80211(0x0, 0xffffffffffffffff) creat(0x0, 0x0) sendmsg$NL80211_CMD_SET_WIPHY(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={&(0x7f0000000000)={0x38, r2, 0x301, 0x0, 0x0, {{}, {@void, @val={0x8}, @val={0xc}}}, [@NL80211_ATTR_VENDOR_ID={0x8}, @NL80211_ATTR_VENDOR_SUBCMD={0x10}]}, 0x38}}, 0x0) [ 571.265839][T27579] loop4: detected capacity change from 0 to 264192 [ 571.299290][T27588] netlink: 4548 bytes leftover after parsing attributes in process `syz-executor.3'. [ 571.310575][T27576] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 571.320778][T27576] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 571.330360][T27591] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 571.339642][T27590] netlink: 4548 bytes leftover after parsing attributes in process `syz-executor.3'. [ 571.349366][T27579] EXT4-fs (loop4): 1 orphan inode deleted [ 571.355129][T27579] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 13:09:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012100)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x282, 0x11580}], 0x0, &(0x7f0000013c00)) 13:09:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000400)=0x7fffffff, 0x4) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto$inet6(r0, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0xfffffffffffffee0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 13:09:19 executing program 5: syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) creat(0x0, 0x0) sendmsg$NL80211_CMD_SET_WIPHY(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={&(0x7f0000000000)={0x38, r2, 0x301, 0x0, 0x0, {{}, {@void, @val={0x8}, @val={0xc}}}, [@NL80211_ATTR_VENDOR_ID={0x8}, @NL80211_ATTR_VENDOR_SUBCMD={0x10}]}, 0x38}}, 0x0) [ 571.366526][T27579] ext4 filesystem being mounted at /root/syzkaller-testdir975736435/syzkaller.8AErXM/878/file0 supports timestamps until 2038 (0x7fffffff) [ 571.366869][T27594] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 571.439767][T27598] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 571.467399][T27604] loop4: detected capacity change from 0 to 264192 [ 571.504682][T27604] EXT4-fs (loop4): 1 orphan inode deleted [ 571.510591][T27604] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 571.532021][T27604] ext4 filesystem being mounted at /root/syzkaller-testdir975736435/syzkaller.8AErXM/879/file0 supports timestamps until 2038 (0x7fffffff) 13:09:20 executing program 5: syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) creat(0x0, 0x0) sendmsg$NL80211_CMD_SET_WIPHY(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={&(0x7f0000000000)={0x38, r2, 0x301, 0x0, 0x0, {{}, {@void, @val={0x8}, @val={0xc}}}, [@NL80211_ATTR_VENDOR_ID={0x8}, @NL80211_ATTR_VENDOR_SUBCMD={0x10}]}, 0x38}}, 0x0) 13:09:20 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r0, &(0x7f0000003d80)=[{&(0x7f0000001ac0)=""/73, 0x49}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f0000000640)=[{&(0x7f00000006c0)=""/206, 0xce}], 0x1, 0x9fa, 0x0) 13:09:20 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) r3 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x8905, &(0x7f0000000140)) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000900)={r2, 0x2a, 0x80}) bind$inet(r1, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r1, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r4 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r4, 0xc038943b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvfrom(r1, &(0x7f0000000480)=""/110, 0xfffffe32, 0x734, 0x0, 0xffffffffffffff39) r5 = socket$netlink(0x10, 0x3, 0x0) writev(r5, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r5, &(0x7f00000001c0)=[{&(0x7f00000002c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad00000000000006040000000000000000f528c0817f", 0x3c}], 0x1) 13:09:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000400)=0x7fffffff, 0x4) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto$inet6(r0, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0xfffffffffffffee0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 13:09:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012100)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="ed41000000080000d2f4655fd2f4655fd2f4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000003ad464bc000000000000000000000000000000000000000000000000ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000831f2e05000000000000000000000000000000000000000000000000ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3833303138383932382f66696c65302f66696c653000000000000000000000000000000000000000000000790726b3000000000000000000000000000000000000000000000000ed8100000a000000d2f4655fd2f4655fd2f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000a32dcc89210000000000000000000000000000000000000000000000ed81000028230000d2f4655fd2f4655fd2f4655f00000000000002001400000000000800010000000af3010004000000000000000000000005000000260000000000000000000000000000000000000000000000000000000000000000000000000000008ae01bcd000000000000000000000000000000000000000000000000ed81", 0x282, 0x11580}], 0x0, &(0x7f0000013c00)) 13:09:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x6, &(0x7f0000002000)={0x1}) fcntl$lock(r0, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x800, 0x1}) fcntl$lock(r0, 0x7, &(0x7f0000000100)) [ 572.028218][T27587] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 572.036337][T27576] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 13:09:20 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000200), 0x0, 0x0) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000240)=""/246) [ 572.089398][T27623] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 572.114344][T27626] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 572.122684][T27627] loop4: detected capacity change from 0 to 264192 13:09:20 executing program 5: syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) creat(0x0, 0x0) sendmsg$NL80211_CMD_SET_WIPHY(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={&(0x7f0000000000)={0x38, r2, 0x301, 0x0, 0x0, {{}, {@void, @val={0x8}, @val={0xc}}}, [@NL80211_ATTR_VENDOR_ID={0x8}, @NL80211_ATTR_VENDOR_SUBCMD={0x10}]}, 0x38}}, 0x0) 13:09:20 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) r3 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x8905, &(0x7f0000000140)) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000900)={r2, 0x2a, 0x80}) bind$inet(r1, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r1, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r4 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r4, 0xc038943b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvfrom(r1, &(0x7f0000000480)=""/110, 0xfffffe32, 0x734, 0x0, 0xffffffffffffff39) r5 = socket$netlink(0x10, 0x3, 0x0) writev(r5, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r5, &(0x7f00000001c0)=[{&(0x7f00000002c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad00000000000006040000000000000000f528c0817f", 0x3c}], 0x1) [ 572.152407][T27626] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 572.177342][T27636] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 572.187836][T27626] syz-executor.1 (27626) used greatest stack depth: 10400 bytes left 13:09:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x41, &(0x7f0000000140)="7430abdd777e5d2a816eac50bdca88577f315f96764e1821a759a9d88c08ef11c583ffa106d883c8213ef307a379bd7e425cd1b71f1f3f03322fe00d534fd8d2f6"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 13:09:20 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x10001, 0x3) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x30, &(0x7f00000000c0)={{{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@private0}, 0x0, @in=@local}}, 0xe8) [ 572.222559][T27627] __quota_error: 12 callbacks suppressed [ 572.222570][T27627] Quota error (device loop4): write_blk: dquota write failed [ 572.235623][T27627] Quota error (device loop4): qtree_write_dquot: Error -28 occurred while creating quota [ 572.245606][T27627] Quota error (device loop4): write_blk: dquota write failed [ 572.252995][T27627] Quota error (device loop4): qtree_write_dquot: Error -28 occurred while creating quota 13:09:20 executing program 3: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000080)=0x1) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x49) signalfd(r0, &(0x7f0000000040), 0x8) 13:09:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x41, &(0x7f0000000140)="7430abdd777e5d2a816eac50bdca88577f315f96764e1821a759a9d88c08ef11c583ffa106d883c8213ef307a379bd7e425cd1b71f1f3f03322fe00d534fd8d2f6"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) [ 572.278310][T27627] Quota error (device loop4): write_blk: dquota write failed [ 572.285780][T27627] Quota error (device loop4): qtree_write_dquot: Error -28 occurred while creating quota [ 572.295751][T27627] EXT4-fs (loop4): 1 orphan inode deleted [ 572.301530][T27627] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 13:09:20 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000004c0)="66530700ae897094e71b0fa1f107000000364603812c66538d750f6ee1d0014e3f0500bb9fb045f2d1c190926c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb298802d8dcbf11169c111c145129d6f9f6c1f3b18d6d352507f7018b311fef2c560001000000000000fb8005128e7e4d939955f8ac296203784000400f573fbf0000fdffffffffeb95128ce7ec033dc0a380543b320be1c1bb99bb063fb6093569656a0bda31b0040015f033270100008cfcd61dc4a7e6a5dd57069df1cd265246e1d8292f19a49f95586b92995b4264045df05363f23dc9ef8a0a460cad29288ac6bb83dc86104434ae3f69961215d3a59312023175bfa865f39f9494d10000000091d47e8045b380d54eeea225513ac77a8cda59fd4614c3704cb562a139f9dbe8e22cea7ca03f482401ebed6e1ea2e16354a3a552df61a9456b7487c2cbb97f18b1a3463566329ed63818eee3569d154d5b5abe3819f7b6d26ea96aa3e5ba73d9cd763f265ca21a1b6afc423bd24add4c023b1fd6f4313c5643dd7d3601bc3f8273d572532e8113f2f79dcaba4c06ae85594f6363c719f16d9e6b3ce08f563fa009bfadfbb23c7cebd52269f5", 0x1b2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x7) 13:09:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000040000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012100)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x282, 0x11580}], 0x0, &(0x7f0000013c00)) [ 572.318911][T27627] ext4 filesystem being mounted at /root/syzkaller-testdir975736435/syzkaller.8AErXM/880/file0 supports timestamps until 2038 (0x7fffffff) [ 572.337856][T27657] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 572.368057][T27657] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 