={0x1df, 0x7ff, 0x1, 0x689a9202}, 0x10) r5 = dup3(r2, r4, 0x80000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x10000) ioctl$LOOP_SET_BLOCK_SIZE(r3, 0x4c09, 0x0) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) ioctl$TCXONC(r6, 0x540a, 0x3) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="94000000", @ANYRES16=0x0, @ANYBLOB="00012dbd7000fcdbdf25170000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b00a3b5000006001600ff00000005001200c3e300000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b00b558000006001600070000000500120001000000"], 0x94}, 0x1, 0x0, 0x0, 0x4048080}, 0x40) fstat(r4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xee01, r7, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, "8c098d3b6438c1fbd8180b45d3cc9c164baaee13bf783eb1d66c353f731ae8174ad642085432430c390addf9b2f04d58d3b88e996e773c83fce60fa794a1cc81", "65f436ffca4a06b71c7a963ce778e03a4b090199add92ae18e13b1fbd14dade59e0dbdefaeb3d4c9755b165b06e58e929c10c5a54dbf780080ca9099661800", "e30e5a2a56a49f7cb627fa8ad4bb8aef75848f4aff2fc67a0ff75e1288f59ea9"}) 20:02:54 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7c}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="0500000000000000000021"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 20:02:54 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0x125e, 0xc04a01) 20:02:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clock_gettime(0xdd9e97eec19ffb83, 0x0) 20:02:54 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0x125e, 0xc04a01) 20:02:54 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000040)="02015500000001000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}, {0x0, 0x0, 0x7ffffffd}, {&(0x7f00000004c0)="a03a20bd031ed39c701280b1df09beea3758ca35200c44619e710913e07e98185599297cc2126df1dacc36475ca1943ff2004cd4a62bc053417a7a8e67016dc33e41308ead9747e17e6b39c2634c675fe541f63ec0d7f005afb3e2f63f2a12f1e5085a5d7f507f3176c4f0aea8dfcdea9241ed481bb947a255b82fe8235bedda4a500a2c67630232bb04b44779cc05b7f800fd843042c8d176a8f1de2c8f6616b26577f4a22aceecf9799e1dcb4dd440bdb0dc5623e15c191ca292be79b8d56c65535cf1d8764ffed5514b50463a8487bfcea877fed92e0f3699115e594f2dac6eb5c71995067c8a1596ce4d28657ba33693a60b9a2b1a668fdcafb2dbd41b620364b19c53161e15a39dc4abda35185845b181778aad25ceb3e660e44c7f8ece96909757e7be7afcbcfa6cdb3a10f66472c615e22031b0650e5fe1a06220c985d0b6c76e8da9b7a9295fea3227237134d76ceb8b8442d5cc746d8a2f26dbebc239adbee0ef06cf5d3f7e36f91da288a5274821cb8ee64a52ef8a9abc89e1295a00b9ea9e7cb67bc16dd89d9c7576f9a65b04f4d4b69b9d11f85a5650741c0c843d629bab73a96283c0aa2ba4e388b03e2e37c315895414d6dc4a3fbaff4524", 0x1bf}]) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 20:02:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clock_gettime(0xdd9e97eec19ffb83, 0x0) [ 452.052669][T20790] loop7: detected capacity change from 0 to 1036 20:02:54 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp, 0x0, 0x7, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000080), 0x10001, 0x10b382) r2 = memfd_create(&(0x7f0000000900)='.^\xe5\xce\xb2\xc1b#\xf4\x91\xfcS\x96(\xe2\x90\xba-L\xb1^\xe3\xa7\x9b0\xefHEG\x18\xcb\x15\xc1\x1b\x18\xbd\xb6\x14\xe9G\xa6\xbb*\xdff\xe4{2\xd0\x91\x874\xdc(\xa4\xa8?Q\xa6\xee\xb54\xd0\x05.`\xe7\x04@\xff\x83\n\xb9\x12\xaf\x83\x04\x1e\x8b\xca\x17Y\xb6\x94\x99\x90\x9f\xac\xcf\xc1\xb4\xfb\x9c)\xa0xY4\xaf\xe3\xd5R\x012\xd2R', 0x0) fchdir(r0) pwritev(r2, &(0x7f00000004c0)=[{}, {&(0x7f0000000440)="813586c3c380fec40dc94a4d09e82dd7a0a184dec7457c0632b7b8579e01df2f81f750", 0x23}, {&(0x7f0000000580)="f374f709e40b01f33018c9f2efed195927a1c55e2bd180187b3e3e3652f72b735f7b18a1448a70b138788112443abadf137a5eadb24b1d8cf4633334042fa371448ecb1d9f225f1b9d5c92bd1b1370f3936e7d72c9b29a602983ef01d1885aee9b327786fc484dcd751bf072985b4840900d5b5efc9137235c0c3dee77c27a81a57af8d9136309e9d04cc9eb204e125826b802250527ba721a6c84d10a8188212ce07c4c", 0xa4}, {0x0}, {&(0x7f0000000740)}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x81805, 0x2) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r0, r1, 0x0, 0x24002d00) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001540)='/proc/slabinfo\x00', 0x0, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000640)=@req={0x1df, 0x7ff, 0x1, 0x689a9202}, 0x10) r5 = dup3(r2, r4, 0x80000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x10000) ioctl$LOOP_SET_BLOCK_SIZE(r3, 0x4c09, 0x0) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) ioctl$TCXONC(r6, 0x540a, 0x3) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="94000000", @ANYRES16=0x0, @ANYBLOB="00012dbd7000fcdbdf25170000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b00a3b5000006001600ff00000005001200c3e300000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b00b558000006001600070000000500120001000000"], 0x94}, 0x1, 0x0, 0x0, 0x4048080}, 0x40) fstat(r4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xee01, r7, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, "8c098d3b6438c1fbd8180b45d3cc9c164baaee13bf783eb1d66c353f731ae8174ad642085432430c390addf9b2f04d58d3b88e996e773c83fce60fa794a1cc81", "65f436ffca4a06b71c7a963ce778e03a4b090199add92ae18e13b1fbd14dade59e0dbdefaeb3d4c9755b165b06e58e929c10c5a54dbf780080ca9099661800", "e30e5a2a56a49f7cb627fa8ad4bb8aef75848f4aff2fc67a0ff75e1288f59ea9"}) [ 452.141706][T20805] loop3: detected capacity change from 0 to 264192 20:02:54 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0x125e, 0xc04a01) 20:02:57 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="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", 0x10d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x30) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x1) 20:02:57 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000040)="02015500000001000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}, {0x0, 0x0, 0x7ffffffd}, {&(0x7f00000004c0)="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", 0x1bf}]) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 20:02:57 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0x125e, 0xc04a01) 20:02:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clock_gettime(0xdd9e97eec19ffb83, 0x0) 20:02:57 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp, 0x0, 0x7, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000080), 0x10001, 0x10b382) r2 = memfd_create(&(0x7f0000000900)='.^\xe5\xce\xb2\xc1b#\xf4\x91\xfcS\x96(\xe2\x90\xba-L\xb1^\xe3\xa7\x9b0\xefHEG\x18\xcb\x15\xc1\x1b\x18\xbd\xb6\x14\xe9G\xa6\xbb*\xdff\xe4{2\xd0\x91\x874\xdc(\xa4\xa8?Q\xa6\xee\xb54\xd0\x05.`\xe7\x04@\xff\x83\n\xb9\x12\xaf\x83\x04\x1e\x8b\xca\x17Y\xb6\x94\x99\x90\x9f\xac\xcf\xc1\xb4\xfb\x9c)\xa0xY4\xaf\xe3\xd5R\x012\xd2R', 0x0) fchdir(r0) pwritev(r2, &(0x7f00000004c0)=[{}, {&(0x7f0000000440)="813586c3c380fec40dc94a4d09e82dd7a0a184dec7457c0632b7b8579e01df2f81f750", 0x23}, {&(0x7f0000000580)="f374f709e40b01f33018c9f2efed195927a1c55e2bd180187b3e3e3652f72b735f7b18a1448a70b138788112443abadf137a5eadb24b1d8cf4633334042fa371448ecb1d9f225f1b9d5c92bd1b1370f3936e7d72c9b29a602983ef01d1885aee9b327786fc484dcd751bf072985b4840900d5b5efc9137235c0c3dee77c27a81a57af8d9136309e9d04cc9eb204e125826b802250527ba721a6c84d10a8188212ce07c4c", 0xa4}, {0x0}, {&(0x7f0000000740)}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x81805, 0x2) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r0, r1, 0x0, 0x24002d00) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001540)='/proc/slabinfo\x00', 0x0, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000640)=@req={0x1df, 0x7ff, 0x1, 0x689a9202}, 0x10) r5 = dup3(r2, r4, 0x80000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x10000) ioctl$LOOP_SET_BLOCK_SIZE(r3, 0x4c09, 0x0) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) ioctl$TCXONC(r6, 0x540a, 0x3) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="94000000", @ANYRES16=0x0, @ANYBLOB="00012dbd7000fcdbdf25170000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b00a3b5000006001600ff00000005001200c3e300000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b00b558000006001600070000000500120001000000"], 0x94}, 0x1, 0x0, 0x0, 0x4048080}, 0x40) fstat(r4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xee01, r7, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, "8c098d3b6438c1fbd8180b45d3cc9c164baaee13bf783eb1d66c353f731ae8174ad642085432430c390addf9b2f04d58d3b88e996e773c83fce60fa794a1cc81", "65f436ffca4a06b71c7a963ce778e03a4b090199add92ae18e13b1fbd14dade59e0dbdefaeb3d4c9755b165b06e58e929c10c5a54dbf780080ca9099661800", "e30e5a2a56a49f7cb627fa8ad4bb8aef75848f4aff2fc67a0ff75e1288f59ea9"}) 20:02:57 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2001, 0xd2710, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8000, 0x0, 0x400001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7eda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x200000000011, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) readv(r3, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1002}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 20:02:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clock_gettime(0xdd9e97eec19ffb83, 0x0) [ 455.080191][T20825] loop3: detected capacity change from 0 to 264192 20:02:57 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000040)="02015500000001000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}, {0x0, 0x0, 0x7ffffffd}, {&(0x7f00000004c0)="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", 0x1bf}]) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 20:02:57 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp, 0x0, 0x7, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000080), 0x10001, 0x10b382) r2 = memfd_create(&(0x7f0000000900)='.^\xe5\xce\xb2\xc1b#\xf4\x91\xfcS\x96(\xe2\x90\xba-L\xb1^\xe3\xa7\x9b0\xefHEG\x18\xcb\x15\xc1\x1b\x18\xbd\xb6\x14\xe9G\xa6\xbb*\xdff\xe4{2\xd0\x91\x874\xdc(\xa4\xa8?Q\xa6\xee\xb54\xd0\x05.