13:09:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x41, &(0x7f0000000140)="7430abdd777e5d2a816eac50bdca88577f315f96764e1821a759a9d88c08ef11c583ffa106d883c8213ef307a379bd7e425cd1b71f1f3f03322fe00d534fd8d2f6"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 13:09:20 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clock_adjtime(0x0, &(0x7f00000001c0)={0xffffffffffffff57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff9f802e4c, 0x3b9ac9ff}) 13:09:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x41, &(0x7f0000000140)="7430abdd777e5d2a816eac50bdca88577f315f96764e1821a759a9d88c08ef11c583ffa106d883c8213ef307a379bd7e425cd1b71f1f3f03322fe00d534fd8d2f6"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 13:09:20 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000004c0)="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", 0x1b2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x7) 13:09:20 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clock_adjtime(0x0, &(0x7f00000001c0)={0xffffffffffffff57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff9f802e4c, 0x3b9ac9ff}) [ 572.499362][T27682] loop4: detected capacity change from 0 to 264192 [ 572.574739][T27682] Quota error (device loop4): write_blk: dquota write failed [ 572.582230][T27682] Quota error (device loop4): qtree_write_dquot: Error -28 occurred while creating quota [ 572.604249][T27682] Quota error (device loop4): write_blk: dquota write failed [ 572.611744][T27682] Quota error (device loop4): qtree_write_dquot: Error -28 occurred while creating quota [ 572.628256][T27682] EXT4-fs (loop4): 1 orphan inode deleted [ 572.634044][T27682] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 572.658535][T27682] ext4 filesystem being mounted at /root/syzkaller-testdir975736435/syzkaller.8AErXM/881/file0 supports timestamps until 2038 (0x7fffffff) 13:09:21 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) r3 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x8905, &(0x7f0000000140)) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000900)={r2, 0x2a, 0x80}) bind$inet(r1, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r1, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r4 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r4, 0xc038943b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvfrom(r1, &(0x7f0000000480)=""/110, 0xfffffe32, 0x734, 0x0, 0xffffffffffffff39) r5 = socket$netlink(0x10, 0x3, 0x0) writev(r5, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r5, &(0x7f00000001c0)=[{&(0x7f00000002c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad00000000000006040000000000000000f528c0817f", 0x3c}], 0x1) 13:09:21 executing program 2: fsmount(0xffffffffffffffff, 0x0, 0xce6ebaf79ab1e385) 13:09:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clock_adjtime(0x0, &(0x7f00000001c0)={0xffffffffffffff57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff9f802e4c, 0x3b9ac9ff}) [ 573.199632][T27713] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 573.209340][T27713] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 13:09:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) setreuid(0xee01, 0xffffffffffffffff) keyctl$session_to_parent(0x12) 13:09:21 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x2) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) 13:09:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clock_adjtime(0x0, &(0x7f00000001c0)={0xffffffffffffff57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff9f802e4c, 0x3b9ac9ff}) 13:09:21 executing program 2: r0 = syz_io_uring_setup(0x1701, &(0x7f0000000180), &(0x7f0000ee8000/0x3000)=nil, &(0x7f00006d4000/0x1000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000580)=@IORING_OP_REMOVE_BUFFERS, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_LINK_TIMEOUT={0xf, 0x5, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x77359400}}, 0x6a97) syz_io_uring_submit(r1, r2, &(0x7f00000004c0)=@IORING_OP_NOP={0x0, 0x3}, 0x0) syz_io_uring_setup(0x2de7, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) r5 = io_uring_setup(0x1c3e, &(0x7f0000000180)) r6 = socket$packet(0x11, 0x3, 0x300) r7 = dup(r6) syz_io_uring_submit(r3, r2, &(0x7f0000000300)=@IORING_OP_SPLICE={0x1e, 0x2, 0x0, @fd=r5, 0x0, {}, 0x0, 0x0, 0x0, {0x0, 0x0, r7}}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000000)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_STATX={0x15, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0xfffffffc) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) 13:09:21 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000080), 0x200001, 0x1c3342) pwritev(r0, &(0x7f0000000440)=[{&(0x7f0000000740)='\x00', 0x1}, {&(0x7f0000000480)="00bb5194", 0x4}], 0x2, 0x0, 0x0) 13:09:21 executing program 0: r0 = syz_io_uring_setup(0x2de1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) r3 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x3000)=nil, &(0x7f0000737000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000040)) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x4, 0x0, @fd=r3, 0x0, 0x0, 0x0, 0x0, 0x0, {0xffff}}, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) 13:09:21 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="66530700ae897094e71b0fb1f147a8378f364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb298802d8f6c1f3b18d6d352507f7018b31a53bad1e", 0x5a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 13:09:23 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000004c0)="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", 0x1b2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x7) 13:09:23 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40086607, &(0x7f0000000000)={0x80000}) 13:09:23 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x11, &(0x7f0000000180)={'filter\x00', 0x2, [{}, {}]}, 0x48) 13:09:23 executing program 4: eventfd2(0x0, 0x0) io_setup(0x3, &(0x7f00000000c0)=0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x8, 0x0, r1, 0x0}, 0x0]) 13:09:23 executing program 3: timer_create(0x0, &(0x7f0000000440)={0x0, 0x12}, &(0x7f0000000180)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000380), 0x0, 0x0) ioctl$MON_IOCX_GETX(r1, 0xc0109207, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) ioctl$MON_IOCG_STATS(r1, 0x9208, 0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 13:09:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001a00)={0x14, 0x1a, 0x105}, 0x14}}, 0x0) 13:09:23 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_aout(r0, &(0x7f00000015c0), 0x20) vmsplice(r0, &(0x7f0000000580)=[{&(0x7f0000000140)='E', 0x1}, {&(0x7f0000000000)="d1", 0x1}, {&(0x7f0000000340)=';', 0x1}, {&(0x7f0000000440)="a7", 0x1}], 0x4, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000001c0)) [ 575.508033][T27755] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed 13:09:23 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75c, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$LOOP_GET_STATUS64(r0, 0x80081270, &(0x7f00000002c0)) 13:09:23 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000004c0)="66530700ae897094e71b0fa1f107000000364603812c66538d750f6ee1d0014e3f0500bb9fb045f2d1c190926c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb298802d8dcbf11169c111c145129d6f9f6c1f3b18d6d352507f7018b311fef2c560001000000000000fb8005128e7e4d939955f8ac296203784000400f573fbf0000fdffffffffeb95128ce7ec033dc0a380543b320be1c1bb99bb063fb6093569656a0bda31b0040015f033270100008cfcd61dc4a7e6a5dd57069df1cd265246e1d8292f19a49f95586b92995b4264045df05363f23dc9ef8a0a460cad29288ac6bb83dc86104434ae3f69961215d3a59312023175bfa865f39f9494d10000000091d47e8045b380d54eeea225513ac77a8cda59fd4614c3704cb562a139f9dbe8e22cea7ca03f482401ebed6e1ea2e16354a3a552df61a9456b7487c2cbb97f18b1a3463566329ed63818eee3569d154d5b5abe3819f7b6d26ea96aa3e5ba73d9cd763f265ca21a1b6afc423bd24add4c023b1fd6f4313c5643dd7d3601bc3f8273d572532e8113f2f79dcaba4c06ae85594f6363c719f16d9e6b3ce08f563fa009bfadfbb23c7cebd52269f5", 0x1b2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x7) 13:09:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000100)="8e0e9b4b081b28559b334b", 0x12e9}], 0x1) 13:09:23 executing program 1: pselect6(0x0, 0xfffffffffffffffe, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, 0x0) [ 575.545837][T27764] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed 13:09:23 executing program 4: eventfd2(0x0, 0x0) io_setup(0x3, &(0x7f00000000c0)=0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x8, 0x0, r1, 0x0}, 0x0]) 13:09:23 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x100000000007fd, 0x4) setsockopt$inet_int(r0, 0x0, 0x12, &(0x7f0000000040)=0xfffffffe, 0x61) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f00000000c0)=0x3, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e24}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x10, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x400020ff) 13:09:23 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) 13:09:23 executing program 1: setpriority(0x2, 0x0, 0x0) 13:09:23 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) clone(0x200300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000000)) ptrace(0x10, r2) ptrace$getregset(0x4204, r2, 0x202, &(0x7f00000005c0)={0x0}) 13:09:23 executing program 3: syz_read_part_table(0x0, 0xa, &(0x7f0000000000)=[{&(0x7f00000000c0)="0201a6ffffff0a000000ff45ac0000ffffffbf000800000000000000024000ffffffa9000000e100000088770072003007000500000000000000008000da55aa", 0x40, 0x1c0}]) 13:09:23 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x1260, 0x970000) 13:09:23 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7a}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4, &(0x7f0000000180)="58d97828"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 13:09:23 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) clone(0x200300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000000)) ptrace(0x10, r2) ptrace$getregset(0x4204, r2, 0x202, &(0x7f00000005c0)={0x0}) [ 575.877066][T27823] loop3: detected capacity change from 0 to 1 [ 575.923641][T27823] loop3: p1 p2 p4 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 [ 575.923762][T27823] loop3: p1 start 10 is beyond EOD, truncated [ 576.016761][T27823] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 576.025179][T27823] loop3: p4 size 2 extends beyond EOD, truncated [ 576.032152][T27823] loop3: p5 start 10 is beyond EOD, truncated [ 576.038216][T27823] loop3: p6 size 1073872896 extends beyond EOD, truncated [ 576.046106][T27823] loop3: p7 start 10 is beyond EOD, truncated [ 576.052195][T27823] loop3: p8 size 1073872896 extends beyond EOD, truncated [ 576.059803][T27823] loop3: p9 start 10 is beyond EOD, truncated [ 576.065871][T27823] loop3: p10 size 1073872896 extends beyond EOD, truncated [ 576.073830][T27823] loop3: p11 start 10 is beyond EOD, truncated [ 576.080027][T27823] loop3: p12 size 1073872896 extends beyond EOD, truncated [ 576.087592][T27823] loop3: p13 start 10 is beyond EOD, truncated [ 576.093772][T27823] loop3: p14 size 1073872896 extends beyond EOD, truncated [ 576.101442][T27823] loop3: p15 start 10 is beyond EOD, truncated [ 576.107607][T27823] loop3: p16 size 1073872896 extends beyond EOD, truncated [ 576.115523][T27823] loop3: p17 start 10 is beyond EOD, truncated [ 576.121714][T27823] loop3: p18 size 1073872896 extends beyond EOD, truncated [ 576.129190][T27823] loop3: p19 start 10 is beyond EOD, truncated [ 576.135368][T27823] loop3: p20 size 1073872896 extends beyond EOD, truncated [ 576.143126][T27823] loop3: p21 start 10 is beyond EOD, truncated [ 576.149345][T27823] loop3: p22 size 1073872896 extends beyond EOD, truncated [ 576.157477][T27823] loop3: p23 start 10 is beyond EOD, truncated [ 576.163699][T27823] loop3: p24 size 1073872896 extends beyond EOD, truncated [ 576.171407][T27823] loop3: p25 start 10 is beyond EOD, truncated [ 576.177556][T27823] loop3: p26 size 1073872896 extends beyond EOD, truncated [ 576.185556][T27823] loop3: p27 start 10 is beyond EOD, truncated [ 576.191734][T27823] loop3: p28 size 1073872896 extends beyond EOD, truncated [ 576.199216][T27823] loop3: p29 start 10 is beyond EOD, truncated [ 576.205378][T27823] loop3: p30 size 1073872896 extends beyond EOD, truncated [ 576.213045][T27823] loop3: p31 start 10 is beyond EOD, truncated [ 576.219206][T27823] loop3: p32 size 1073872896 extends beyond EOD, truncated [ 576.227017][T27823] loop3: p33 start 10 is beyond EOD, truncated [ 576.233344][T27823] loop3: p34 size 1073872896 extends beyond EOD, truncated [ 576.240924][T27823] loop3: p35 start 10 is beyond EOD, truncated [ 576.247269][T27823] loop3: p36 size 1073872896 extends beyond EOD, truncated [ 576.255017][T27823] loop3: p37 start 10 is beyond EOD, truncated [ 576.261193][T27823] loop3: p38 size 1073872896 extends beyond EOD, truncated [ 576.268882][T27823] loop3: p39 start 10 is beyond EOD, truncated [ 576.275244][T27823] loop3: p40 size 1073872896 extends beyond EOD, truncated [ 576.282970][T27823] loop3: p41 start 10 is beyond EOD, truncated [ 576.289242][T27823] loop3: p42 size 1073872896 extends beyond EOD, truncated [ 576.297426][T27823] loop3: p43 start 10 is beyond EOD, truncated [ 576.303615][T27823] loop3: p44 size 1073872896 extends beyond EOD, truncated [ 576.311392][T27823] loop3: p45 start 10 is beyond EOD, truncated [ 576.317616][T27823] loop3: p46 size 1073872896 extends beyond EOD, truncated [ 576.325410][T27823] loop3: p47 start 10 is beyond EOD, truncated [ 576.331589][T27823] loop3: p48 size 1073872896 extends beyond EOD, truncated [ 576.339100][T27823] loop3: p49 start 10 is beyond EOD, truncated [ 576.345296][T27823] loop3: p50 size 1073872896 extends beyond EOD, truncated [ 576.352897][T27823] loop3: p51 start 10 is beyond EOD, truncated [ 576.359156][T27823] loop3: p52 size 1073872896 extends beyond EOD, truncated [ 576.367074][T27823] loop3: p53 start 10 is beyond EOD, truncated [ 576.373270][T27823] loop3: p54 size 1073872896 extends beyond EOD, truncated [ 576.380884][T27823] loop3: p55 start 10 is beyond EOD, truncated [ 576.387058][T27823] loop3: p56 size 1073872896 extends beyond EOD, truncated [ 576.394634][T27823] loop3: p57 start 10 is beyond EOD, truncated [ 576.400796][T27823] loop3: p58 size 1073872896 extends beyond EOD, truncated [ 576.408690][T27823] loop3: p59 start 10 is beyond EOD, truncated [ 576.414875][T27823] loop3: p60 size 1073872896 extends beyond EOD, truncated [ 576.422602][T27823] loop3: p61 start 10 is beyond EOD, truncated [ 576.428744][T27823] loop3: p62 size 1073872896 extends beyond EOD, truncated [ 576.436776][T27823] loop3: p63 start 10 is beyond EOD, truncated [ 576.442954][T27823] loop3: p64 size 1073872896 extends beyond EOD, truncated [ 576.450469][T27823] loop3: p65 start 10 is beyond EOD, truncated [ 576.456690][T27823] loop3: p66 size 1073872896 extends beyond EOD, truncated [ 576.464699][T27823] loop3: p67 start 10 is beyond EOD, truncated [ 576.470852][T27823] loop3: p68 size 1073872896 extends beyond EOD, truncated [ 576.478745][T27823] loop3: p69 start 10 is beyond EOD, truncated [ 576.484919][T27823] loop3: p70 size 1073872896 extends beyond EOD, truncated [ 576.492458][T27823] loop3: p71 start 10 is beyond EOD, truncated [ 576.498636][T27823] loop3: p72 size 1073872896 extends beyond EOD, truncated [ 576.506360][T27823] loop3: p73 start 10 is beyond EOD, truncated [ 576.512561][T27823] loop3: p74 size 1073872896 extends beyond EOD, truncated [ 576.520727][T27823] loop3: p75 start 10 is beyond EOD, truncated [ 576.526911][T27823] loop3: p76 size 1073872896 extends beyond EOD, truncated [ 576.534547][T27823] loop3: p77 start 10 is beyond EOD, truncated [ 576.540720][T27823] loop3: p78 size 1073872896 extends beyond EOD, truncated [ 576.548350][T27823] loop3: p79 start 10 is beyond EOD, truncated [ 576.554540][T27823] loop3: p80 size 1073872896 extends beyond EOD, truncated [ 576.562466][T27823] loop3: p81 start 10 is beyond EOD, truncated [ 576.568729][T27823] loop3: p82 size 1073872896 extends beyond EOD, truncated [ 576.576784][T27823] loop3: p83 start 10 is beyond EOD, truncated [ 576.582950][T27823] loop3: p84 size 1073872896 extends beyond EOD, truncated [ 576.591210][T27823] loop3: p85 start 10 is beyond EOD, truncated [ 576.597396][T27823] loop3: p86 size 1073872896 extends beyond EOD, truncated [ 576.604986][T27823] loop3: p87 start 10 is beyond EOD, truncated [ 576.611260][T27823] loop3: p88 size 1073872896 extends beyond EOD, truncated [ 576.619036][T27823] loop3: p89 start 10 is beyond EOD, truncated [ 576.625298][T27823] loop3: p90 size 1073872896 extends beyond EOD, truncated [ 576.632997][T27823] loop3: p91 start 10 is beyond EOD, truncated [ 576.639180][T27823] loop3: p92 size 1073872896 extends beyond EOD, truncated [ 576.646999][T27823] loop3: p93 start 10 is beyond EOD, truncated [ 576.653235][T27823] loop3: p94 size 1073872896 extends beyond EOD, truncated [ 576.661191][T27823] loop3: p95 start 10 is beyond EOD, truncated [ 576.667376][T27823] loop3: p96 size 1073872896 extends beyond EOD, truncated [ 576.675051][T27823] loop3: p97 start 10 is beyond EOD, truncated [ 576.681196][T27823] loop3: p98 size 1073872896 extends beyond EOD, truncated [ 576.689398][T27823] loop3: p99 start 10 is beyond EOD, truncated [ 576.695576][T27823] loop3: p100 size 1073872896 extends beyond EOD, truncated [ 576.703176][T27823] loop3: p101 start 10 is beyond EOD, truncated [ 576.709451][T27823] loop3: p102 size 1073872896 extends beyond EOD, truncated [ 576.717075][T27823] loop3: p103 start 10 is beyond EOD, truncated [ 576.723318][T27823] loop3: p104 size 1073872896 extends beyond EOD, truncated [ 576.731242][T27823] loop3: p105 start 10 is beyond EOD, truncated [ 576.737587][T27823] loop3: p106 size 1073872896 extends beyond EOD, truncated [ 576.745310][T27823] loop3: p107 start 10 is beyond EOD, truncated [ 576.751545][T27823] loop3: p108 size 1073872896 extends beyond EOD, truncated [ 576.759622][T27823] loop3: p109 start 10 is beyond EOD, truncated [ 576.765936][T27823] loop3: p110 size 1073872896 extends beyond EOD, truncated [ 576.773508][T27823] loop3: p111 start 10 is beyond EOD, truncated [ 576.779782][T27823] loop3: p112 size 1073872896 extends beyond EOD, truncated [ 576.787491][T27823] loop3: p113 start 10 is beyond EOD, truncated [ 576.793717][T27823] loop3: p114 size 1073872896 extends beyond EOD, truncated [ 576.801704][T27823] loop3: p115 start 10 is beyond EOD, truncated [ 576.808050][T27823] loop3: p116 size 1073872896 extends beyond EOD, truncated [ 576.815845][T27823] loop3: p117 start 10 is beyond EOD, truncated [ 576.822089][T27823] loop3: p118 size 1073872896 extends beyond EOD, truncated [ 576.830092][T27823] loop3: p119 start 10 is beyond EOD, truncated [ 576.836361][T27823] loop3: p120 size 1073872896 extends beyond EOD, truncated [ 576.843985][T27823] loop3: p121 start 10 is beyond EOD, truncated [ 576.850357][T27823] loop3: p122 size 1073872896 extends beyond EOD, truncated [ 576.858211][T27823] loop3: p123 start 10 is beyond EOD, truncated [ 576.864475][T27823] loop3: p124 size 1073872896 extends beyond EOD, truncated [ 576.872723][T27823] loop3: p125 start 10 is beyond EOD, truncated [ 576.879000][T27823] loop3: p126 size 1073872896 extends beyond EOD, truncated [ 576.886851][T27823] loop3: p127 start 10 is beyond EOD, truncated [ 576.893085][T27823] loop3: p128 size 1073872896 extends beyond EOD, truncated [ 576.901206][T27823] loop3: p129 start 10 is beyond EOD, truncated [ 576.907551][T27823] loop3: p130 size 1073872896 extends beyond EOD, truncated [ 576.915269][T27823] loop3: p131 start 10 is beyond EOD, truncated [ 576.921526][T27823] loop3: p132 size 1073872896 extends beyond EOD, truncated [ 576.929255][T27823] loop3: p133 start 10 is beyond EOD, truncated [ 576.935509][T27823] loop3: p134 size 1073872896 extends beyond EOD, truncated [ 576.943737][T27823] loop3: p135 start 10 is beyond EOD, truncated [ 576.949995][T27823] loop3: p136 size 1073872896 extends beyond EOD, truncated [ 576.957651][T27823] loop3: p137 start 10 is beyond EOD, truncated [ 576.963885][T27823] loop3: p138 size 1073872896 extends beyond EOD, truncated [ 576.971892][T27823] loop3: p139 start 10 is beyond EOD, truncated [ 576.978179][T27823] loop3: p140 size 1073872896 extends beyond EOD, truncated [ 576.985886][T27823] loop3: p141 start 10 is beyond EOD, truncated [ 576.992143][T27823] loop3: p142 size 1073872896 extends beyond EOD, truncated [ 576.999776][T27823] loop3: p143 start 10 is beyond EOD, truncated [ 577.006007][T27823] loop3: p144 size 1073872896 extends beyond EOD, truncated [ 577.013902][T27823] loop3: p145 start 10 is beyond EOD, truncated [ 577.020177][T27823] loop3: p146 size 1073872896 extends beyond EOD, truncated [ 577.027910][T27823] loop3: p147 start 10 is beyond EOD, truncated [ 577.034146][T27823] loop3: p148 size 1073872896 extends beyond EOD, truncated [ 577.042223][T27823] loop3: p149 start 10 is beyond EOD, truncated [ 577.048482][T27823] loop3: p150 size 