`\xe7\x04@\xff\x83\n\xb9\x12\xaf\x83\x04\x1e\x8b\xca\x17Y\xb6\x94\x99\x90\x9f\xac\xcf\xc1\xb4\xfb\x9c)\xa0xY4\xaf\xe3\xd5R\x012\xd2R', 0x0) fchdir(r0) pwritev(r2, &(0x7f00000004c0)=[{}, {&(0x7f0000000440)="813586c3c380fec40dc94a4d09e82dd7a0a184dec7457c0632b7b8579e01df2f81f750", 0x23}, {&(0x7f0000000580)="f374f709e40b01f33018c9f2efed195927a1c55e2bd180187b3e3e3652f72b735f7b18a1448a70b138788112443abadf137a5eadb24b1d8cf4633334042fa371448ecb1d9f225f1b9d5c92bd1b1370f3936e7d72c9b29a602983ef01d1885aee9b327786fc484dcd751bf072985b4840900d5b5efc9137235c0c3dee77c27a81a57af8d9136309e9d04cc9eb204e125826b802250527ba721a6c84d10a8188212ce07c4c", 0xa4}, {0x0}, {&(0x7f0000000740)}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x81805, 0x2) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r0, r1, 0x0, 0x24002d00) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001540)='/proc/slabinfo\x00', 0x0, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000640)=@req={0x1df, 0x7ff, 0x1, 0x689a9202}, 0x10) r5 = dup3(r2, r4, 0x80000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x10000) ioctl$LOOP_SET_BLOCK_SIZE(r3, 0x4c09, 0x0) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) ioctl$TCXONC(r6, 0x540a, 0x3) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="94000000", @ANYRES16=0x0, @ANYBLOB="00012dbd7000fcdbdf25170000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b00a3b5000006001600ff00000005001200c3e300000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b00b558000006001600070000000500120001000000"], 0x94}, 0x1, 0x0, 0x0, 0x4048080}, 0x40) fstat(r4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xee01, r7, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, "8c098d3b6438c1fbd8180b45d3cc9c164baaee13bf783eb1d66c353f731ae8174ad642085432430c390addf9b2f04d58d3b88e996e773c83fce60fa794a1cc81", "65f436ffca4a06b71c7a963ce778e03a4b090199add92ae18e13b1fbd14dade59e0dbdefaeb3d4c9755b165b06e58e929c10c5a54dbf780080ca9099661800", "e30e5a2a56a49f7cb627fa8ad4bb8aef75848f4aff2fc67a0ff75e1288f59ea9"}) 20:02:57 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp, 0x0, 0x7, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000080), 0x10001, 0x10b382) r2 = memfd_create(&(0x7f0000000900)='.^\xe5\xce\xb2\xc1b#\xf4\x91\xfcS\x96(\xe2\x90\xba-L\xb1^\xe3\xa7\x9b0\xefHEG\x18\xcb\x15\xc1\x1b\x18\xbd\xb6\x14\xe9G\xa6\xbb*\xdff\xe4{2\xd0\x91\x874\xdc(\xa4\xa8?Q\xa6\xee\xb54\xd0\x05.`\xe7\x04@\xff\x83\n\xb9\x12\xaf\x83\x04\x1e\x8b\xca\x17Y\xb6\x94\x99\x90\x9f\xac\xcf\xc1\xb4\xfb\x9c)\xa0xY4\xaf\xe3\xd5R\x012\xd2R', 0x0) fchdir(r0) pwritev(r2, &(0x7f00000004c0)=[{}, {&(0x7f0000000440)="813586c3c380fec40dc94a4d09e82dd7a0a184dec7457c0632b7b8579e01df2f81f750", 0x23}, {&(0x7f0000000580)="f374f709e40b01f33018c9f2efed195927a1c55e2bd180187b3e3e3652f72b735f7b18a1448a70b138788112443abadf137a5eadb24b1d8cf4633334042fa371448ecb1d9f225f1b9d5c92bd1b1370f3936e7d72c9b29a602983ef01d1885aee9b327786fc484dcd751bf072985b4840900d5b5efc9137235c0c3dee77c27a81a57af8d9136309e9d04cc9eb204e125826b802250527ba721a6c84d10a8188212ce07c4c", 0xa4}, {0x0}, {&(0x7f0000000740)}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x81805, 0x2) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r0, r1, 0x0, 0x24002d00) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001540)='/proc/slabinfo\x00', 0x0, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000640)=@req={0x1df, 0x7ff, 0x1, 0x689a9202}, 0x10) r5 = dup3(r2, r4, 0x80000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x10000) ioctl$LOOP_SET_BLOCK_SIZE(r3, 0x4c09, 0x0) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) ioctl$TCXONC(r6, 0x540a, 0x3) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="94000000", @ANYRES16=0x0, @ANYBLOB="00012dbd7000fcdbdf25170000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b00a3b5000006001600ff00000005001200c3e300000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b00b558000006001600070000000500120001000000"], 0x94}, 0x1, 0x0, 0x0, 0x4048080}, 0x40) fstat(r4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xee01, r7, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, "8c098d3b6438c1fbd8180b45d3cc9c164baaee13bf783eb1d66c353f731ae8174ad642085432430c390addf9b2f04d58d3b88e996e773c83fce60fa794a1cc81", "65f436ffca4a06b71c7a963ce778e03a4b090199add92ae18e13b1fbd14dade59e0dbdefaeb3d4c9755b165b06e58e929c10c5a54dbf780080ca9099661800", "e30e5a2a56a49f7cb627fa8ad4bb8aef75848f4aff2fc67a0ff75e1288f59ea9"}) 20:02:57 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp, 0x0, 0x7, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000080), 0x10001, 0x10b382) r2 = memfd_create(&(0x7f0000000900)='.^\xe5\xce\xb2\xc1b#\xf4\x91\xfcS\x96(\xe2\x90\xba-L\xb1^\xe3\xa7\x9b0\xefHEG\x18\xcb\x15\xc1\x1b\x18\xbd\xb6\x14\xe9G\xa6\xbb*\xdff\xe4{2\xd0\x91\x874\xdc(\xa4\xa8?Q\xa6\xee\xb54\xd0\x05.`\xe7\x04@\xff\x83\n\xb9\x12\xaf\x83\x04\x1e\x8b\xca\x17Y\xb6\x94\x99\x90\x9f\xac\xcf\xc1\xb4\xfb\x9c)\xa0xY4\xaf\xe3\xd5R\x012\xd2R', 0x0) fchdir(r0) pwritev(r2, &(0x7f00000004c0)=[{}, {&(0x7f0000000440)="813586c3c380fec40dc94a4d09e82dd7a0a184dec7457c0632b7b8579e01df2f81f750", 0x23}, {&(0x7f0000000580)="f374f709e40b01f33018c9f2efed195927a1c55e2bd180187b3e3e3652f72b735f7b18a1448a70b138788112443abadf137a5eadb24b1d8cf4633334042fa371448ecb1d9f225f1b9d5c92bd1b1370f3936e7d72c9b29a602983ef01d1885aee9b327786fc484dcd751bf072985b4840900d5b5efc9137235c0c3dee77c27a81a57af8d9136309e9d04cc9eb204e125826b802250527ba721a6c84d10a8188212ce07c4c", 0xa4}, {0x0}, {&(0x7f0000000740)}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x81805, 0x2) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r0, r1, 0x0, 0x24002d00) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001540)='/proc/slabinfo\x00', 0x0, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000640)=@req={0x1df, 0x7ff, 0x1, 0x689a9202}, 0x10) r5 = dup3(r2, r4, 0x80000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x10000) ioctl$LOOP_SET_BLOCK_SIZE(r3, 0x4c09, 0x0) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) ioctl$TCXONC(r6, 0x540a, 0x3) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="94000000", @ANYRES16=0x0, @ANYBLOB="00012dbd7000fcdbdf25170000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b00a3b5000006001600ff00000005001200c3e300000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b00b558000006001600070000000500120001000000"], 0x94}, 0x1, 0x0, 0x0, 0x4048080}, 0x40) fstat(r4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xee01, r7, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, "8c098d3b6438c1fbd8180b45d3cc9c164baaee13bf783eb1d66c353f731ae8174ad642085432430c390addf9b2f04d58d3b88e996e773c83fce60fa794a1cc81", "65f436ffca4a06b71c7a963ce778e03a4b090199add92ae18e13b1fbd14dade59e0dbdefaeb3d4c9755b165b06e58e929c10c5a54dbf780080ca9099661800", "e30e5a2a56a49f7cb627fa8ad4bb8aef75848f4aff2fc67a0ff75e1288f59ea9"}) 20:02:57 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp, 0x0, 0x7, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000080), 0x10001, 0x10b382) r2 = memfd_create(&(0x7f0000000900)='.^\xe5\xce\xb2\xc1b#\xf4\x91\xfcS\x96(\xe2\x90\xba-L\xb1^\xe3\xa7\x9b0\xefHEG\x18\xcb\x15\xc1\x1b\x18\xbd\xb6\x14\xe9G\xa6\xbb*\xdff\xe4{2\xd0\x91\x874\xdc(\xa4\xa8?Q\xa6\xee\xb54\xd0\x05.`\xe7\x04@\xff\x83\n\xb9\x12\xaf\x83\x04\x1e\x8b\xca\x17Y\xb6\x94\x99\x90\x9f\xac\xcf\xc1\xb4\xfb\x9c)\xa0xY4\xaf\xe3\xd5R\x012\xd2R', 0x0) fchdir(r0) pwritev(r2, &(0x7f00000004c0)=[{}, {&(0x7f0000000440)="813586c3c380fec40dc94a4d09e82dd7a0a184dec7457c0632b7b8579e01df2f81f750", 0x23}, {&(0x7f0000000580)="f374f709e40b01f33018c9f2efed195927a1c55e2bd180187b3e3e3652f72b735f7b18a1448a70b138788112443abadf137a5eadb24b1d8cf4633334042fa371448ecb1d9f225f1b9d5c92bd1b1370f3936e7d72c9b29a602983ef01d1885aee9b327786fc484dcd751bf072985b4840900d5b5efc9137235c0c3dee77c27a81a57af8d9136309e9d04cc9eb204e125826b802250527ba721a6c84d10a8188212ce07c4c", 0xa4}, {0x0}, {&(0x7f0000000740)}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x81805, 0x2) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r0, r1, 0x0, 0x24002d00) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001540)='/proc/slabinfo\x00', 0x0, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000640)=@req={0x1df, 0x7ff, 0x1, 0x689a9202}, 0x10) r5 = dup3(r2, r4, 0x80000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x10000) ioctl$LOOP_SET_BLOCK_SIZE(r3, 0x4c09, 0x0) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) ioctl$TCXONC(r6, 0x540a, 0x3) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="94000000", @ANYRES16=0x0, @ANYBLOB="00012dbd7000fcdbdf25170000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b00a3b5000006001600ff00000005001200c3e300000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b00b558000006001600070000000500120001000000"], 0x94}, 0x1, 0x0, 0x0, 0x4048080}, 0x40) fstat(r4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xee01, r7, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, "8c098d3b6438c1fbd8180b45d3cc9c164baaee13bf783eb1d66c353f731ae8174ad642085432430c390addf9b2f04d58d3b88e996e773c83fce60fa794a1cc81", "65f436ffca4a06b71c7a963ce778e03a4b090199add92ae18e13b1fbd14dade59e0dbdefaeb3d4c9755b165b06e58e929c10c5a54dbf780080ca9099661800", "e30e5a2a56a49f7cb627fa8ad4bb8aef75848f4aff2fc67a0ff75e1288f59ea9"}) [ 455.204682][T20848] loop3: detected capacity change from 0 to 264192 20:03:01 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp, 0x0, 0x7, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000080), 0x10001, 0x10b382) r2 = memfd_create(&(0x7f0000000900)='.^\xe5\xce\xb2\xc1b#\xf4\x91\xfcS\x96(\xe2\x90\xba-L\xb1^\xe3\xa7\x9b0\xefHEG\x18\xcb\x15\xc1\x1b\x18\xbd\xb6\x14\xe9G\xa6\xbb*\xdff\xe4{2\xd0\x91\x874\xdc(\xa4\xa8?Q\xa6\xee\xb54\xd0\x05.`\xe7\x04@\xff\x83\n\xb9\x12\xaf\x83\x04\x1e\x8b\xca\x17Y\xb6\x94\x99\x90\x9f\xac\xcf\xc1\xb4\xfb\x9c)\xa0xY4\xaf\xe3\xd5R\x012\xd2R', 0x0) fchdir(r0) pwritev(r2, &(0x7f00000004c0)=[{}, {&(0x7f0000000440)="813586c3c380fec40dc94a4d09e82dd7a0a184dec7457c0632b7b8579e01df2f81f750", 0x23}, {&(0x7f0000000580)="f374f709e40b01f33018c9f2efed195927a1c55e2bd180187b3e3e3652f72b735f7b18a1448a70b138788112443abadf137a5eadb24b1d8cf4633334042fa371448ecb1d9f225f1b9d5c92bd1b1370f3936e7d72c9b29a602983ef01d1885aee9b327786fc484dcd751bf072985b4840900d5b5efc9137235c0c3dee77c27a81a57af8d9136309e9d04cc9eb204e125826b802250527ba721a6c84d10a8188212ce07c4c", 0xa4}, {0x0}, {&(0x7f0000000740)}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x81805, 0x2) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r0, r1, 0x0, 0x24002d00) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001540)='/proc/slabinfo\x00', 0x0, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000640)=@req={0x1df, 0x7ff, 0x1, 0x689a9202}, 0x10) r5 = dup3(r2, r4, 0x80000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x10000) ioctl$LOOP_SET_BLOCK_SIZE(r3, 0x4c09, 0x0) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) ioctl$TCXONC(r6, 0x540a, 0x3) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="94000000", @ANYRES16=0x0, @ANYBLOB="00012dbd7000fcdbdf25170000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b00a3b5000006001600ff00000005001200c3e300000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b00b558000006001600070000000500120001000000"], 0x94}, 0x1, 0x0, 0x0, 0x4048080}, 0x40) fstat(r4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xee01, r7, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, "8c098d3b6438c1fbd8180b45d3cc9c164baaee13bf783eb1d66c353f731ae8174ad642085432430c390addf9b2f04d58d3b88e996e773c83fce60fa794a1cc81", "65f436ffca4a06b71c7a963ce778e03a4b090199add92ae18e13b1fbd14dade59e0dbdefaeb3d4c9755b165b06e58e929c10c5a54dbf780080ca9099661800", "e30e5a2a56a49f7cb627fa8ad4bb8aef75848f4aff2fc67a0ff75e1288f59ea9"}) 20:03:01 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp, 0x0, 0x7, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000080), 0x10001, 0x10b382) r2 = memfd_create(&(0x7f0000000900)='.^\xe5\xce\xb2\xc1b#\xf4\x91\xfcS\x96(\xe2\x90\xba-L\xb1^\xe3\xa7\x9b0\xefHEG\x18\xcb\x15\xc1\x1b\x18\xbd\xb6\x14\xe9G\xa6\xbb*\xdff\xe4{2\xd0\x91\x874\xdc(\xa4\xa8?Q\xa6\xee\xb54\xd0\x05.`\xe7\x04@\xff\x83\n\xb9\x12\xaf\x83\x04\x1e\x8b\xca\x17Y\xb6\x94\x99\x90\x9f\xac\xcf\xc1\xb4\xfb\x9c)\xa0xY4\xaf\xe3\xd5R\x012\xd2R', 0x0) fchdir(r0) pwritev(r2, &(0x7f00000004c0)=[{}, {&(0x7f0000000440)="813586c3c380fec40dc94a4d09e82dd7a0a184dec7457c0632b7b8579e01df2f81f750", 0x23}, {&(0x7f0000000580)="f374f709e40b01f33018c9f2efed195927a1c55e2bd180187b3e3e3652f72b735f7b18a1448a70b138788112443abadf137a5eadb24b1d8cf4633334042fa371448ecb1d9f225f1b9d5c92bd1b1370f3936e7d72c9b29a602983ef01d1885aee9b327786fc484dcd751bf072985b4840900d5b5efc9137235c0c3dee77c27a81a57af8d9136309e9d04cc9eb204e125826b802250527ba721a6c84d10a8188212ce07c4c", 0xa4}, {0x0}, {&(0x7f0000000740)}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x81805, 0x2) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r0, r1, 0x0, 0x24002d00) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001540)='/proc/slabinfo\x00', 0x0, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000640)=@req={0x1df, 0x7ff, 0x1, 0x689a9202}, 0x10) r5 = dup3(r2, r4, 0x80000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x10000) ioctl$LOOP_SET_BLOCK_SIZE(r3, 0x4c09, 0x0) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) ioctl$TCXONC(r6, 0x540a, 0x3) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="94000000", @ANYRES16=0x0, @ANYBLOB="00012dbd7000fcdbdf25170000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b00a3b5000006001600ff00000005001200c3e300000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b00b558000006001600070000000500120001000000"], 0x94}, 0x1, 0x0, 0x0, 0x4048080}, 0x40) fstat(r4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xee01, r7, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, "8c098d3b6438c1fbd8180b45d3cc9c164baaee13bf783eb1d66c353f731ae8174ad642085432430c390addf9b2f04d58d3b88e996e773c83fce60fa794a1cc81", "65f436ffca4a06b71c7a963ce778e03a4b090199add92ae18e13b1fbd14dade59e0dbdefaeb3d4c9755b165b06e58e929c10c5a54dbf780080ca9099661800", "e30e5a2a56a49f7cb627fa8ad4bb8aef75848f4aff2fc67a0ff75e1288f59ea9"}) 20:03:01 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000040)="02015500000001000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}, {0x0, 0x0, 0x7ffffffd}, {&(0x7f00000004c0)="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", 0x1bf}]) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 20:03:01 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2001, 0xd2710, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8000, 0x0, 0x400001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7eda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x200000000011, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) readv(r3, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1002}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 20:03:01 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp, 0x0, 0x7, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000080), 0x10001, 0x10b382) r2 = memfd_create(&(0x7f0000000900)='.^\xe5\xce\xb2\xc1b#\xf4\x91\xfcS\x96(\xe2\x90\xba-L\xb1^\xe3\xa7\x9b0\xefHEG\x18\xcb\x15\xc1\x1b\x18\xbd\xb6\x14\xe9G\xa6\xbb*\xdff\xe4{2\xd0\x91\x874\xdc(\xa4\xa8?Q\xa6\xee\xb54\xd0\x05.`\xe7\x04@\xff\x83\n\xb9\x12\xaf\x83\x04\x1e\x8b\xca\x17Y\xb6\x94\x99\x90\x9f\xac\xcf\xc1\xb4\xfb\x9c)\xa0xY4\xaf\xe3\xd5R\x012\xd2R', 0x0) fchdir(r0) pwritev(r2, &(0x7f00000004c0)=[{}, {&(0x7f0000000440)="813586c3c380fec40dc94a4d09e82dd7a0a184dec7457c0632b7b8579e01df2f81f750", 0x23}, {&(0x7f0000000580)="f374f709e40b01f33018c9f2efed195927a1c55e2bd180187b3e3e3652f72b735f7b18a1448a70b138788112443abadf137a5eadb24b1d8cf4633334042fa371448ecb1d9f225f1b9d5c92bd1b1370f3936e7d72c9b29a602983ef01d1885aee9b327786fc484dcd751bf072985b4840900d5b5efc9137235c0c3dee77c27a81a57af8d9136309e9d04cc9eb204e125826b802250527ba721a6c84d10a8188212ce07c4c", 0xa4}, {0x0}, {&(0x7f0000000740)}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x81805, 0x2) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r0, r1, 0x0, 0x24002d00) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001540)='/proc/slabinfo\x00', 0x0, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000640)=@req={0x1df, 0x7ff, 0x1, 0x689a9202}, 0x10) r5 = dup3(r2, r4, 0x80000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x10000) ioctl$LOOP_SET_BLOCK_SIZE(r3, 0x4c09, 0x0) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) ioctl$TCXONC(r6, 0x540a, 0x3) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="94000000", @ANYRES16=0x0, @ANYBLOB="00012dbd7000fcdbdf25170000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b00a3b5000006001600ff00000005001200c3e300000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b00b558000006001600070000000500120001000000"], 0x94}, 0x1, 0x0, 0x0, 0x4048080}, 0x40) fstat(r4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xee01, r7, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, "8c098d3b6438c1fbd8180b45d3cc9c164baaee13bf783eb1d66c353f731ae8174ad642085432430c390addf9b2f04d58d3b88e996e773c83fce60fa794a1cc81", "65f436ffca4a06b71c7a963ce778e03a4b090199add92ae18e13b1fbd14dade59e0dbdefaeb3d4c9755b165b06e58e929c10c5a54dbf780080ca9099661800", "e30e5a2a56a49f7cb627fa8ad4bb8aef75848f4aff2fc67a0ff75e1288f59ea9"}) 20:03:01 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp, 0x0, 0x7, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000080), 0x10001, 0x10b382) r2 = memfd_create(&(0x7f0000000900)='.^\xe5\xce\xb2\xc1b#\xf4\x91\xfcS\x96(\xe2\x90\xba-L\xb1^\xe3\xa7\x9b0\xefHEG\x18\xcb\x15\xc1\x1b\x18\xbd\xb6\x14\xe9G\xa6\xbb*\xdff\xe4{2\xd0\x91\x874\xdc(\xa4\xa8?Q\xa6\xee\xb54\xd0\x05.`\xe7\x04@\xff\x83\n\xb9\x12\xaf\x83\x04\x1e\x8b\xca\x17Y\xb6\x94\x99\x90\x9f\xac\xcf\xc1\xb4\xfb\x9c)\xa0xY4\xaf\xe3\xd5R\x012\xd2R', 0x0) fchdir(r0) pwritev(r2, &(0x7f00000004c0)=[{}, {&(0x7f0000000440)="813586c3c380fec40dc94a4d09e82dd7a0a184dec7457c0632b7b8579e01df2f81f750", 0x23}, {&(0x7f0000000580)="f374f709e40b01f33018c9f2efed195927a1c55e2bd180187b3e3e3652f72b735f7b18a1448a70b138788112443abadf137a5eadb24b1d8cf4633334042fa371448ecb1d9f225f1b9d5c92bd1b1370f3936e7d72c9b29a602983ef01d1885aee9b327786fc484dcd751bf072985b4840900d5b5efc9137235c0c3dee77c27a81a57af8d9136309e9d04cc9eb204e125826b802250527ba721a6c84d10a8188212ce07c4c", 0xa4}, {0x0}, {&(0x7f0000000740)}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x81805, 0x2) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r0, r1, 0x0, 0x24002d00) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001540)='/proc/slabinfo\x00', 0x0, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000640)=@req={0x1df, 0x7ff, 0x1, 0x689a9202}, 0x10) r5 = dup3(r2, r4, 0x80000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x10000) ioctl$LOOP_SET_BLOCK_SIZE(r3, 0x4c09, 0x0) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) ioctl$TCXONC(r6, 0x540a, 0x3) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="94000000", @ANYRES16=0x0, @ANYBLOB="00012dbd7000fcdbdf25170000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b00a3b5000006001600ff00000005001200c3e300000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b00b558000006001600070000000500120001000000"], 0x94}, 0x1, 0x0, 0x0, 0x4048080}, 0x40) fstat(r4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xee01, r7, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, "8c098d3b6438c1fbd8180b45d3cc9c164baaee13bf783eb1d66c353f731ae8174ad642085432430c390addf9b2f04d58d3b88e996e773c83fce60fa794a1cc81", "65f436ffca4a06b71c7a963ce778e03a4b090199add92ae18e13b1fbd14dade59e0dbdefaeb3d4c9755b165b06e58e929c10c5a54dbf780080ca9099661800", "e30e5a2a56a49f7cb627fa8ad4bb8aef75848f4aff2fc67a0ff75e1288f59ea9"}) 20:03:01 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp, 0x0, 0x7, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000080), 0x10001, 0x10b382) r2 = memfd_create(&(0x7f0000000900)='.^\xe5\xce\xb2\xc1b#\xf4\x91\xfcS\x96(\xe2\x90\xba-L\xb1^\xe3\xa7\x9b0\xefHEG\x18\xcb\x15\xc1\x1b\x18\xbd\xb6\x14\xe9G\xa6\xbb*\xdff\xe4{2\xd0\x91\x874\xdc(\xa4\xa8?Q\xa6\xee\xb54\xd0\x05.