1073872896 extends beyond EOD, truncated [ 577.056133][T27823] loop3: p151 start 10 is beyond EOD, truncated [ 577.062384][T27823] loop3: p152 size 1073872896 extends beyond EOD, truncated [ 577.070133][T27823] loop3: p153 start 10 is beyond EOD, truncated [ 577.076393][T27823] loop3: p154 size 1073872896 extends beyond EOD, truncated [ 577.084568][T27823] loop3: p155 start 10 is beyond EOD, truncated [ 577.090922][T27823] loop3: p156 size 1073872896 extends beyond EOD, truncated [ 577.098695][T27823] loop3: p157 start 10 is beyond EOD, truncated [ 577.105003][T27823] loop3: p158 size 1073872896 extends beyond EOD, truncated [ 577.113169][T27823] loop3: p159 start 10 is beyond EOD, truncated [ 577.119429][T27823] loop3: p160 size 1073872896 extends beyond EOD, truncated [ 577.127175][T27823] loop3: p161 start 10 is beyond EOD, truncated [ 577.133567][T27823] loop3: p162 size 1073872896 extends beyond EOD, truncated [ 577.141485][T27823] loop3: p163 start 10 is beyond EOD, truncated [ 577.147874][T27823] loop3: p164 size 1073872896 extends beyond EOD, truncated [ 577.155994][T27823] loop3: p165 start 10 is beyond EOD, truncated [ 577.162380][T27823] loop3: p166 size 1073872896 extends beyond EOD, truncated [ 577.170117][T27823] loop3: p167 start 10 is beyond EOD, truncated [ 577.176350][T27823] loop3: p168 size 1073872896 extends beyond EOD, truncated [ 577.184489][T27823] loop3: p169 start 10 is beyond EOD, truncated [ 577.190772][T27823] loop3: p170 size 1073872896 extends beyond EOD, truncated [ 577.198428][T27823] loop3: p171 start 10 is beyond EOD, truncated [ 577.204685][T27823] loop3: p172 size 1073872896 extends beyond EOD, truncated [ 577.212340][T27823] loop3: p173 start 10 is beyond EOD, truncated [ 577.218600][T27823] loop3: p174 size 1073872896 extends beyond EOD, truncated [ 577.226752][T27823] loop3: p175 start 10 is beyond EOD, truncated [ 577.233012][T27823] loop3: p176 size 1073872896 extends beyond EOD, truncated [ 577.240666][T27823] loop3: p177 start 10 is beyond EOD, truncated [ 577.246943][T27823] loop3: p178 size 1073872896 extends beyond EOD, truncated [ 577.254920][T27823] loop3: p179 start 10 is beyond EOD, truncated [ 577.261207][T27823] loop3: p180 size 1073872896 extends beyond EOD, truncated [ 577.268978][T27823] loop3: p181 start 10 is beyond EOD, truncated [ 577.275276][T27823] loop3: p182 size 1073872896 extends beyond EOD, truncated [ 577.282960][T27823] loop3: p183 start 10 is beyond EOD, truncated [ 577.289297][T27823] loop3: p184 size 1073872896 extends beyond EOD, truncated [ 577.297049][T27823] loop3: p185 start 10 is beyond EOD, truncated [ 577.303363][T27823] loop3: p186 size 1073872896 extends beyond EOD, truncated [ 577.311269][T27823] loop3: p187 start 10 is beyond EOD, truncated [ 577.317497][T27823] loop3: p188 size 1073872896 extends beyond EOD, truncated [ 577.325583][T27823] loop3: p189 start 10 is beyond EOD, truncated [ 577.331865][T27823] loop3: p190 size 1073872896 extends beyond EOD, truncated [ 577.339512][T27823] loop3: p191 start 10 is beyond EOD, truncated [ 577.345775][T27823] loop3: p192 size 1073872896 extends beyond EOD, truncated [ 577.353413][T27823] loop3: p193 start 10 is beyond EOD, truncated [ 577.359665][T27823] loop3: p194 size 1073872896 extends beyond EOD, truncated [ 577.367645][T27823] loop3: p195 start 10 is beyond EOD, truncated [ 577.373918][T27823] loop3: p196 size 1073872896 extends beyond EOD, truncated [ 577.381583][T27823] loop3: p197 start 10 is beyond EOD, truncated [ 577.387850][T27823] loop3: p198 size 1073872896 extends beyond EOD, truncated [ 577.395985][T27823] loop3: p199 start 10 is beyond EOD, truncated [ 577.402247][T27823] loop3: p200 size 1073872896 extends beyond EOD, truncated [ 577.409888][T27823] loop3: p201 start 10 is beyond EOD, truncated [ 577.416150][T27823] loop3: p202 size 1073872896 extends beyond EOD, truncated [ 577.423935][T27823] loop3: p203 start 10 is beyond EOD, truncated [ 577.430177][T27823] loop3: p204 size 1073872896 extends beyond EOD, truncated [ 577.438262][T27823] loop3: p205 start 10 is beyond EOD, truncated [ 577.445191][T27823] loop3: p206 size 1073872896 extends beyond EOD, truncated [ 577.452989][T27823] loop3: p207 start 10 is beyond EOD, truncated [ 577.459240][T27823] loop3: p208 size 1073872896 extends beyond EOD, truncated [ 577.467294][T27823] loop3: p209 start 10 is beyond EOD, truncated [ 577.473556][T27823] loop3: p210 size 1073872896 extends beyond EOD, truncated [ 577.481293][T27823] loop3: p211 start 10 is beyond EOD, truncated [ 577.487533][T27823] loop3: p212 size 1073872896 extends beyond EOD, truncated [ 577.495833][T27823] loop3: p213 start 10 is beyond EOD, truncated [ 577.502152][T27823] loop3: p214 size 1073872896 extends beyond EOD, truncated [ 577.509903][T27823] loop3: p215 start 10 is beyond EOD, truncated [ 577.516160][T27823] loop3: p216 size 1073872896 extends beyond EOD, truncated [ 577.523963][T27823] loop3: p217 start 10 is beyond EOD, truncated [ 577.530283][T27823] loop3: p218 size 1073872896 extends beyond EOD, truncated [ 577.538146][T27823] loop3: p219 start 10 is beyond EOD, truncated [ 577.544514][T27823] loop3: p220 size 1073872896 extends beyond EOD, truncated [ 577.552123][T27823] loop3: p221 start 10 is beyond EOD, truncated [ 577.558357][T27823] loop3: p222 size 1073872896 extends beyond EOD, truncated [ 577.566336][T27823] loop3: p223 start 10 is beyond EOD, truncated [ 577.572600][T27823] loop3: p224 size 1073872896 extends beyond EOD, truncated [ 577.580226][T27823] loop3: p225 start 10 is beyond EOD, truncated [ 577.586500][T27823] loop3: p226 size 1073872896 extends beyond EOD, truncated [ 577.594274][T27823] loop3: p227 start 10 is beyond EOD, truncated [ 577.600588][T27823] loop3: p228 size 1073872896 extends beyond EOD, truncated [ 577.608826][T27823] loop3: p229 start 10 is beyond EOD, truncated [ 577.615088][T27823] loop3: p230 size 1073872896 extends beyond EOD, truncated [ 577.622808][T27823] loop3: p231 start 10 is beyond EOD, truncated [ 577.629044][T27823] loop3: p232 size 1073872896 extends beyond EOD, truncated [ 577.637075][T27823] loop3: p233 start 10 is beyond EOD, truncated [ 577.643403][T27823] loop3: p234 size 1073872896 extends beyond EOD, truncated [ 577.651056][T27823] loop3: p235 start 10 is beyond EOD, truncated [ 577.657355][T27823] loop3: p236 size 1073872896 extends beyond EOD, truncated [ 577.665162][T27823] loop3: p237 start 10 is beyond EOD, truncated [ 577.671420][T27823] loop3: p238 size 1073872896 extends beyond EOD, truncated [ 577.679349][T27823] loop3: p239 start 10 is beyond EOD, truncated [ 577.685684][T27823] loop3: p240 size 1073872896 extends beyond EOD, truncated [ 577.693403][T27823] loop3: p241 start 10 is beyond EOD, truncated [ 577.699638][T27823] loop3: p242 size 1073872896 extends beyond EOD, truncated [ 577.708746][T27823] loop3: p243 start 10 is beyond EOD, truncated [ 577.715539][T27823] loop3: p244 size 1073872896 extends beyond EOD, truncated [ 577.723241][T27823] loop3: p245 start 10 is beyond EOD, truncated [ 577.729496][T27823] loop3: p246 size 1073872896 extends beyond EOD, truncated [ 577.737519][T27823] loop3: p247 start 10 is beyond EOD, truncated [ 577.743798][T27823] loop3: p248 size 1073872896 extends beyond EOD, truncated [ 577.751453][T27823] loop3: p249 start 10 is beyond EOD, truncated [ 577.757711][T27823] loop3: p250 size 1073872896 extends beyond EOD, truncated [ 577.765374][T27823] loop3: p251 start 10 is beyond EOD, truncated [ 577.771607][T27823] loop3: p252 size 1073872896 extends beyond EOD, truncated [ 577.779609][T27823] loop3: p253 start 10 is beyond EOD, truncated [ 577.785869][T27823] loop3: p254 size 1073872896 extends beyond EOD, truncated [ 577.793479][T27823] loop3: p255 start 10 is beyond EOD, truncated 13:09:26 executing program 3: prctl$PR_MCE_KILL(0x21, 0x1, 0x0) 13:09:26 executing program 4: eventfd2(0x0, 0x0) io_setup(0x3, &(0x7f00000000c0)=0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x8, 0x0, r1, 0x0}, 0x0]) 13:09:26 executing program 0: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x311b80, 0x0) 13:09:26 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) clone(0x200300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000000)) ptrace(0x10, r2) ptrace$getregset(0x4204, r2, 0x202, &(0x7f00000005c0)={0x0}) 13:09:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x2de5, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000400000/0xc00000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000a00)=0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup2(r0, r4) syz_io_uring_submit(r2, r3, &(0x7f00000001c0)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x0, 0x0, r4}, 0x0) syz_io_uring_setup(0x7779, &(0x7f0000000140), &(0x7f00007af000/0x4000)=nil, &(0x7f000058e000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000200)=0x0) syz_io_uring_submit(r2, r5, &(0x7f00000002c0)=@IORING_OP_REMOVE_BUFFERS, 0x0) io_uring_enter(r1, 0xa2, 0x0, 0x0, 0x0, 0x0) 13:09:26 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$netlink(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000280)={0x10}, 0x10}, {&(0x7f0000000040)={0x10, 0x3e8}, 0x10}], 0x2}, 0x0) 13:09:26 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) clone(0x200300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000000)) ptrace(0x10, r2) ptrace$getregset(0x4204, r2, 0x202, &(0x7f00000005c0)={0x0}) 13:09:26 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f00000000c0)="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") 13:09:26 executing program 0: ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000200)={'syztnl2\x00', &(0x7f00000000c0)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}, @rand_addr=' \x01\x00'}}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_opts(r0, 0x29, 0x40, &(0x7f0000000000)=@dstopts={0x0, 0x9, '\x00', [@calipso={0x7, 0x30, {0x0, 0xa, 0x0, 0x0, [0x0, 0x0, 0x0, 0x1, 0x0]}}, @enc_lim, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}]}, 0x58) 13:09:26 executing program 5: semtimedop(0x0, &(0x7f0000000380)=[{}], 0x1, &(0x7f00000003c0)={0x0, 0x3938700}) [ 578.646409][T28109] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=28109 comm=syz-executor.0 13:09:26 executing program 1: migrate_pages(0x0, 0x20, 0x0, 0xffffffffffffffff) 13:09:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000000), 0x4) 13:09:26 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) listen(r1, 0x0) 13:09:26 executing program 4: eventfd2(0x0, 0x0) io_setup(0x3, &(0x7f00000000c0)=0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x8, 0x0, r1, 0x0}, 0x0]) 13:09:26 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x109, &(0x7f0000000900)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000140)="763c4f8cecc17e1b7225ce8d924c023a3c4711d57211221b204a6cf6bce114f59c7697fee7c1643a0d3acdf3f06ae9990ff21d70efb455aefee216e100a02c96194d5e92c333f2084def4048cf045c3d30a66fbbd0343c015857f1a909932fa84674ba065f24b2939ccdcc4d0f697ededd78c4c8ba7dac7761f4ccde8299653e365bfe4d62c7667e86c51e7c540ba87798d812a78344d1740e098ba7529479c0a8132bfefce106c876d421a705bc934d14ec35d30276194a162ef293ef22ccbe0ab24bd0955e4df60f123b4d880e31becb689062", 0xd4}, {&(0x7f00000002c0)="31874b20a6c6acd7d497badbc3dbfc3a5fa32b59d4f1fb8af4bf823da2462b7d1d576f80edc1f4e8128b2777bb2560e1c59482fed9bf656f2f14f2c2428f077aba78fe255c70123c8a1b9f5feb9716fb07aad4d1780b1f40127f0aedab97b1377fa25bcefb8a41346cd4225f7ed5747f214fd6c40119b4b974d77d8a9719dcc7c0973015a1d41b1499b65ede3a7bd7e48b827a26c94eb1f3d316dc60dbf3d46d5aa46cf78847a2e9349ddad99070ccd48be04af13135e4bf3f29a94407e93f5ecbc1e6e065fd19613645be2818f483b3eab4d22ebd9ce465cc1234ee13", 0xdd}, {&(0x7f00000003c0)="95e52af0c25644bf0017", 0xa}], 0x3, 0xe) tkill(r2, 0x17) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x40) 13:09:26 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000440)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="66530700ae897094e71b0fb1f14701ffffffffffffff66538d750f6ee1d001093f136318ffd6caefe5a73f0500ab783c7d5dbb9fb245f2d1eaa3ca203640e3e1c7f9cf6d2223d569b6fe53fd32283d7628e90f21c8c43e99720ed72373a3e96ccd9a5177", 0x64}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 13:09:26 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x109, &(0x7f0000000900)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000140)="763c4f8cecc17e1b7225ce8d924c023a3c4711d57211221b204a6cf6bce114f59c7697fee7c1643a0d3acdf3f06ae9990ff21d70efb455aefee216e100a02c96194d5e92c333f2084def4048cf045c3d30a66fbbd0343c015857f1a909932fa84674ba065f24b2939ccdcc4d0f697ededd78c4c8ba7dac7761f4ccde8299653e365bfe4d62c7667e86c51e7c540ba87798d812a78344d1740e098ba7529479c0a8132bfefce106c876d421a705bc934d14ec35d30276194a162ef293ef22ccbe0ab24bd0955e4df60f123b4d880e31becb689062", 0xd4}, {&(0x7f00000002c0)="31874b20a6c6acd7d497badbc3dbfc3a5fa32b59d4f1fb8af4bf823da2462b7d1d576f80edc1f4e8128b2777bb2560e1c59482fed9bf656f2f14f2c2428f077aba78fe255c70123c8a1b9f5feb9716fb07aad4d1780b1f40127f0aedab97b1377fa25bcefb8a41346cd4225f7ed5747f214fd6c40119b4b974d77d8a9719dcc7c0973015a1d41b1499b65ede3a7bd7e48b827a26c94eb1f3d316dc60dbf3d46d5aa46cf78847a2e9349ddad99070ccd48be04af13135e4bf3f29a94407e93f5ecbc1e6e065fd19613645be2818f483b3eab4d22ebd9ce465cc1234ee13", 0xdd}, {&(0x7f00000003c0)="95e52af0c25644bf0017", 0xa}], 0x3, 0xe) tkill(r2, 0x17) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x40) 13:09:26 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r4, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r4) r5 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x17f) sendmsg$NL80211_CMD_JOIN_MESH(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) write(0xffffffffffffffff, &(0x7f0000000180)="1c0000004a005f0214f9f424000904000a", 0xfffffffffffffc70) splice(r3, 0x0, r4, 0x0, 0xfffd, 0x0) 13:09:27 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x20, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) 13:09:27 executing program 4: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) r3 = socket(0x10, 0x3, 0x0) sendmsg(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_READ_FIXED={0x4, 0x2, 0x4, @fd_index=0x6, 0x6, 0x8000, 0x943, 0x1d, 0x1, {0x3}}, 0x3) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) 13:09:27 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x20, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) 13:09:27 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x109, &(0x7f0000000900)="c4c69101a219da3643bf168384924fe41e52ffffff7fc5d61abc6cd1b3dd80000098d3e0a5fc79c0fe7282987364e69e6fe42ff9373a5efaa8b507c946a8cc45edef31ede99a1af0f0824f0b47f42bf98adf49a9f092b0dfc95e6bdf88ce57f97c69df8c00000000d109a542b558356b3dafa9f8657bbfc245c5ed4446bcd6c8146f85d9f04ec60802b102424c7bad28ffb4e7904942cc575ba851c65cb6def4ad4fc7ff71e86915ad4b9374c6f11f19c4a018af00838f8dd196fddad6e63b0093034ec558cd17d1e85e298abdaf98b19126b1812411389f692b2875438ba4008537a3337d52c5e56a7ec6a954e0ce599fe9c0fb280cf17aeb5154882cad8309b78e0d77e57ad014b2"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000140)="763c4f8cecc17e1b7225ce8d924c023a3c4711d57211221b204a6cf6bce114f59c7697fee7c1643a0d3acdf3f06ae9990ff21d70efb455aefee216e100a02c96194d5e92c333f2084def4048cf045c3d30a66fbbd0343c015857f1a909932fa84674ba065f24b2939ccdcc4d0f697ededd78c4c8ba7dac7761f4ccde8299653e365bfe4d62c7667e86c51e7c540ba87798d812a78344d1740e098ba7529479c0a8132bfefce106c876d421a705bc934d14ec35d30276194a162ef293ef22ccbe0ab24bd0955e4df60f123b4d880e31becb689062", 0xd4}, {&(0x7f00000002c0)="31874b20a6c6acd7d497badbc3dbfc3a5fa32b59d4f1fb8af4bf823da2462b7d1d576f80edc1f4e8128b2777bb2560e1c59482fed9bf656f2f14f2c2428f077aba78fe255c70123c8a1b9f5feb9716fb07aad4d1780b1f40127f0aedab97b1377fa25bcefb8a41346cd4225f7ed5747f214fd6c40119b4b974d77d8a9719dcc7c0973015a1d41b1499b65ede3a7bd7e48b827a26c94eb1f3d316dc60dbf3d46d5aa46cf78847a2e9349ddad99070ccd48be04af13135e4bf3f29a94407e93f5ecbc1e6e065fd19613645be2818f483b3eab4d22ebd9ce465cc1234ee13", 0xdd}, {&(0x7f00000003c0)="95e52af0c25644bf0017", 0xa}], 0x3, 0xe) tkill(r2, 0x17) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x40) 13:09:27 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETAF(r0, 0x5433, 0x0) 13:09:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x2002) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0xff, 0x0, 0x0, @time={0x0, 0x6695caec}, {}, {}, @time}], 0x1c) write$sndseq(r1, &(0x7f0000000180)=[{0x0, 0x3, 0x0, 0x0, @tick, {}, {}, @queue}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @queue}], 0x38) 13:09:27 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x109, &(0x7f0000000900)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000140)="763c4f8cecc17e1b7225ce8d924c023a3c4711d57211221b204a6cf6bce114f59c7697fee7c1643a0d3acdf3f06ae9990ff21d70efb455aefee216e100a02c96194d5e92c333f2084def4048cf045c3d30a66fbbd0343c015857f1a909932fa84674ba065f24b2939ccdcc4d0f697ededd78c4c8ba7dac7761f4ccde8299653e365bfe4d62c7667e86c51e7c540ba87798d812a78344d1740e098ba7529479c0a8132bfefce106c876d421a705bc934d14ec35d30276194a162ef293ef22ccbe0ab24bd0955e4df60f123b4d880e31becb689062", 0xd4}, {&(0x7f00000002c0)="31874b20a6c6acd7d497badbc3dbfc3a5fa32b59d4f1fb8af4bf823da2462b7d1d576f80edc1f4e8128b2777bb2560e1c59482fed9bf656f2f14f2c2428f077aba78fe255c70123c8a1b9f5feb9716fb07aad4d1780b1f40127f0aedab97b1377fa25bcefb8a41346cd4225f7ed5747f214fd6c40119b4b974d77d8a9719dcc7c0973015a1d41b1499b65ede3a7bd7e48b827a26c94eb1f3d316dc60dbf3d46d5aa46cf78847a2e9349ddad99070ccd48be04af13135e4bf3f29a94407e93f5ecbc1e6e065fd19613645be2818f483b3eab4d22ebd9ce465cc1234ee13", 0xdd}, {&(0x7f00000003c0)="95e52af0c25644bf0017", 0xa}], 0x3, 0xe) tkill(r2, 0x17) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x40) [ 579.000899][T28164] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 579.009103][T28164] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 13:09:27 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x20, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) 13:09:27 executing program 0: r0 = socket(0x10, 0x80002, 0x0) write(r0, &(0x7f0000000140)="2600000022004701050000070000000000000020002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmmsg(r0, &(0x7f0000000780), 0x3ffffffffffff81, 0x2, 0x0) [ 579.058644][T28174] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 579.066894][T28174] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 13:09:29 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x1, &(0x7f0000000180)=0x0) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$P9_RREMOVE(r4, &(0x7f0000000280)={0xd4fa3fe959b9ad8}, 0xff7f) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fdatasync(r4) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000200)={0x100000, r4, 0x9}) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000008a40)=ANY=[@ANYBLOB='48\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x3834}}, 0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 13:09:29 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x29, 0x48, &(0x7f0000000000)={0x804}, 0x4) 13:09:29 executing program 5: prctl$PR_MCE_KILL(0x23, 0x4, 0x570000) 13:09:29 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000005c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) readlinkat(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:09:29 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x20, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) 13:09:29 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open_by_handle_at(0xffffffffffffff9c, &(0x7f0000000200)=@ceph_nfs_fh={0x8, 0x1, {0x4002}}, 0x0) 13:09:30 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8904, &(0x7f0000009700)) 13:09:30 executing program 1: r0 = epoll_create1(0x0) r1 = syz_io_uring_setup(0x240b, &(0x7f0000001740), &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)={0x60000007}) syz_io_uring_complete(r2) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f00000001c0)={0x80000031}) 13:09:30 executing program 5: syz_mount_image$nfs(0x0, &(0x7f0000001c40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000300)={{}, {}, [{0x10, 0x0, 0xee00}]}, 0x2c, 0x0) 13:09:30 executing program 1: perf_event_open(&(0x7f0000000cc0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xde9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) r2 = socket$packet(0x11, 0x3, 0x300) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)=""/55, 0x37}, {&(0x7f0000000400)=""/185, 0xb9}], 0x2, &(0x7f0000000600)=""/119, 0x77}, 0x2001) sendto$inet(0xffffffffffffffff, &(0x7f0000000740)="3a97bd73444379c33b172c18a5262277c2201c2808c2bf8d", 0x18, 0x4000, &(0x7f0000000780)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) open(&(0x7f0000000300)='./bus\x00', 0x2080, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) sendto$inet(r1, &(0x7f00000012c0)="1a268a927f1f6588b967480241ba78600453f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) sendmsg$inet(r3, &(0x7f0000000b80)={&(0x7f00000002c0)={0x2, 0x4e21, @loopback}, 