`\xe7\x04@\xff\x83\n\xb9\x12\xaf\x83\x04\x1e\x8b\xca\x17Y\xb6\x94\x99\x90\x9f\xac\xcf\xc1\xb4\xfb\x9c)\xa0xY4\xaf\xe3\xd5R\x012\xd2R', 0x0) fchdir(r0) pwritev(r2, &(0x7f00000004c0)=[{}, {&(0x7f0000000440)="813586c3c380fec40dc94a4d09e82dd7a0a184dec7457c0632b7b8579e01df2f81f750", 0x23}, {&(0x7f0000000580)="f374f709e40b01f33018c9f2efed195927a1c55e2bd180187b3e3e3652f72b735f7b18a1448a70b138788112443abadf137a5eadb24b1d8cf4633334042fa371448ecb1d9f225f1b9d5c92bd1b1370f3936e7d72c9b29a602983ef01d1885aee9b327786fc484dcd751bf072985b4840900d5b5efc9137235c0c3dee77c27a81a57af8d9136309e9d04cc9eb204e125826b802250527ba721a6c84d10a8188212ce07c4c", 0xa4}, {0x0}, {&(0x7f0000000740)}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x81805, 0x2) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r0, r1, 0x0, 0x24002d00) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001540)='/proc/slabinfo\x00', 0x0, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000640)=@req={0x1df, 0x7ff, 0x1, 0x689a9202}, 0x10) r5 = dup3(r2, r4, 0x80000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x10000) ioctl$LOOP_SET_BLOCK_SIZE(r3, 0x4c09, 0x0) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) ioctl$TCXONC(r6, 0x540a, 0x3) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="94000000", @ANYRES16=0x0, @ANYBLOB="00012dbd7000fcdbdf25170000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b00a3b5000006001600ff00000005001200c3e300000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b00b558000006001600070000000500120001000000"], 0x94}, 0x1, 0x0, 0x0, 0x4048080}, 0x40) fstat(r4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xee01, r7, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, "8c098d3b6438c1fbd8180b45d3cc9c164baaee13bf783eb1d66c353f731ae8174ad642085432430c390addf9b2f04d58d3b88e996e773c83fce60fa794a1cc81", "65f436ffca4a06b71c7a963ce778e03a4b090199add92ae18e13b1fbd14dade59e0dbdefaeb3d4c9755b165b06e58e929c10c5a54dbf780080ca9099661800", "e30e5a2a56a49f7cb627fa8ad4bb8aef75848f4aff2fc67a0ff75e1288f59ea9"}) 20:03:01 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp, 0x0, 0x7, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000080), 0x10001, 0x10b382) r2 = memfd_create(&(0x7f0000000900)='.^\xe5\xce\xb2\xc1b#\xf4\x91\xfcS\x96(\xe2\x90\xba-L\xb1^\xe3\xa7\x9b0\xefHEG\x18\xcb\x15\xc1\x1b\x18\xbd\xb6\x14\xe9G\xa6\xbb*\xdff\xe4{2\xd0\x91\x874\xdc(\xa4\xa8?Q\xa6\xee\xb54\xd0\x05.`\xe7\x04@\xff\x83\n\xb9\x12\xaf\x83\x04\x1e\x8b\xca\x17Y\xb6\x94\x99\x90\x9f\xac\xcf\xc1\xb4\xfb\x9c)\xa0xY4\xaf\xe3\xd5R\x012\xd2R', 0x0) fchdir(r0) pwritev(r2, &(0x7f00000004c0)=[{}, {&(0x7f0000000440)="813586c3c380fec40dc94a4d09e82dd7a0a184dec7457c0632b7b8579e01df2f81f750", 0x23}, {&(0x7f0000000580)="f374f709e40b01f33018c9f2efed195927a1c55e2bd180187b3e3e3652f72b735f7b18a1448a70b138788112443abadf137a5eadb24b1d8cf4633334042fa371448ecb1d9f225f1b9d5c92bd1b1370f3936e7d72c9b29a602983ef01d1885aee9b327786fc484dcd751bf072985b4840900d5b5efc9137235c0c3dee77c27a81a57af8d9136309e9d04cc9eb204e125826b802250527ba721a6c84d10a8188212ce07c4c", 0xa4}, {0x0}, {&(0x7f0000000740)}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x81805, 0x2) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r0, r1, 0x0, 0x24002d00) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001540)='/proc/slabinfo\x00', 0x0, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000640)=@req={0x1df, 0x7ff, 0x1, 0x689a9202}, 0x10) r5 = dup3(r2, r4, 0x80000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x10000) ioctl$LOOP_SET_BLOCK_SIZE(r3, 0x4c09, 0x0) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) ioctl$TCXONC(r6, 0x540a, 0x3) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="94000000", @ANYRES16=0x0, @ANYBLOB="00012dbd7000fcdbdf25170000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b00a3b5000006001600ff00000005001200c3e300000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b00b558000006001600070000000500120001000000"], 0x94}, 0x1, 0x0, 0x0, 0x4048080}, 0x40) fstat(r4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xee01, r7, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, "8c098d3b6438c1fbd8180b45d3cc9c164baaee13bf783eb1d66c353f731ae8174ad642085432430c390addf9b2f04d58d3b88e996e773c83fce60fa794a1cc81", "65f436ffca4a06b71c7a963ce778e03a4b090199add92ae18e13b1fbd14dade59e0dbdefaeb3d4c9755b165b06e58e929c10c5a54dbf780080ca9099661800", "e30e5a2a56a49f7cb627fa8ad4bb8aef75848f4aff2fc67a0ff75e1288f59ea9"}) 20:03:01 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp, 0x0, 0x7, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000080), 0x10001, 0x10b382) r2 = memfd_create(&(0x7f0000000900)='.^\xe5\xce\xb2\xc1b#\xf4\x91\xfcS\x96(\xe2\x90\xba-L\xb1^\xe3\xa7\x9b0\xefHEG\x18\xcb\x15\xc1\x1b\x18\xbd\xb6\x14\xe9G\xa6\xbb*\xdff\xe4{2\xd0\x91\x874\xdc(\xa4\xa8?Q\xa6\xee\xb54\xd0\x05.`\xe7\x04@\xff\x83\n\xb9\x12\xaf\x83\x04\x1e\x8b\xca\x17Y\xb6\x94\x99\x90\x9f\xac\xcf\xc1\xb4\xfb\x9c)\xa0xY4\xaf\xe3\xd5R\x012\xd2R', 0x0) fchdir(r0) pwritev(r2, &(0x7f00000004c0)=[{}, {&(0x7f0000000440)="813586c3c380fec40dc94a4d09e82dd7a0a184dec7457c0632b7b8579e01df2f81f750", 0x23}, {&(0x7f0000000580)="f374f709e40b01f33018c9f2efed195927a1c55e2bd180187b3e3e3652f72b735f7b18a1448a70b138788112443abadf137a5eadb24b1d8cf4633334042fa371448ecb1d9f225f1b9d5c92bd1b1370f3936e7d72c9b29a602983ef01d1885aee9b327786fc484dcd751bf072985b4840900d5b5efc9137235c0c3dee77c27a81a57af8d9136309e9d04cc9eb204e125826b802250527ba721a6c84d10a8188212ce07c4c", 0xa4}, {0x0}, {&(0x7f0000000740)}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x81805, 0x2) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r0, r1, 0x0, 0x24002d00) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001540)='/proc/slabinfo\x00', 0x0, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000640)=@req={0x1df, 0x7ff, 0x1, 0x689a9202}, 0x10) r5 = dup3(r2, r4, 0x80000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x10000) ioctl$LOOP_SET_BLOCK_SIZE(r3, 0x4c09, 0x0) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) ioctl$TCXONC(r6, 0x540a, 0x3) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="94000000", @ANYRES16=0x0, @ANYBLOB="00012dbd7000fcdbdf25170000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b00a3b5000006001600ff00000005001200c3e300000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b00b558000006001600070000000500120001000000"], 0x94}, 0x1, 0x0, 0x0, 0x4048080}, 0x40) fstat(r4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xee01, r7, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, "8c098d3b6438c1fbd8180b45d3cc9c164baaee13bf783eb1d66c353f731ae8174ad642085432430c390addf9b2f04d58d3b88e996e773c83fce60fa794a1cc81", "65f436ffca4a06b71c7a963ce778e03a4b090199add92ae18e13b1fbd14dade59e0dbdefaeb3d4c9755b165b06e58e929c10c5a54dbf780080ca9099661800", "e30e5a2a56a49f7cb627fa8ad4bb8aef75848f4aff2fc67a0ff75e1288f59ea9"}) [ 458.132715][T20871] loop3: detected capacity change from 0 to 264192 20:03:01 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp, 0x0, 0x7, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000080), 0x10001, 0x10b382) r2 = memfd_create(&(0x7f0000000900)='.^\xe5\xce\xb2\xc1b#\xf4\x91\xfcS\x96(\xe2\x90\xba-L\xb1^\xe3\xa7\x9b0\xefHEG\x18\xcb\x15\xc1\x1b\x18\xbd\xb6\x14\xe9G\xa6\xbb*\xdff\xe4{2\xd0\x91\x874\xdc(\xa4\xa8?Q\xa6\xee\xb54\xd0\x05.`\xe7\x04@\xff\x83\n\xb9\x12\xaf\x83\x04\x1e\x8b\xca\x17Y\xb6\x94\x99\x90\x9f\xac\xcf\xc1\xb4\xfb\x9c)\xa0xY4\xaf\xe3\xd5R\x012\xd2R', 0x0) fchdir(r0) pwritev(r2, &(0x7f00000004c0)=[{}, {&(0x7f0000000440)="813586c3c380fec40dc94a4d09e82dd7a0a184dec7457c0632b7b8579e01df2f81f750", 0x23}, {&(0x7f0000000580)="f374f709e40b01f33018c9f2efed195927a1c55e2bd180187b3e3e3652f72b735f7b18a1448a70b138788112443abadf137a5eadb24b1d8cf4633334042fa371448ecb1d9f225f1b9d5c92bd1b1370f3936e7d72c9b29a602983ef01d1885aee9b327786fc484dcd751bf072985b4840900d5b5efc9137235c0c3dee77c27a81a57af8d9136309e9d04cc9eb204e125826b802250527ba721a6c84d10a8188212ce07c4c", 0xa4}, {0x0}, {&(0x7f0000000740)}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x81805, 0x2) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r0, r1, 0x0, 0x24002d00) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001540)='/proc/slabinfo\x00', 0x0, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000640)=@req={0x1df, 0x7ff, 0x1, 0x689a9202}, 0x10) r5 = dup3(r2, r4, 0x80000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x10000) ioctl$LOOP_SET_BLOCK_SIZE(r3, 0x4c09, 0x0) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) ioctl$TCXONC(r6, 0x540a, 0x3) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="94000000", @ANYRES16=0x0, @ANYBLOB="00012dbd7000fcdbdf25170000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b00a3b5000006001600ff00000005001200c3e300000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b00b558000006001600070000000500120001000000"], 0x94}, 0x1, 0x0, 0x0, 0x4048080}, 0x40) fstat(r4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xee01, r7, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, "8c098d3b6438c1fbd8180b45d3cc9c164baaee13bf783eb1d66c353f731ae8174ad642085432430c390addf9b2f04d58d3b88e996e773c83fce60fa794a1cc81", "65f436ffca4a06b71c7a963ce778e03a4b090199add92ae18e13b1fbd14dade59e0dbdefaeb3d4c9755b165b06e58e929c10c5a54dbf780080ca9099661800", "e30e5a2a56a49f7cb627fa8ad4bb8aef75848f4aff2fc67a0ff75e1288f59ea9"}) 20:03:01 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp, 0x0, 0x7, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000080), 0x10001, 0x10b382) r2 = memfd_create(&(0x7f0000000900)='.^\xe5\xce\xb2\xc1b#\xf4\x91\xfcS\x96(\xe2\x90\xba-L\xb1^\xe3\xa7\x9b0\xefHEG\x18\xcb\x15\xc1\x1b\x18\xbd\xb6\x14\xe9G\xa6\xbb*\xdff\xe4{2\xd0\x91\x874\xdc(\xa4\xa8?Q\xa6\xee\xb54\xd0\x05.`\xe7\x04@\xff\x83\n\xb9\x12\xaf\x83\x04\x1e\x8b\xca\x17Y\xb6\x94\x99\x90\x9f\xac\xcf\xc1\xb4\xfb\x9c)\xa0xY4\xaf\xe3\xd5R\x012\xd2R', 0x0) fchdir(r0) pwritev(r2, &(0x7f00000004c0)=[{}, {&(0x7f0000000440)="813586c3c380fec40dc94a4d09e82dd7a0a184dec7457c0632b7b8579e01df2f81f750", 0x23}, {&(0x7f0000000580)="f374f709e40b01f33018c9f2efed195927a1c55e2bd180187b3e3e3652f72b735f7b18a1448a70b138788112443abadf137a5eadb24b1d8cf4633334042fa371448ecb1d9f225f1b9d5c92bd1b1370f3936e7d72c9b29a602983ef01d1885aee9b327786fc484dcd751bf072985b4840900d5b5efc9137235c0c3dee77c27a81a57af8d9136309e9d04cc9eb204e125826b802250527ba721a6c84d10a8188212ce07c4c", 0xa4}, {0x0}, {&(0x7f0000000740)}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x81805, 0x2) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r0, r1, 0x0, 0x24002d00) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001540)='/proc/slabinfo\x00', 0x0, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000640)=@req={0x1df, 0x7ff, 0x1, 0x689a9202}, 0x10) r5 = dup3(r2, r4, 0x80000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x10000) ioctl$LOOP_SET_BLOCK_SIZE(r3, 0x4c09, 0x0) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) ioctl$TCXONC(r6, 0x540a, 0x3) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="94000000", @ANYRES16=0x0, @ANYBLOB="00012dbd7000fcdbdf25170000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b00a3b5000006001600ff00000005001200c3e300000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b00b558000006001600070000000500120001000000"], 0x94}, 0x1, 0x0, 0x0, 0x4048080}, 0x40) fstat(r4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xee01, r7, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, "8c098d3b6438c1fbd8180b45d3cc9c164baaee13bf783eb1d66c353f731ae8174ad642085432430c390addf9b2f04d58d3b88e996e773c83fce60fa794a1cc81", "65f436ffca4a06b71c7a963ce778e03a4b090199add92ae18e13b1fbd14dade59e0dbdefaeb3d4c9755b165b06e58e929c10c5a54dbf780080ca9099661800", "e30e5a2a56a49f7cb627fa8ad4bb8aef75848f4aff2fc67a0ff75e1288f59ea9"}) 20:03:01 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp, 0x0, 0x7, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000080), 0x10001, 0x10b382) r2 = memfd_create(&(0x7f0000000900)='.^\xe5\xce\xb2\xc1b#\xf4\x91\xfcS\x96(\xe2\x90\xba-L\xb1^\xe3\xa7\x9b0\xefHEG\x18\xcb\x15\xc1\x1b\x18\xbd\xb6\x14\xe9G\xa6\xbb*\xdff\xe4{2\xd0\x91\x874\xdc(\xa4\xa8?Q\xa6\xee\xb54\xd0\x05.`\xe7\x04@\xff\x83\n\xb9\x12\xaf\x83\x04\x1e\x8b\xca\x17Y\xb6\x94\x99\x90\x9f\xac\xcf\xc1\xb4\xfb\x9c)\xa0xY4\xaf\xe3\xd5R\x012\xd2R', 0x0) fchdir(r0) pwritev(r2, &(0x7f00000004c0)=[{}, {&(0x7f0000000440)="813586c3c380fec40dc94a4d09e82dd7a0a184dec7457c0632b7b8579e01df2f81f750", 0x23}, {&(0x7f0000000580)="f374f709e40b01f33018c9f2efed195927a1c55e2bd180187b3e3e3652f72b735f7b18a1448a70b138788112443abadf137a5eadb24b1d8cf4633334042fa371448ecb1d9f225f1b9d5c92bd1b1370f3936e7d72c9b29a602983ef01d1885aee9b327786fc484dcd751bf072985b4840900d5b5efc9137235c0c3dee77c27a81a57af8d9136309e9d04cc9eb204e125826b802250527ba721a6c84d10a8188212ce07c4c", 0xa4}, {0x0}, {&(0x7f0000000740)}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x81805, 0x2) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r0, r1, 0x0, 0x24002d00) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001540)='/proc/slabinfo\x00', 0x0, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000640)=@req={0x1df, 0x7ff, 0x1, 0x689a9202}, 0x10) r5 = dup3(r2, r4, 0x80000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x10000) ioctl$LOOP_SET_BLOCK_SIZE(r3, 0x4c09, 0x0) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) ioctl$TCXONC(r6, 0x540a, 0x3) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="94000000", @ANYRES16=0x0, @ANYBLOB="00012dbd7000fcdbdf25170000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b00a3b5000006001600ff00000005001200c3e300000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b00b558000006001600070000000500120001000000"], 0x94}, 0x1, 0x0, 0x0, 0x4048080}, 0x40) fstat(r4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xee01, r7, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, "8c098d3b6438c1fbd8180b45d3cc9c164baaee13bf783eb1d66c353f731ae8174ad642085432430c390addf9b2f04d58d3b88e996e773c83fce60fa794a1cc81", "65f436ffca4a06b71c7a963ce778e03a4b090199add92ae18e13b1fbd14dade59e0dbdefaeb3d4c9755b165b06e58e929c10c5a54dbf780080ca9099661800", "e30e5a2a56a49f7cb627fa8ad4bb8aef75848f4aff2fc67a0ff75e1288f59ea9"}) 20:03:01 executing program 0: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='^#,![@({\xcd.#$\xa0!(\x00') 20:03:01 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp, 0x0, 0x7, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000080), 0x10001, 0x10b382) r2 = memfd_create(&(0x7f0000000900)='.^\xe5\xce\xb2\xc1b#\xf4\x91\xfcS\x96(\xe2\x90\xba-L\xb1^\xe3\xa7\x9b0\xefHEG\x18\xcb\x15\xc1\x1b\x18\xbd\xb6\x14\xe9G\xa6\xbb*\xdff\xe4{2\xd0\x91\x874\xdc(\xa4\xa8?Q\xa6\xee\xb54\xd0\x05.`\xe7\x04@\xff\x83\n\xb9\x12\xaf\x83\x04\x1e\x8b\xca\x17Y\xb6\x94\x99\x90\x9f\xac\xcf\xc1\xb4\xfb\x9c)\xa0xY4\xaf\xe3\xd5R\x012\xd2R', 0x0) fchdir(r0) pwritev(r2, &(0x7f00000004c0)=[{}, {&(0x7f0000000440)="813586c3c380fec40dc94a4d09e82dd7a0a184dec7457c0632b7b8579e01df2f81f750", 0x23}, {&(0x7f0000000580)="f374f709e40b01f33018c9f2efed195927a1c55e2bd180187b3e3e3652f72b735f7b18a1448a70b138788112443abadf137a5eadb24b1d8cf4633334042fa371448ecb1d9f225f1b9d5c92bd1b1370f3936e7d72c9b29a602983ef01d1885aee9b327786fc484dcd751bf072985b4840900d5b5efc9137235c0c3dee77c27a81a57af8d9136309e9d04cc9eb204e125826b802250527ba721a6c84d10a8188212ce07c4c", 0xa4}, {0x0}, {&(0x7f0000000740)}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x81805, 0x2) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r0, r1, 0x0, 0x24002d00) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001540)='/proc/slabinfo\x00', 0x0, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000640)=@req={0x1df, 0x7ff, 0x1, 0x689a9202}, 0x10) r5 = dup3(r2, r4, 0x80000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x10000) ioctl$LOOP_SET_BLOCK_SIZE(r3, 0x4c09, 0x0) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) ioctl$TCXONC(r6, 0x540a, 0x3) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="94000000", @ANYRES16=0x0, @ANYBLOB="00012dbd7000fcdbdf25170000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b00a3b5000006001600ff00000005001200c3e300000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b00b558000006001600070000000500120001000000"], 0x94}, 0x1, 0x0, 0x0, 0x4048080}, 0x40) fstat(r4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xee01, r7, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, "8c098d3b6438c1fbd8180b45d3cc9c164baaee13bf783eb1d66c353f731ae8174ad642085432430c390addf9b2f04d58d3b88e996e773c83fce60fa794a1cc81", "65f436ffca4a06b71c7a963ce778e03a4b090199add92ae18e13b1fbd14dade59e0dbdefaeb3d4c9755b165b06e58e929c10c5a54dbf780080ca9099661800", "e30e5a2a56a49f7cb627fa8ad4bb8aef75848f4aff2fc67a0ff75e1288f59ea9"}) 20:03:01 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp, 0x0, 0x7, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000080), 0x10001, 0x10b382) r2 = memfd_create(&(0x7f0000000900)='.^\xe5\xce\xb2\xc1b#\xf4\x91\xfcS\x96(\xe2\x90\xba-L\xb1^\xe3\xa7\x9b0\xefHEG\x18\xcb\x15\xc1\x1b\x18\xbd\xb6\x14\xe9G\xa6\xbb*\xdff\xe4{2\xd0\x91\x874\xdc(\xa4\xa8?Q\xa6\xee\xb54\xd0\x05.`\xe7\x04@\xff\x83\n\xb9\x12\xaf\x83\x04\x1e\x8b\xca\x17Y\xb6\x94\x99\x90\x9f\xac\xcf\xc1\xb4\xfb\x9c)\xa0xY4\xaf\xe3\xd5R\x012\xd2R', 0x0) fchdir(r0) pwritev(r2, &(0x7f00000004c0)=[{}, {&(0x7f0000000440)="813586c3c380fec40dc94a4d09e82dd7a0a184dec7457c0632b7b8579e01df2f81f750", 0x23}, {&(0x7f0000000580)="f374f709e40b01f33018c9f2efed195927a1c55e2bd180187b3e3e3652f72b735f7b18a1448a70b138788112443abadf137a5eadb24b1d8cf4633334042fa371448ecb1d9f225f1b9d5c92bd1b1370f3936e7d72c9b29a602983ef01d1885aee9b327786fc484dcd751bf072985b4840900d5b5efc9137235c0c3dee77c27a81a57af8d9136309e9d04cc9eb204e125826b802250527ba721a6c84d10a8188212ce07c4c", 0xa4}, {0x0}, {&(0x7f0000000740)}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x81805, 0x2) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r0, r1, 0x0, 0x24002d00) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001540)='/proc/slabinfo\x00', 0x0, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000640)=@req={0x1df, 0x7ff, 0x1, 0x689a9202}, 0x10) r5 = dup3(r2, r4, 0x80000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x10000) ioctl$LOOP_SET_BLOCK_SIZE(r3, 0x4c09, 0x0) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) ioctl$TCXONC(r6, 0x540a, 0x3) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="94000000", @ANYRES16=0x0, @ANYBLOB="00012dbd7000fcdbdf25170000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b00a3b5000006001600ff00000005001200c3e300000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b00b558000006001600070000000500120001000000"], 0x94}, 0x1, 0x0, 0x0, 0x4048080}, 0x40) fstat(r4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xee01, r7, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, "8c098d3b6438c1fbd8180b45d3cc9c164baaee13bf783eb1d66c353f731ae8174ad642085432430c390addf9b2f04d58d3b88e996e773c83fce60fa794a1cc81", "65f436ffca4a06b71c7a963ce778e03a4b090199add92ae18e13b1fbd14dade59e0dbdefaeb3d4c9755b165b06e58e929c10c5a54dbf780080ca9099661800", "e30e5a2a56a49f7cb627fa8ad4bb8aef75848f4aff2fc67a0ff75e1288f59ea9"}) 20:03:01 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp, 0x0, 0x7, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000080), 0x10001, 0x10b382) r2 = memfd_create(&(0x7f0000000900)='.^\xe5\xce\xb2\xc1b#\xf4\x91\xfcS\x96(\xe2\x90\xba-L\xb1^\xe3\xa7\x9b0\xefHEG\x18\xcb\x15\xc1\x1b\x18\xbd\xb6\x14\xe9G\xa6\xbb*\xdff\xe4{2\xd0\x91\x874\xdc(\xa4\xa8?Q\xa6\xee\xb54\xd0\x05.`\xe7\x04@\xff\x83\n\xb9\x12\xaf\x83\x04\x1e\x8b\xca\x17Y\xb6\x94\x99\x90\x9f\xac\xcf\xc1\xb4\xfb\x9c)\xa0xY4\xaf\xe3\xd5R\x012\xd2R', 0x0) fchdir(r0) pwritev(r2, &(0x7f00000004c0)=[{}, {&(0x7f0000000440)="813586c3c380fec40dc94a4d09e82dd7a0a184dec7457c0632b7b8579e01df2f81f750", 0x23}, {&(0x7f0000000580)="f374f709e40b01f33018c9f2efed195927a1c55e2bd180187b3e3e3652f72b735f7b18a1448a70b138788112443abadf137a5eadb24b1d8cf4633334042fa371448ecb1d9f225f1b9d5c92bd1b1370f3936e7d72c9b29a602983ef01d1885aee9b327786fc484dcd751bf072985b4840900d5b5efc9137235c0c3dee77c27a81a57af8d9136309e9d04cc9eb204e125826b802250527ba721a6c84d10a8188212ce07c4c", 0xa4}, {0x0}, {&(0x7f0000000740)}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x81805, 0x2) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r0, r1, 0x0, 0x24002d00) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001540)='/proc/slabinfo\x00', 0x0, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000640)=@req={0x1df, 0x7ff, 0x1, 0x689a9202}, 0x10) r5 = dup3(r2, r4, 0x80000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x10000) ioctl$LOOP_SET_BLOCK_SIZE(r3, 0x4c09, 0x0) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) ioctl$TCXONC(r6, 0x540a, 0x3) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="94000000", @ANYRES16=0x0, @ANYBLOB="00012dbd7000fcdbdf25170000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b00a3b5000006001600ff00000005001200c3e300000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b00b558000006001600070000000500120001000000"], 0x94}, 0x1, 0x0, 0x0, 0x4048080}, 0x40) fstat(r4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xee01, r7, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, "8c098d3b6438c1fbd8180b45d3cc9c164baaee13bf783eb1d66c353f731ae8174ad642085432430c390addf9b2f04d58d3b88e996e773c83fce60fa794a1cc81", "65f436ffca4a06b71c7a963ce778e03a4b090199add92ae18e13b1fbd14dade59e0dbdefaeb3d4c9755b165b06e58e929c10c5a54dbf780080ca9099661800", "e30e5a2a56a49f7cb627fa8ad4bb8aef75848f4aff2fc67a0ff75e1288f59ea9"}) 20:03:02 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000180), 0x7f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x29, 0xd9f, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x125e, &(0x7f0000000000)) 20:03:02 executing program 4: pipe(&(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 20:03:02 executing program 0: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='^#,![@({\xcd.