0x10, &(0x7f0000000980)=[{&(0x7f00000004c0)="dd9801d57fbcd6cda60e9553192d484ab355d44fd2cfa25dc9ba9572f59ea47c065d9096747782c9d875c69b84f252548a343a295b8d9dc2317878bb6ab4e1f493620fcf5b51be7f7d0bd9c7b162edb206d0195bc42db7b7a3c1d97dbdcd815a184b4a16b344b912c274b7b49152752ae076e866", 0x74}, {&(0x7f0000000680)="1853f3f5e87162cd11f8868829d87dd8d9381b1f90068a5abf84083500ea349a56c8dbea2faed02630dc76874afbf67e70103a18cc0527431114e1b33c7f679ac3b689c76fbe04c8e1e3cce3efb4b085a59cc278d8b255f83d8fd590436126c55b785e5327f16bdd27f6adfa64ca5456baab2816e97733b6f79dcc3f147d9720c4eaa480bb29d2fec9dfb5f985212cda5aeb83a143a95cc7690380857593b97d13ed860f8e35d5445eda7f", 0xab}, {&(0x7f00000007c0)="a86681ab9e68f780917e1aa41a415e70342137c4dbf910fc93899d342edcec2d04a1c345973c1ff8b68edba5ff4fb9d277899c0c19873dd851fc8c258e2b041243b751e80d01896d8fd5a2b127acb4d16d49e0249e1abefcc3ad26bc22fb68a14ec6cb11c0ef0bb4f9df88e245cd53978951f8e063ebe09ba0b92d4df639bd136ead8e5f030beca15bb1e6", 0x8b}, {&(0x7f0000000880)="5fe5704b4c902622a1d1f124ea7cd3e8242b5118e5c6d54346c7d173c5b13d8d068e2211c3a20b2a2e13678c5ea3a7250ba60861396f3e05042cbd224b48a7da441b756904d2383397ffd219a5fea57e7673cf081d6c8d385df91ee20e5b04f7a0053849eaefb423d0e7e11aa3f34c758f146a4e6176d3a681c5dc3b6be6e7ea93ec08aec4114113e079496af3e1409f34b0c4be5571ed3687aebec50216ef9990ce229704d215f28dde78339ab56db0b1a6857d5ab667deb5f58ff5be65a34cf8866c5b039cffc046427f52495a66b8fe", 0xd1}, {&(0x7f0000000340)="c0c98bd85802e4b08c97b2094f3044c4143183e036efcd4cd37ecab72f20a882d880093c69b975d9d54ddefcc317d3f3b6c35fee3f87f8238dd0be62a285154cc1d4da21181f42015e0349d910", 0x4d}, {&(0x7f0000000580)="fa980355abe08a87fc8d20fb92ce7006dea692bfdbb4b8044fd77c5a7a04e49736c9b39f2cc98736819f6f984622426b17ff360287edba7d42bbe71cb22c6a6dd55d800bd07ebd08878f172dc99ece17ffe474d550aa41cc9d4437f6d1567d6ecfe6ec6760", 0x65}], 0x6, &(0x7f0000000d40)=ANY=[@ANYBLOB="1100000000000000007d784616158e8137e6278200000001000000f500000000000000140000000000000000000000010000008100004000000000ff0000000000000000000000638c0000880ae31a5b377cc543bf94040000443c004364010102000000057f00000100100000ac14142e00003db8ac1e000100000006e00000000000691900000000000000e1000000000000000194", @ANYRES32, @ANYBLOB="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"], 0x140}, 0x20000880) setresuid(0x0, 0x0, 0x0) 13:09:30 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open_by_handle_at(0xffffffffffffff9c, &(0x7f0000000200)=@ceph_nfs_fh={0x8, 0x1, {0x4002}}, 0x0) [ 581.982515][ T25] kauditd_printk_skb: 2 callbacks suppressed [ 581.982526][ T25] audit: type=1326 audit(1619960970.007:948): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28193 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 13:09:30 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000080)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f00000001c0)="53000000fcffffff000000200000000000c03800000000000800000000000000000000004b267b11fa8a9e458c2aef7bc8eeea0e6cbdad4d019322803c1585782e581ebea2b53cb265525584402b84b2204add255ebb5b2f", 0x58}], 0x2) 13:09:30 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0xffffffffffffffff, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6641db6e0551832d303744e57e897094b15ba5d9e70400b1f14712d8ebca47f8b25e7717fd68a8378f362fbf30b8a40a525b7be87baeb12d8e440a49eb252ea2f7fc05d7e532e1a906abffff030000000000008bc3b53e32de099dad2f8fea962d0cbb0f359530f5bc65e8e7d6d01252f603eaab1c436d0a063b76439259a732225fc79e48a4f8f816f99b8189589fb3fbdc4b62b4bdadbebb99bd02b3dc8adee6250b28c8053eb743f17e4197c8223bdca58b3aaa325ea050be1d319c4fba87302dbd231519e4aaa1a981dcf3a561f5fa0694fa857c96ffb807d7e7efeeb82d668b49b49e0e17d38911ad428fa1", 0xee}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x3f) 13:09:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000fff000/0x1000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000b40)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x2, 0x0, r4, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r1, 0x1cb, 0x0, 0x1, 0x0, 0x0) 13:09:30 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='(\'\'\x00') 13:09:30 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open_by_handle_at(0xffffffffffffff9c, &(0x7f0000000200)=@ceph_nfs_fh={0x8, 0x1, {0x4002}}, 0x0) 13:09:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000840)='./file0\x00', 0x4000289) r1 = inotify_init() inotify_add_watch(r1, &(0x7f00000005c0)='.\x00', 0x60000f6) lsetxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000180), 0x24, 0x0) [ 582.106858][ T25] audit: type=1326 audit(1619960970.007:949): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28193 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=267 compat=0 ip=0x4665f9 code=0x7ffc0000 13:09:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)=';', 0x1) sendfile(r0, r1, 0x0, 0x1c500) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$cont(0x20, 0x0, 0x0, 0x0) 13:09:30 executing program 3: set_mempolicy(0x1, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0x30000004}) 13:09:30 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open_by_handle_at(0xffffffffffffff9c, &(0x7f0000000200)=@ceph_nfs_fh={0x8, 0x1, {0x4002}}, 0x0) 13:09:30 executing program 5: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x0) [ 582.190209][ T25] audit: type=1326 audit(1619960970.007:950): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28193 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 582.258278][ T25] audit: type=1326 audit(1619960970.007:951): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28193 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=157 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 582.301544][ T25] audit: type=1326 audit(1619960970.037:952): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28193 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 582.327236][ T25] audit: type=1326 audit(1619960970.037:953): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28193 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 13:09:30 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) membarrier(0x1, 0x0) 13:09:30 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0xffffffffffffffff, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6641db6e0551832d303744e57e897094b15ba5d9e70400b1f14712d8ebca47f8b25e7717fd68a8378f362fbf30b8a40a525b7be87baeb12d8e440a49eb252ea2f7fc05d7e532e1a906abffff030000000000008bc3b53e32de099dad2f8fea962d0cbb0f359530f5bc65e8e7d6d01252f603eaab1c436d0a063b76439259a732225fc79e48a4f8f816f99b8189589fb3fbdc4b62b4bdadbebb99bd02b3dc8adee6250b28c8053eb743f17e4197c8223bdca58b3aaa325ea050be1d319c4fba87302dbd231519e4aaa1a981dcf3a561f5fa0694fa857c96ffb807d7e7efeeb82d668b49b49e0e17d38911ad428fa1", 0xee}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x3f) 13:09:30 executing program 5: syz_io_uring_setup(0x5d50, &(0x7f0000000180)={0x0, 0xa412}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000fff000/0x1000)=nil, 0x2) 13:09:30 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='#\'%nod%v\x00\x7f\xe5\xd0ql\x86\xbc\xb3g\x9f\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x00\x14}\n\x81\x17\xd4|oC\xca\v\xe3\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xab\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF\x13\x9f\xc2\xb7/1\xb9V\xf0*\xcb\xdc\x05n<\xcfi\x02=1\xda\"\xb3\xfe\xf3\x97\xd9\xa5b\xd4\x00Q$\xb2v\\\xa9\xcf*tw\x8a\n_)\x89A\x8f`R\x12zM\a\xc23\xd0d\xee\x13Q', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1000005, 0x11, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 13:09:30 executing program 3: set_mempolicy(0x1, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0x30000004}) 13:09:31 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r0, 0x4b72, &(0x7f0000000640)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000bc0)="d72408cbe009f2138cfb27d7b1c54aff1f549608968441f45be854fd9bafcce00dfa4cb2383be9e92bf5b0881f06d41656838a2436768ffc5f5e7e424946b8e6d6f714b3ba576999548e0fd73463ddb8ff7df941c53416d04c996d2fe321b4cf1036041e0f20beb5679cdda22a39a4dc512d5039a685a288e2533e31b65a8c1a5977c256d6fa293ef4f264eae764320aaea1c52c09c98e5ed55bae5662c6ac48e547b80669b03990d9514ba7f516816f4f23a7d1ea82fe9ff7f897e4bae04945da5edf5cbb83c8651033ba2ef3c13d3ee47110d1f695b37484b091fa54b5a85dd7f3211c87dac7c986574d673508c130ab6f86ab7b122bf566a525671644d65e651fff48644fc4b744b9b055e7b6728cd2645661859015eb785385baf108393d31c2ff273341a884ad30f6d7d2893944a22f65c61406f644817898da1d4387814327e59a2c53a1ca0ffd0ebc0722602256035548f34566f920b44033c06546565961d40e2e230f61e0e66b3a27caa9a978b89b514068a6f1e21e05121141562b6c95bbea713ae1a0c1ae833eba175e91928a966e2f6d5663f3c11a0c75904d119b834522c18461989c7a6214bc0a53dd9ec74537d0cd0a22e6e687dde39c690b61b6e182e7abf427cd5afff6812ed2f80b6133f9d969ca2baad0e76e3de357e18ce4f0b3a3f52d1b89b19e717be35ad40a7fb700477587ad40978bf0909ad926d7192cd3f41f229da3cf4cc4cb8d22ea1e65fdcd308f846b4996103aaa81fc6d5333656705b9727cb41efb69d2eadbfb6e089b67a492e3efccc43a251a959ee6e384ba9cdfbf53826cb39dd31e17131367ef5b2dc66c87c7920d51cdd3c61d37475fcf3552e658f2f5478bf1f80b6465abef696b9270176b4a35e407e9f3aab7a4c56ad48d2951d2e693a62418e557acaef7baf161003641ff40f0cc8572fd3588a63e50c59806aaf103984e7052494c8f94c50a57d755ae320aa9453670d96314a3e555578e8371bec489b2178778ba38b1f088088a33d67a0c8cb6500e492c6fceb809f403a8be1e0ebacfd370ee05825111fa7c3154037637070037282b3f1bc38621b1810561ff8c3e81061109284a7fea1755f2be1a953ab407a415d3fd48fec1b950f9f5959e04c504fbe8c0e0de63055bfdb82df62c4618501f7b48b2ef902423426b5c69471a2b6f2ddcc649566a3035ae0bb5ba27921bb417f57679326738c07d8b24cc81436338844653f09b9dc054c668d1d0467a027cfa31489628ab179cac3bf4c49b400cb69122384ce6098b7fda836ed34a7e6dc368a0669bd39492e64503cb463f0dfcf7efe5955339deef31962c92275e323659b3b6a9a3ae64a2f32e663936959e44d010e019521caff426bdfe80658fc3d69af36db3e550f39c61c2e92bf585fd4b46cdaf9fdbb7053ce7774a669c80391b2f6020828a"}) 13:09:31 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/time_for_children\x00') 13:09:31 executing program 3: set_mempolicy(0x1, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0x30000004}) 13:09:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)=';', 0x1) sendfile(r0, r1, 0x0, 0x1c500) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$cont(0x20, 0x0, 0x0, 0x0) 13:09:31 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000980), 0x0) set_mempolicy(0x1, &(0x7f0000000040)=0x56ed, 0x5) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000100)=0x1) 13:09:31 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$sock(r0, &(0x7f0000003c00)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)="c8", 0x1}], 0x1}}], 0x1, 