#$\xa0!(\x00') 20:03:02 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp, 0x0, 0x7, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000080), 0x10001, 0x10b382) r2 = memfd_create(&(0x7f0000000900)='.^\xe5\xce\xb2\xc1b#\xf4\x91\xfcS\x96(\xe2\x90\xba-L\xb1^\xe3\xa7\x9b0\xefHEG\x18\xcb\x15\xc1\x1b\x18\xbd\xb6\x14\xe9G\xa6\xbb*\xdff\xe4{2\xd0\x91\x874\xdc(\xa4\xa8?Q\xa6\xee\xb54\xd0\x05.`\xe7\x04@\xff\x83\n\xb9\x12\xaf\x83\x04\x1e\x8b\xca\x17Y\xb6\x94\x99\x90\x9f\xac\xcf\xc1\xb4\xfb\x9c)\xa0xY4\xaf\xe3\xd5R\x012\xd2R', 0x0) fchdir(r0) pwritev(r2, &(0x7f00000004c0)=[{}, {&(0x7f0000000440)="813586c3c380fec40dc94a4d09e82dd7a0a184dec7457c0632b7b8579e01df2f81f750", 0x23}, {&(0x7f0000000580)="f374f709e40b01f33018c9f2efed195927a1c55e2bd180187b3e3e3652f72b735f7b18a1448a70b138788112443abadf137a5eadb24b1d8cf4633334042fa371448ecb1d9f225f1b9d5c92bd1b1370f3936e7d72c9b29a602983ef01d1885aee9b327786fc484dcd751bf072985b4840900d5b5efc9137235c0c3dee77c27a81a57af8d9136309e9d04cc9eb204e125826b802250527ba721a6c84d10a8188212ce07c4c", 0xa4}, {0x0}, {&(0x7f0000000740)}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x81805, 0x2) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r0, r1, 0x0, 0x24002d00) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001540)='/proc/slabinfo\x00', 0x0, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000640)=@req={0x1df, 0x7ff, 0x1, 0x689a9202}, 0x10) r5 = dup3(r2, r4, 0x80000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x10000) ioctl$LOOP_SET_BLOCK_SIZE(r3, 0x4c09, 0x0) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) ioctl$TCXONC(r6, 0x540a, 0x3) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="94000000", @ANYRES16=0x0, @ANYBLOB="00012dbd7000fcdbdf25170000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b00a3b5000006001600ff00000005001200c3e300000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b00b558000006001600070000000500120001000000"], 0x94}, 0x1, 0x0, 0x0, 0x4048080}, 0x40) fstat(r4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xee01, r7, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, "8c098d3b6438c1fbd8180b45d3cc9c164baaee13bf783eb1d66c353f731ae8174ad642085432430c390addf9b2f04d58d3b88e996e773c83fce60fa794a1cc81", "65f436ffca4a06b71c7a963ce778e03a4b090199add92ae18e13b1fbd14dade59e0dbdefaeb3d4c9755b165b06e58e929c10c5a54dbf780080ca9099661800", "e30e5a2a56a49f7cb627fa8ad4bb8aef75848f4aff2fc67a0ff75e1288f59ea9"}) 20:03:02 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp, 0x0, 0x7, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000080), 0x10001, 0x10b382) r2 = memfd_create(&(0x7f0000000900)='.^\xe5\xce\xb2\xc1b#\xf4\x91\xfcS\x96(\xe2\x90\xba-L\xb1^\xe3\xa7\x9b0\xefHEG\x18\xcb\x15\xc1\x1b\x18\xbd\xb6\x14\xe9G\xa6\xbb*\xdff\xe4{2\xd0\x91\x874\xdc(\xa4\xa8?Q\xa6\xee\xb54\xd0\x05.`\xe7\x04@\xff\x83\n\xb9\x12\xaf\x83\x04\x1e\x8b\xca\x17Y\xb6\x94\x99\x90\x9f\xac\xcf\xc1\xb4\xfb\x9c)\xa0xY4\xaf\xe3\xd5R\x012\xd2R', 0x0) fchdir(r0) pwritev(r2, &(0x7f00000004c0)=[{}, {&(0x7f0000000440)="813586c3c380fec40dc94a4d09e82dd7a0a184dec7457c0632b7b8579e01df2f81f750", 0x23}, {&(0x7f0000000580)="f374f709e40b01f33018c9f2efed195927a1c55e2bd180187b3e3e3652f72b735f7b18a1448a70b138788112443abadf137a5eadb24b1d8cf4633334042fa371448ecb1d9f225f1b9d5c92bd1b1370f3936e7d72c9b29a602983ef01d1885aee9b327786fc484dcd751bf072985b4840900d5b5efc9137235c0c3dee77c27a81a57af8d9136309e9d04cc9eb204e125826b802250527ba721a6c84d10a8188212ce07c4c", 0xa4}, {0x0}, {&(0x7f0000000740)}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x81805, 0x2) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r0, r1, 0x0, 0x24002d00) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001540)='/proc/slabinfo\x00', 0x0, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000640)=@req={0x1df, 0x7ff, 0x1, 0x689a9202}, 0x10) r5 = dup3(r2, r4, 0x80000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x10000) ioctl$LOOP_SET_BLOCK_SIZE(r3, 0x4c09, 0x0) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) ioctl$TCXONC(r6, 0x540a, 0x3) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="94000000", @ANYRES16=0x0, @ANYBLOB="00012dbd7000fcdbdf25170000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b00a3b5000006001600ff00000005001200c3e300000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b00b558000006001600070000000500120001000000"], 0x94}, 0x1, 0x0, 0x0, 0x4048080}, 0x40) fstat(r4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xee01, r7, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, "8c098d3b6438c1fbd8180b45d3cc9c164baaee13bf783eb1d66c353f731ae8174ad642085432430c390addf9b2f04d58d3b88e996e773c83fce60fa794a1cc81", "65f436ffca4a06b71c7a963ce778e03a4b090199add92ae18e13b1fbd14dade59e0dbdefaeb3d4c9755b165b06e58e929c10c5a54dbf780080ca9099661800", "e30e5a2a56a49f7cb627fa8ad4bb8aef75848f4aff2fc67a0ff75e1288f59ea9"}) 20:03:02 executing program 2: r0 = syz_io_uring_setup(0x7784, &(0x7f0000000280), &(0x7f0000ffd000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000400)) ppoll(&(0x7f00000003c0)=[{r0}, {r3}], 0x2, 0x0, 0x0, 0x0) 20:03:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000002040000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x8c05, &(0x7f0000000040)={[{@stripe={'stripe', 0x3d, 0x3f}}, {@inode_readahead_blks}]}) 20:03:02 executing program 4: pipe(&(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 20:03:02 executing program 0: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='^#,![@({\xcd.#$\xa0!(\x00') 20:03:02 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000180), 0x7f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x29, 0xd9f, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x125e, &(0x7f0000000000)) 20:03:02 executing program 0: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='^#,![@({\xcd.#$\xa0!(\x00') 20:03:02 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 20:03:02 executing program 4: pipe(&(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) [ 459.067861][T20926] loop3: detected capacity change from 0 to 1024 [ 459.085623][T20926] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 20:03:02 executing program 0: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000180)) timer_create(0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, @thr={0x0, &(0x7f0000000080)="41cb3c55e4b9a862530c1f84ab4e508e20fb75b29f215a1eb8fe6a67d2e1fb025a27baaa8852a940bffc079c"}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019611dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x1, 0x0, 0x0, 0x0, 0x18a, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() wait4(0x0, 0x0, 0x0, 0x0) tkill(r1, 0x36) 20:03:02 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$netlink(0xffffffffffffffff, 0x0, 0x0) [ 459.122919][T20926] EXT4-fs (loop3): revision level too high, forcing read-only mode 20:03:02 executing program 4: pipe(&(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 20:03:02 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$netlink(0xffffffffffffffff, 0x0, 0x0) [ 459.179459][T20926] EXT4-fs (loop3): mounted filesystem without journal. Opts: stripe=0x000000000000003f,inode_readahead_blks=0x0000000000000000,,errors=continue. Quota mode: writeback. 20:03:03 executing program 2: r0 = syz_io_uring_setup(0x7784, &(0x7f0000000280), &(0x7f0000ffd000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000400)) ppoll(&(0x7f00000003c0)=[{r0}, {r3}], 0x2, 0x0, 0x0, 0x0) 20:03:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000002040000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x8c05, &(0x7f0000000040)={[{@stripe={'stripe', 0x3d, 0x3f}}, {@inode_readahead_blks}]}) 20:03:03 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 20:03:03 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 20:03:03 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000180), 0x7f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x29, 0xd9f, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x125e, &(0x7f0000000000)) 20:03:03 executing program 0: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000180)) timer_create(0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, @thr={0x0, &(0x7f0000000080)="41cb3c55e4b9a862530c1f84ab4e508e20fb75b29f215a1eb8fe6a67d2e1fb025a27baaa8852a940bffc079c"}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019611dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x1, 0x0, 0x0, 0x0, 0x18a, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() wait4(0x0, 0x0, 0x0, 0x0) tkill(r1, 0x36) 20:03:03 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 20:03:03 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000180), 0x7f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x29, 0xd9f, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x125e, &(0x7f0000000000)) 20:03:03 executing program 1: r0 = syz_io_uring_setup(0x7784, &(0x7f0000000280), &(0x7f0000ffd000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000400)) ppoll(&(0x7f00000003c0)=[{r0}, {r3}], 0x2, 0x0, 0x0, 0x0) [ 459.976578][T20973] loop3: detected capacity change from 0 to 1024 [ 460.007005][T20973] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 460.066208][T20981] ================================================================== [ 460.074288][T20981] BUG: KCSAN: data-race in __io_cqring_fill_event / io_uring_poll [ 460.082169][T20981] [ 460.084513][T20981] write to 0xffff8881442e2c80 of 4 bytes by task 20968 on cpu 1: [ 460.092214][T20981] __io_cqring_fill_event+0xfd/0x350 [ 460.097502][T20981] io_req_complete_post+0x58/0x540 [ 460.102603][T20981] __io_complete_rw+0x3b5/0x470 [ 460.107441][T20981] io_complete_rw+0x1b/0x20 [ 460.111924][T20981] kiocb_done+0x1b0/0x420 [ 460.116245][T20981] io_issue_sqe+0x36c5/0x6750 [ 460.120910][T20981] __io_queue_sqe+0xe9/0x360 [ 460.125488][T20981] io_submit_sqe+0x1887/0x3360 [ 460.130240][T20981] io_submit_sqes+0x5bd/0xbd0 [ 460.134901][T20981] __se_sys_io_uring_enter+0x1e1/0xa80 [ 460.140372][T20981] __x64_sys_io_uring_enter+0x74/0x80 [ 460.145759][T20981] do_syscall_64+0x4a/0x90 [ 460.150158][T20981] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 460.156052][T20981] [ 460.158376][T20981] read to 0xffff8881442e2c80 of 4 bytes by task 20981 on cpu 0: [ 460.165989][T20981] io_uring_poll+0xcf/0x160 [ 460.170480][T20981] do_sys_poll+0x622/0xc40 [ 460.174892][T20981] __se_sys_ppoll+0x169/0x1b0 [ 460.179555][T20981] __x64_sys_ppoll+0x63/0x70 [ 460.181870][T20973] EXT4-fs (loop3): revision level too high, forcing read-only mode [ 460.184160][T20981] do_syscall_64+0x4a/0x90 [ 460.192466][T20973] EXT4-fs (loop3): mounted filesystem without journal. Opts: stripe=0x000000000000003f,inode_readahead_blks=0x0000000000000000,,errors=continue. Quota mode: writeback. 20:03:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000002040000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x8c05, &(0x7f0000000040)={[{@stripe={'stripe', 0x3d, 0x3f}}, {@inode_readahead_blks}]}) 20:03:03 executing program 0: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000180)) timer_create(0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, @thr={0x0, &(0x7f0000000080)="41cb3c55e4b9a862530c1f84ab4e508e20fb75b29f215a1eb8fe6a67d2e1fb025a27baaa8852a940bffc079c"}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019611dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x1, 0x0, 0x0, 0x0, 0x18a, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() wait4(0x0, 0x0, 0x0, 0x0) tkill(r1, 0x36) 20:03:03 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$netlink(0xffffffffffffffff, 0x0, 0x0) [ 460.196618][T20981] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 460.196641][T20981] [ 460.221508][T20981] value changed: 0x0000249d -> 0x000024a0 [ 460.227213][T20981] [ 460.229522][T20981] Reported by Kernel Concurrency Sanitizer on: [ 460.235657][T20981] CPU: 0 PID: 20981 Comm: syz-executor.2 Tainted: G W 5.13.0-rc5-syzkaller #0 [ 460.245820][T20981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 460.255870][T20981] ================================================================== [ 460.329972][T20999] loop3: detected capacity change from 0 to 1024 [ 460.338331][T20999] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 460.348111][T20999] EXT4-fs (loop3): revision level too high, forcing read-only mode [ 460.356941][T20999] EXT4-fs (loop3): mounted filesystem without journal. Opts: stripe=0x000000000000003f,inode_readahead_blks=0x0000000000000000,,errors=continue. Quota mode: writeback. 20:03:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x80000a, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r1, 0x29, 0x36, &(0x7f0000000100)={0x0, 0x13, '\x00', [@generic={0x7, 0x96, "34cb5c6519d87255e2334c21417813dcf8b15871d87cca79a7d6c71140ba07f4ee16de5f4f3fd54499017ae2c2d05fc4eca6efa884aa7d0c175fb44475b658fe29ba741084d732b2d07f75d303caa7c982f2e03672b7b3acdb037a046581cd2be1918291ecc5ccdbc1e7f4f3ab967cc0b9c8fd46e017e18726ffb0ec21668ca596f3137d4b111e91aae93f7b8177027215b7fe11bb01"}]}, 0xa0) setsockopt$inet6_IPV6_HOPOPTS(r1, 0x29, 0x36, 0x0, 0x0) 20:03:04 executing program 2: r0 = syz_io_uring_setup(0x7784, &(0x7f0000000280), &(0x7f0000ffd000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000400)) ppoll(&(0x7f00000003c0)=[{r0}, {r3}], 0x2, 0x0, 0x0, 0x0) 20:03:04 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0x140, 0x10, 0x713, 0x0, 0x0, {{@in, @in6=@remote}, {@in6=@empty, 0x0, 0x32}, @in6=@empty, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_thresh={0x8}]}, 0x140}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) 20:03:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000002040000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x8c05, &(0x7f0000000040)={[{@stripe={'stripe', 0x3d, 0x3f}}, {@inode_readahead_blks}]}) 20:03:04 executing program 0: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000180)) timer_create(0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, @thr={0x0, &(0x7f0000000080)="41cb3c55e4b9a862530c1f84ab4e508e20fb75b29f215a1eb8fe6a67d2e1fb025a27baaa8852a940bffc079c"}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019611dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x1, 0x0, 0x0, 0x0, 0x18a, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() wait4(0x0, 0x0, 0x0, 0x0) tkill(r1, 0x36) 20:03:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x80000a, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r1, 0x29, 0x36, &(0x7f0000000100)={0x0, 0x13, '\x00', [@generic={0x7, 0x96, "34cb5c6519d87255e2334c21417813dcf8b15871d87cca79a7d6c71140ba07f4ee16de5f4f3fd54499017ae2c2d05fc4eca6efa884aa7d0c175fb44475b658fe29ba741084d732b2d07f75d303caa7c982f2e03672b7b3acdb037a046581cd2be1918291ecc5ccdbc1e7f4f3ab967cc0b9c8fd46e017e18726ffb0ec21668ca596f3137d4b111e91aae93f7b8177027215b7fe11bb01"}]}, 0xa0) setsockopt$inet6_IPV6_HOPOPTS(r1, 0x29, 0x36, 0x0, 0x0) [ 460.839608][T21011] loop3: detected capacity change from 0 to 1024 [ 460.851097][T21011] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 460.873192][T21011] EXT4-fs (loop3): revision level too high, forcing read-only mode 20:03:04 executing program 1: r0 = syz_io_uring_setup(0x7784, &(0x7f0000000280), &(0x7f0000ffd000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000400)) ppoll(&(0x7f00000003c0)=[{r0}, {r3}], 0x2, 0x0, 0x0, 0x0) [ 460.882068][T21011] EXT4-fs (loop3): mounted filesystem without journal. Opts: stripe=0x000000000000003f,inode_readahead_blks=0x0000000000000000,,errors=continue. Quota mode: writeback. [ 460.940817][T21030] ================================================================== [ 460.948900][T21030] BUG: KCSAN: data-race in do_sys_poll / pollwake [ 460.955310][T21030] [ 460.957613][T21030] write to 0xffffc9000135fc20 of 4 bytes by task 21019 on cpu 0: [ 460.965303][T21030] pollwake+0xa7/0xf0 [ 460.969278][T21030] __wake_up_common+0xbc/0x130 [ 460.974028][T21030] __wake_up+0x80/0xc0 [ 460.978083][T21030] io_cqring_ev_posted+0x100/0x230 [ 460.983180][T21030] io_req_complete_post+0x30d/0x540 [ 460.988359][T21030] __io_complete_rw+0x3b5/0x470 [ 460.993190][T21030] io_complete_rw+0x1b/0x20 [ 460.997701][T21030] kiocb_done+0x1b0/0x420 [ 461.002042][T21030] io_issue_sqe+0x36c5/0x6750 [ 461.006729][T21030] __io_queue_sqe+0xe9/0x360 [ 461.011312][T21030] io_submit_sqe+0x1887/0x3360 [ 461.016091][T21030] io_submit_sqes+0x5bd/0xbd0 [ 461.020766][T21030] __se_sys_io_uring_enter+0x1e1/0xa80 [ 461.026230][T21030] __x64_sys_io_uring_enter+0x74/0x80 [ 461.031603][T21030] do_syscall_64+0x4a/0x90 [ 461.036037][T21030] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 461.041929][T21030] [ 461.044245][T21030] read to 0xffffc9000135fc20 of 4 bytes by task 21030 on cpu 1: [ 461.051862][T21030] do_sys_poll+0x9e2/0xc40 [ 461.056267][T21030] __se_sys_ppoll+0x169/0x1b0 [ 461.060933][T21030] __x64_sys_ppoll+0x63/0x70 [ 461.065509][T21030] do_syscall_64+0x4a/0x90 [ 461.069904][T21030] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 461.075783][T21030] [ 461.078090][T21030] value changed: 0x00000000 -> 0x00000001 [ 461.083786][T21030] 20:03:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x80000a, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r1, 0x29, 0x36, &(0x7f0000000100)={0x0, 0x13, '\x00', [@generic={0x7, 0x96, "34cb5c6519d87255e2334c21417813dcf8b15871d87cca79a7d6c71140ba07f4ee16de5f4f3fd54499017ae2c2d05fc4eca6efa884aa7d0c175fb44475b658fe29ba741084d732b2d07f75d303caa7c982f2e03672b7b3acdb037a046581cd2be1918291ecc5ccdbc1e7f4f3ab967cc0b9c8fd46e017e18726ffb0ec21668ca596f3137d4b111e91aae93f7b8177027215b7fe11bb01"}]}, 0xa0) setsockopt$inet6_IPV6_HOPOPTS(r1, 0x29, 0x36, 0x0, 0x0) 20:03:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) writev(r2, &(0x7f0000000580)=[{&(0x7f0000000340)="ac", 0x1}], 0x1) recvfrom$inet(r1, 0x0, 0x0, 0x2, 0x0, 0x0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 20:03:04 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000500), 0x6000, &(0x7f0000000580)) [ 461.086089][T21030] Reported by Kernel Concurrency Sanitizer on: [ 461.092233][T21030] CPU: 1 PID: 21030 Comm: syz-executor.2 Tainted: G W 5.13.0-rc5-syzkaller #0 [ 461.102369][T21030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 461.112424][T21030] ================================================================== 20:03:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x80000a, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r1, 0x29, 0x36, &(0x7f0000000100)={0x0, 0x13, '\x00', [@generic={0x7, 0x96, "34cb5c6519d87255e2334c21417813dcf8b15871d87cca79a7d6c71140ba07f4ee16de5f4f3fd54499017ae2c2d05fc4eca6efa884aa7d0c175fb44475b658fe29ba741084d732b2d07f75d303caa7c982f2e03672b7b3acdb037a046581cd2be1918291ecc5ccdbc1e7f4f3ab967cc0b9c8fd46e017e18726ffb0ec21668ca596f3137d4b111e91aae93f7b8177027215b7fe11bb01"}]}, 0xa0) setsockopt$inet6_IPV6_HOPOPTS(r1, 0x29, 0x36, 0x0, 0x0) [ 461.149566][T21010] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=18432 sclass=netlink_xfrm_socket pid=21010 comm=syz-executor.5 20:03:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) writev(r2, &(0x7f0000000580)=[{&(0x7f0000000340)="ac", 0x1}], 