0x0) recvmsg(r1, &(0x7f00000004c0)={&(0x7f00000001c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, 0x0, 0x0, &(0x7f0000002440)=""/193, 0xc1}, 0x0) 13:09:31 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x60, 0x0, 0x2, 0x401, 0x0, 0x0, {0x2}, [@CTA_EXPECT_TUPLE={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x24, 0x3, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASTER={0x4}]}, 0x60}}, 0x0) 13:09:31 executing program 3: set_mempolicy(0x1, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0x30000004}) 13:09:33 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0xffffffffffffffff, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6641db6e0551832d303744e57e897094b15ba5d9e70400b1f14712d8ebca47f8b25e7717fd68a8378f362fbf30b8a40a525b7be87baeb12d8e440a49eb252ea2f7fc05d7e532e1a906abffff030000000000008bc3b53e32de099dad2f8fea962d0cbb0f359530f5bc65e8e7d6d01252f603eaab1c436d0a063b76439259a732225fc79e48a4f8f816f99b8189589fb3fbdc4b62b4bdadbebb99bd02b3dc8adee6250b28c8053eb743f17e4197c8223bdca58b3aaa325ea050be1d319c4fba87302dbd231519e4aaa1a981dcf3a561f5fa0694fa857c96ffb807d7e7efeeb82d668b49b49e0e17d38911ad428fa1", 0xee}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x3f) 13:09:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)=';', 0x1) sendfile(r0, r1, 0x0, 0x1c500) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$cont(0x20, 0x0, 0x0, 0x0) 13:09:33 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000980), 0x0) set_mempolicy(0x1, &(0x7f0000000040)=0x56ed, 0x5) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000100)=0x1) 13:09:33 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = memfd_create(&(0x7f00000004c0)='\x00t\b\x00\x00\x04\x00\x94\xc6\xcd,\xdc\xeb\xd2\xdaZo\xf0\x05\x89\xc0\x9a2\x1a\xdb0\x1e\xb8s\xb8\xdaE\xf3\x90mA\xea\xc2\xec\xc7*o\x80\x00\x00\x00\x00\x00\x00\x00\x86s\xe3\xf2\x96\x979\x86\xc5\xf8\xab\x9ar\xa7\x00\xe1;\x82\r\xb2{n\x9a\xdaY\x8dl\x9c@\x7f4\x9f\x1aS\xd9i\x1f\xf2\xbe\x90\x81U\x8c\x95\xdd\xa8\x1a\x1a\xbbASW#\x06\xd5\x16Q\xc4{\xa1au2W}?\xdaj\xcf\x18<\xcd\xfd\x04\x0ep\x14\xa1\x7f\x00\x04S;\xc5\x93\xa951\x90oe\xc2\xa5\x9ep\xd3p/\xa1U\xe9i\xf0\x18\x8a\xf8\xe4:\xb2d\xc28t\xd2\f\xde\xba\x8c\x02\xcb\xf8\xe2D\xb8\xb1[K<@\xd2.q\xf1\xe9\xf5\xb6\x01\x01\x00\x00\x00\x00\x00\x00Z\x8f\xd3v\xbd\xc2T\xb5\xc3\xaa\x1b\x02\x03\x00\x01\x00\xbf)\xaf\x06\xe2#Q\x8e\xc1\xf6@\xebQ\x97-/1\x94X#\xac\xb2O$\xaa#\xbf\x98\x1a\fp\xe1T\t\b\x1d\xe1\x92\xcb\xd8\xd2\xcdc\x02\xdd\xfb\x99\xe7\xd9\x83t\x11\xb5\x98\x02\xfc5\x84\xec\x82\xa3\x8c\xf5\xd3n\x18\x1e\xd7\xcd\x15\x02\xf7\xe5/\xd6Y\xfd\x9f\x9a|-\x91\xfc\xf4\xc9\xba\xc8V\xf7Af\xb7cp\xb7h\x046\x85G\xe9d\xcb\xe7\x8e\xf4\xe4;\xd2', 0x7) fcntl$addseals(r1, 0x409, 0xc) 13:09:33 executing program 3: clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x3) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x3b, 0x0, &(0x7f0000000040)) 13:09:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)=';', 0x1) sendfile(r0, r1, 0x0, 0x1c500) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$cont(0x20, 0x0, 0x0, 0x0) 13:09:34 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000980), 0x0) set_mempolicy(0x1, &(0x7f0000000040)=0x56ed, 0x5) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000100)=0x1) 13:09:34 executing program 0: socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="1c00000007ffff", @ANYRES16=r0, @ANYRESOCT], 0x52) r3 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@noextend}]}}) 13:09:34 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000980), 0x0) set_mempolicy(0x1, &(0x7f0000000040)=0x56ed, 0x5) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000100)=0x1) 13:09:34 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c80)=[{&(0x7f0000002c40)={0x14, 0x1d, 0x1, 0x0, 0x0, "", [@generic="a2"]}, 0x14}], 0x1}, 0x0) 13:09:34 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) close(r1) dup3(r0, r1, 0x80000) [ 586.068802][ T5] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=5 comm=kworker/0:0 [ 586.082350][T28369] 9pnet: p9_errstr2errno: server reported unknown error 01777 [ 586.095620][ T5] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=5 comm=kworker/0:0 [ 586.108930][T28376] 9pnet: p9_errstr2errno: server reported unknown error 01777 13:09:34 executing program 0: socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="1c00000007ffff", @ANYRES16=r0, @ANYRESOCT], 0x52) r3 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@noextend}]}}) [ 586.183993][ T5] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=5 comm=kworker/0:0 [ 586.213855][T28385] 9pnet: p9_errstr2errno: server reported unknown error 01777 13:09:37 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0xffffffffffffffff, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6641db6e0551832d303744e57e897094b15ba5d9e70400b1f14712d8ebca47f8b25e7717fd68a8378f362fbf30b8a40a525b7be87baeb12d8e440a49eb252ea2f7fc05d7e532e1a906abffff030000000000008bc3b53e32de099dad2f8fea962d0cbb0f359530f5bc65e8e7d6d01252f603eaab1c436d0a063b76439259a732225fc79e48a4f8f816f99b8189589fb3fbdc4b62b4bdadbebb99bd02b3dc8adee6250b28c8053eb743f17e4197c8223bdca58b3aaa325ea050be1d319c4fba87302dbd231519e4aaa1a981dcf3a561f5fa0694fa857c96ffb807d7e7efeeb82d668b49b49e0e17d38911ad428fa1", 0xee}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x3f) 13:09:37 executing program 3: syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(&(0x7f0000005d80), 0xffffffffffffffff) 13:09:37 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x17, &(0x7f0000000040)={0x0, 0x4}, 0x4) 13:09:37 executing program 0: socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="1c00000007ffff", @ANYRES16=r0, @ANYRESOCT], 0x52) r3 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@noextend}]}}) 13:09:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)=';', 0x1) sendfile(r0, r1, 0x0, 0x1c500) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$cont(0x20, 0x0, 0x0, 0x0) 13:09:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)=';', 0x1) sendfile(r0, r1, 0x0, 0x1c500) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$cont(0x20, 0x0, 0x0, 0x0) 13:09:37 executing program 0: socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="1c00000007ffff", @ANYRES16=r0, @ANYRESOCT], 0x52) r3 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@noextend}]}}) 13:09:37 executing program 1: sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000002c0)=""/18) [ 589.052279][ T5] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=5 comm=kworker/0:0 [ 589.076193][T28401] 9pnet: p9_errstr2errno: server reported unknown error 01777 13:09:37 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="66530700ae897094e71b0fb1f14701ffffffffffffff66538d750f6ee1d001093f136318ffd6caefe5a73f0500ab783c7d5dbb9fb245f2d1eaa3ca203640e3e1c7f9cf6d2223d569b6fe53fd32283d7628e90f21c8c43e99720ed72373a3e96ccd9a517752e54a9776e8d92c8cca06f571199725b26547f8ff103ad731ab11da4b049fbb92ea50d088afd1623da1e522b7a3db2efa30800df7a38f4922d714402c23b311c95965111b863c79f5772cab115af07794c89b2b77c52a37d4d0f04aeb2b84dc77e71cf1e03baa8f8640b9feb36f252b0bd1e19009f3f3dc7030", 0xde}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x4) 13:09:37 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000003c0)={0x46e3, 0x5f3, 0x6b7897ab, 0x85ab, 0x0, "ec4b2cf4dd291ac55a0cde0c254d6c6cb5a8c4"}) r1 = perf_event_open(0x0, 0x0, 0x8, 0xffffffffffffffff, 0x0) r2 = msgget(0x0, 0x204) syz_open_dev$tty1(0xc, 0x4, 0x3) msgctl$IPC_STAT(r2, 0x2, &(0x7f0000000000)=""/46) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000100)) gettid() syz_open_dev$tty1(0xc, 0x4, 0x4) sync() msgrcv(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="0000000000000000000000000080da0500000000000000000000000000000000000000000000000000000000000918000000000000000004000000000000000000000000000000000000120c00000000175b2bc8ab73860de038e9b5d1d0a500000010000000000000000000001bc0f7970000000600000000000000fd000000000000000000000000000000000000000800"/188], 0xd2, 0x1, 0x1000) ioctl$F2FS_IOC_GARBAGE_COLLECT(r1, 0x4004f506, &(0x7f0000000040)=0x1) 13:09:37 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000040)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x10000000600}], 0x0, &(0x7f0000000140)={[], [{@uid_eq}]}) [ 589.188933][ T5] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=5 comm=kworker/0:0 [ 589.217121][T28416] 9pnet: p9_errstr2errno: server reported unknown error 01777 13:09:37 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sched_setattr(0xffffffffffffffff, &(0x7f0000002b80)={0x38, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='cmdline\x00') preadv(r2, &(0x7f00000017c0), 0x315, 0x800000, 0x0) [ 589.291059][T28429] loop1: detected capacity change from 0 to 262150 13:09:37 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000040)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x10000000600}], 0x0, &(0x7f0000000140)={[], [{@uid_eq}]}) 13:09:37 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000040)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x10000000600}], 0x0, &(0x7f0000000140)={[], [{@uid_eq}]}) [ 589.471104][T28442] loop1: detected capacity change from 0 to 262150 [ 589.569879][T28448] loop1: detected capacity change from 0 to 262150 13:09:37 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000040)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x10000000600}], 0x0, &(0x7f0000000140)={[], [{@uid_eq}]}) [ 589.733535][T28453] loop1: detected capacity change from 0 to 262150 13:09:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), 0x4) 13:09:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x6) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)={0xbc, r1, 0x1343, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0xa8, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4000000}, @ETHTOOL_A_STRINGSET_ID={0x8}]}]}]}, 0xbc}}, 0x0) 13:09:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)=';', 0x1) sendfile(r0, r1, 0x0, 0x1c500) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$cont(0x20, 0x0, 0x0, 0x0) 13:09:37 executing program 1: arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000000)) mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4) 13:09:37 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0x2bcf) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x81) sendto$inet(r0, &(0x7f0000000200)="af", 0xfffffffffffffdef, 0x4155, 0x0, 0x0) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x106) [ 589.968315][T28464] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 