0x1) recvfrom$inet(r1, 0x0, 0x0, 0x2, 0x0, 0x0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 20:03:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) writev(r2, &(0x7f0000000580)=[{&(0x7f0000000340)="ac", 0x1}], 0x1) recvfrom$inet(r1, 0x0, 0x0, 0x2, 0x0, 0x0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) [ 461.196890][T21010] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=35144 sclass=netlink_xfrm_socket pid=21010 comm=syz-executor.5 [ 461.214212][T21010] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=51016 sclass=netlink_xfrm_socket pid=21010 comm=syz-executor.5 [ 461.235990][T21010] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=17766 sclass=netlink_xfrm_socket pid=21010 comm=syz-executor.5 [ 461.252592][T21010] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=3942 sclass=netlink_xfrm_socket pid=21010 comm=syz-executor.5 [ 461.278853][T21010] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=65466 sclass=netlink_xfrm_socket pid=21010 comm=syz-executor.5 [ 461.297875][T21010] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=19456 sclass=netlink_xfrm_socket pid=21010 comm=syz-executor.5 [ 461.314950][T21010] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=34125 sclass=netlink_xfrm_socket pid=21010 comm=syz-executor.5 [ 461.342895][T21010] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=35656 sclass=netlink_xfrm_socket pid=21010 comm=syz-executor.5 [ 461.366581][T21010] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=21010 comm=syz-executor.5 20:03:05 executing program 2: r0 = syz_io_uring_setup(0x7784, &(0x7f0000000280), &(0x7f0000ffd000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000400)) ppoll(&(0x7f00000003c0)=[{r0}, {r3}], 0x2, 0x0, 0x0, 0x0) 20:03:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) writev(r2, &(0x7f0000000580)=[{&(0x7f0000000340)="ac", 0x1}], 0x1) recvfrom$inet(r1, 0x0, 0x0, 0x2, 0x0, 0x0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 20:03:05 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000500), 0x6000, &(0x7f0000000580)) 20:03:05 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) writev(r2, &(0x7f0000000580)=[{&(0x7f0000000340)="ac", 0x1}], 0x1) recvfrom$inet(r1, 0x0, 0x0, 0x2, 0x0, 0x0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 20:03:05 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0x140, 0x10, 0x713, 0x0, 0x0, {{@in, @in6=@remote}, {@in6=@empty, 0x0, 0x32}, @in6=@empty, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_thresh={0x8}]}, 0x140}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) 20:03:05 executing program 1: r0 = syz_io_uring_setup(0x7784, &(0x7f0000000280), &(0x7f0000ffd000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000400)) ppoll(&(0x7f00000003c0)=[{r0}, {r3}], 0x2, 0x0, 0x0, 0x0) 20:03:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) writev(r2, &(0x7f0000000580)=[{&(0x7f0000000340)="ac", 0x1}], 0x1) recvfrom$inet(r1, 0x0, 0x0, 0x2, 0x0, 0x0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 20:03:05 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) writev(r2, &(0x7f0000000580)=[{&(0x7f0000000340)="ac", 0x1}], 0x1) recvfrom$inet(r1, 0x0, 0x0, 0x2, 0x0, 0x0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 20:03:05 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000500), 0x6000, &(0x7f0000000580)) 20:03:05 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0x140, 0x10, 0x713, 0x0, 0x0, {{@in, @in6=@remote}, {@in6=@empty, 0x0, 0x32}, @in6=@empty, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_thresh={0x8}]}, 0x140}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) 20:03:05 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) writev(r2, &(0x7f0000000580)=[{&(0x7f0000000340)="ac", 0x1}], 0x1) recvfrom$inet(r1, 0x0, 0x0, 0x2, 0x0, 0x0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 20:03:05 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2403, 0xffffffffffffffff) [ 462.008619][T21088] ================================================================== [ 462.016739][T21088] BUG: KCSAN: data-race in io_submit_sqes / io_uring_poll [ 462.023841][T21088] [ 462.026153][T21088] write to 0xffff8881442fb850 of 4 bytes by task 21084 on cpu 1: [ 462.033851][T21088] io_submit_sqes+0x544/0xbd0 [ 462.038518][T21088] __se_sys_io_uring_enter+0x1e1/0xa80 [ 462.043977][T21088] __x64_sys_io_uring_enter+0x74/0x80 [ 462.049336][T21088] do_syscall_64+0x4a/0x90 [ 462.053746][T21088] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 462.059641][T21088] [ 462.061961][T21088] read to 0xffff8881442fb850 of 4 bytes by task 21088 on cpu 0: [ 462.069575][T21088] io_uring_poll+0x94/0x160 [ 462.074074][T21088] do_sys_poll+0x622/0xc40 [ 462.078481][T21088] __se_sys_ppoll+0x169/0x1b0 [ 462.083198][T21088] __x64_sys_ppoll+0x63/0x70 [ 462.087786][T21088] do_syscall_64+0x4a/0x90 [ 462.092206][T21088] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 462.098100][T21088] [ 462.100401][T21088] value changed: 0x000012cc -> 0x000012d9 [ 462.106094][T21088] [ 462.108423][T21088] Reported by Kernel Concurrency Sanitizer on: [ 462.114648][T21088] CPU: 0 PID: 21088 Comm: syz-executor.1 Tainted: G W 5.13.0-rc5-syzkaller #0 [ 462.124861][T21088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 462.134929][T21088] ================================================================== 20:03:05 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0x140, 0x10, 0x713, 0x0, 0x0, {{@in, @in6=@remote}, {@in6=@empty, 0x0, 0x32}, @in6=@empty, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_thresh={0x8}]}, 0x140}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) 20:03:05 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000500), 0x6000, &(0x7f0000000580)) 20:03:05 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2403, 0xffffffffffffffff) 20:03:05 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) writev(r2, &(0x7f0000000580)=[{&(0x7f0000000340)="ac", 0x1}], 0x1) recvfrom$inet(r1, 0x0, 0x0, 0x2, 0x0, 0x0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 20:03:06 executing program 2: r0 = eventfd(0x0) r1 = socket$inet(0x2, 0x1, 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) r3 = memfd_create(&(0x7f0000000140)='/dev/kvm\x00', 0x0) io_submit(r2, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x1, r0}]) 20:03:06 executing program 2: r0 = eventfd(0x0) r1 = socket$inet(0x2, 0x1, 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) r3 = memfd_create(&(0x7f0000000140)='/dev/kvm\x00', 0x0) io_submit(r2, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x1, r0}]) 20:03:06 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2403, 0xffffffffffffffff) 20:03:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) writev(r2, &(0x7f0000000580)=[{&(0x7f0000000340)="ac", 0x1}], 0x1) recvfrom$inet(r1, 0x0, 0x0, 0x2, 0x0, 0x0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 20:03:06 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') getdents64(r0, &(0x7f0000000040)=""/127, 0x7f) 20:03:06 executing program 1: sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@mcast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x32}, 0x0, @in=@private, 0x0, 0x4, 0x0, 0x4}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 20:03:06 executing program 0: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) [ 462.771577][ T25] kauditd_printk_skb: 23 callbacks suppressed [ 462.771587][ T25] audit: type=1326 audit(1623355386.171:2176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=21118 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 20:03:06 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') getdents64(r0, &(0x7f0000000040)=""/127, 0x7f) [ 462.825362][ T25] audit: type=1326 audit(1623355386.191:2177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=21118 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=257 compat=0 ip=0x4196c4 code=0x7ffc0000 [ 462.853308][T21129] PM: suspend entry (deep) 20:03:06 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2403, 0xffffffffffffffff) 20:03:06 executing program 1: sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@mcast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x32}, 0x0, @in=@private, 0x0, 0x4, 0x0, 0x4}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 20:03:06 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') getdents64(r0, &(0x7f0000000040)=""/127, 0x7f) [ 462.856793][ T25] audit: type=1326 audit(1623355386.191:2178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=21118 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=257 compat=0 ip=0x4196c4 code=0x7ffc0000 [ 462.900673][T21129] Filesystems sync: 0.042 seconds [ 462.920470][T21129] Freezing user space processes ... [ 462.926721][ T25] audit: type=1326 audit(1623355386.191:2179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=21118 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 462.956285][ T25] audit: type=1326 audit(1623355386.191:2180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=21118 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=217 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 462.980427][ T25] audit: type=1326 audit(1623355386.191:2181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=21118 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 463.004608][ T25] audit: type=1326 audit(1623355386.191:2182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=21118 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=157 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 463.028739][ T25] audit: type=1326 audit(1623355386.211:2183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=21118 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 463.052771][ T25] audit: type=1326 audit(1623355386.211:2184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=21118 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=257 compat=0 ip=0x4196c4 code=0x7ffc0000 [ 463.076911][ T25] audit: type=1326 audit(1623355386.211:2185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=21118 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=257 compat=0 ip=0x4196c4 code=0x7ffc0000