589.981971][T28470] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 13:09:40 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="66530700ae897094e71b0fb1f14701ffffffffffffff66538d750f6ee1d001093f136318ffd6caefe5a73f0500ab783c7d5dbb9fb245f2d1eaa3ca203640e3e1c7f9cf6d2223d569b6fe53fd32283d7628e90f21c8c43e99720ed72373a3e96ccd9a517752e54a9776e8d92c8cca06f571199725b26547f8ff103ad731ab11da4b049fbb92ea50d088afd1623da1e522b7a3db2efa30800df7a38f4922d714402c23b311c95965111b863c79f5772cab115af07794c89b2b77c52a37d4d0f04aeb2b84dc77e71cf1e03baa8f8640b9feb36f252b0bd1e19009f3f3dc7030", 0xde}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x4) 13:09:40 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, 0x0) 13:09:40 executing program 0: set_mempolicy(0x0, 0x0, 0x0) r0 = getpid() sched_setaffinity(r0, 0x8, &(0x7f0000000500)=0x9) clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:09:40 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0x2bcf) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x81) sendto$inet(r0, &(0x7f0000000200)="af", 0xfffffffffffffdef, 0x4155, 0x0, 0x0) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x106) 13:09:40 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000003c0)={0x46e3, 0x5f3, 0x6b7897ab, 0x85ab, 0x0, "ec4b2cf4dd291ac55a0cde0c254d6c6cb5a8c4"}) r1 = perf_event_open(0x0, 0x0, 0x8, 0xffffffffffffffff, 0x0) r2 = msgget(0x0, 0x204) syz_open_dev$tty1(0xc, 0x4, 0x3) msgctl$IPC_STAT(r2, 0x2, &(0x7f0000000000)=""/46) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000100)) gettid() syz_open_dev$tty1(0xc, 0x4, 0x4) sync() msgrcv(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="0000000000000000000000000080da0500000000000000000000000000000000000000000000000000000000000918000000000000000004000000000000000000000000000000000000120c00000000175b2bc8ab73860de038e9b5d1d0a500000010000000000000000000001bc0f7970000000600000000000000fd000000000000000000000000000000000000000800"/188], 0xd2, 0x1, 0x1000) ioctl$F2FS_IOC_GARBAGE_COLLECT(r1, 0x4004f506, &(0x7f0000000040)=0x1) 13:09:40 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0x2bcf) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x81) sendto$inet(r0, &(0x7f0000000200)="af", 0xfffffffffffffdef, 0x4155, 0x0, 0x0) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x106) 13:09:40 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000012c0)={&(0x7f0000000040)=ANY=[], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='timerslack_ns\x00') exit(0x0) preadv(r0, &(0x7f0000000500), 0x37d, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000008c0)=ANY=[@ANYBLOB="5c020000", @ANYRES16], 0x25c}, 0x1, 0x0, 0x0, 0x41}, 0x4810) 13:09:40 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0x2bcf) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x81) sendto$inet(r0, &(0x7f0000000200)="af", 0xfffffffffffffdef, 0x4155, 0x0, 0x0) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x106) 13:09:40 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0x2bcf) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x81) sendto$inet(r0, &(0x7f0000000200)="af", 0xfffffffffffffdef, 0x4155, 0x0, 0x0) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x106) 13:09:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40000, 0x4, &(0x7f0000000480)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000010500)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff10ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff00000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000180)) setxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f00000000c0)=ANY=[], 0xfc8, 0x0) 13:09:40 executing program 1: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000200)='./bus\x00', 0x10103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x50) process_vm_writev(r2, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/4096, 0x1000}], 0x1, &(0x7f0000003500)=[{&(0x7f0000001700)=""/4095, 0xfff}], 0x1, 0x0) 13:09:40 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0x2bcf) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x81) sendto$inet(r0, &(0x7f0000000200)="af", 0xfffffffffffffdef, 0x4155, 0x0, 0x0) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x106) 13:09:43 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="66530700ae897094e71b0fb1f14701ffffffffffffff66538d750f6ee1d001093f136318ffd6caefe5a73f0500ab783c7d5dbb9fb245f2d1eaa3ca203640e3e1c7f9cf6d2223d569b6fe53fd32283d7628e90f21c8c43e99720ed72373a3e96ccd9a517752e54a9776e8d92c8cca06f571199725b26547f8ff103ad731ab11da4b049fbb92ea50d088afd1623da1e522b7a3db2efa30800df7a38f4922d714402c23b311c95965111b863c79f5772cab115af07794c89b2b77c52a37d4d0f04aeb2b84dc77e71cf1e03baa8f8640b9feb36f252b0bd1e19009f3f3dc7030", 0xde}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x4) 13:09:43 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000140)=@ethtool_per_queue_op={0x4b, 0xf}}) 13:09:43 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0x2bcf) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x81) sendto$inet(r0, &(0x7f0000000200)="af", 0xfffffffffffffdef, 0x4155, 0x0, 0x0) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x106) 13:09:43 executing program 5: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000000c0)=0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) lseek(r3, 0x7ffffc, 0x0) write$binfmt_elf64(r3, &(0x7f0000001700)=ANY=[], 0xfd14) fallocate(r3, 0x100000003, 0x80bf13, 0x28120001) fallocate(r0, 0x100000003, 0x0, 0x28120001) 13:09:43 executing program 1: set_mempolicy(0x8002, &(0x7f0000000440)=0x1, 0xb) clone(0xd0940080, 0x0, 0x0, 0x0, 0x0) 13:09:43 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000003c0)={0x46e3, 0x5f3, 0x6b7897ab, 0x85ab, 0x0, "ec4b2cf4dd291ac55a0cde0c254d6c6cb5a8c4"}) r1 = perf_event_open(0x0, 0x0, 0x8, 0xffffffffffffffff, 0x0) r2 = msgget(0x0, 0x204) syz_open_dev$tty1(0xc, 0x4, 0x3) msgctl$IPC_STAT(r2, 0x2, &(0x7f0000000000)=""/46) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000100)) gettid() syz_open_dev$tty1(0xc, 0x4, 0x4) sync() msgrcv(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="0000000000000000000000000080da0500000000000000000000000000000000000000000000000000000000000918000000000000000004000000000000000000000000000000000000120c00000000175b2bc8ab73860de038e9b5d1d0a500000010000000000000000000001bc0f7970000000600000000000000fd000000000000000000000000000000000000000800"/188], 0xd2, 0x1, 0x1000) ioctl$F2FS_IOC_GARBAGE_COLLECT(r1, 0x4004f506, &(0x7f0000000040)=0x1) 13:09:43 executing program 1: syz_mount_image$iso9660(&(0x7f0000004cc0), &(0x7f0000004d00)='./file0\x00', 0x0, 0x0, &(0x7f0000005d80), 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='check=strict,nocompress,utf8']) 13:09:43 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@loopback, 0x800, 0x0, 0x2000000000903, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x800, 0x2, 0x0, 0x0, 0x200, 0xfffe}, 0x20) 13:09:43 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x800000000009031, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)='cpu&3!\x00\n\xc0\xf9*`\x00OE\xd2&hIC\xff0&e\x10\xb1\x85o\x9e\xc4\xb5=\xb6\x85\x80\x14\xcem\xda\x85\x16ew\xd6\xecC\xa6\xbf\x16#\xb9\xb7;\xc5z\xc8\xca\xeb\x82\aU\x13\xb4Y\xa9LO^R\xf3\xbcM\x1c\xa2G\x87\xea4\xa1tlo|\xb2\xad\xc7~\x11\xe9:w2\xd1A\xda\x04\xb3F\xe7\xfb\xe9\xb0\xd3\'H\xed') 13:09:43 executing program 5: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000000c0)=0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) lseek(r3, 0x7ffffc, 0x0) write$binfmt_elf64(r3, &(0x7f0000001700)=ANY=[], 0xfd14) fallocate(r3, 0x100000003, 0x80bf13, 0x28120001) fallocate(r0, 0x100000003, 0x0, 0x28120001) 13:09:43 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000000c0)=0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) lseek(r3, 0x7ffffc, 0x0) write$binfmt_elf64(r3, &(0x7f0000001700)=ANY=[], 0xfd14) fallocate(r3, 0x100000003, 0x80bf13, 0x28120001) fallocate(r0, 0x100000003, 0x0, 0x28120001) [ 595.322126][T28553] ISOFS: Unable to identify CD-ROM format. 13:09:43 executing program 5: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000000c0)=0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) lseek(r3, 0x7ffffc, 0x0) write$binfmt_elf64(r3, &(0x7f0000001700)=ANY=[], 0xfd14) fallocate(r3, 0x100000003, 0x80bf13, 0x28120001) fallocate(r0, 0x100000003, 0x0, 0x28120001) [ 595.411803][T28553] ISOFS: Unable to identify CD-ROM format. 13:09:46 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="66530700ae897094e71b0fb1f14701ffffffffffffff66538d750f6ee1d001093f136318ffd6caefe5a73f0500ab783c7d5dbb9fb245f2d1eaa3ca203640e3e1c7f9cf6d2223d569b6fe53fd32283d7628e90f21c8c43e99720ed72373a3e96ccd9a517752e54a9776e8d92c8cca06f571199725b26547f8ff103ad731ab11da4b049fbb92ea50d088afd1623da1e522b7a3db2efa30800df7a38f4922d714402c23b311c95965111b863c79f5772cab115af07794c89b2b77c52a37d4d0f04aeb2b84dc77e71cf1e03baa8f8640b9feb36f252b0bd1e19009f3f3dc7030", 0xde}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x4) 13:09:46 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000000c0)=0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) lseek(r3, 0x7ffffc, 0x0) write$binfmt_elf64(r3, &(0x7f0000001700)=ANY=[], 0xfd14) fallocate(r3, 0x100000003, 0x80bf13, 0x28120001) fallocate(r0, 0x100000003, 0x0, 0x28120001) 13:09:46 executing program 5: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000000c0)=0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) lseek(r3, 0x7ffffc, 0x0) write$binfmt_elf64(r3, &(0x7f0000001700)=ANY=[], 0xfd14) fallocate(r3, 0x100000003, 0x80bf13, 0x28120001) fallocate(r0, 0x100000003, 0x0, 0x28120001) 13:09:46 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x2) write$evdev(r1, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000080)=0x1) ioctl$EVIOCGRAB(r1, 0x40044590, 0x0) getrlimit(0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x20) 13:09:46 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x800000000009031, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)='cpu&3!\x00\n\xc0\xf9*`\x00OE\xd2&hIC\xff0&e\x10\xb1\x85o\x9e\xc4\xb5=\xb6\x85\x80\x14\xcem\xda\x85\x16ew\xd6\xecC\xa6\xbf\x16#\xb9\xb7;\xc5z\xc8\xca\xeb\x82\aU\x13\xb4Y\xa9LO^R\xf3\xbcM\x1c\xa2G\x87\xea4\xa1tlo|\xb2\xad\xc7~\x11\xe9:w2\xd1A\xda\x04\xb3F\xe7\xfb\xe9\xb0\xd3\'H\xed') 13:09:46 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000003c0)={0x46e3, 0x5f3, 0x6b7897ab, 0x85ab, 0x0, "ec4b2cf4dd291ac55a0cde0c254d6c6cb5a8c4"}) r1 = perf_event_open(0x0, 0x0, 0x8, 0xffffffffffffffff, 0x0) r2 = msgget(0x0, 0x204) syz_open_dev$tty1(0xc, 0x4, 0x3) msgctl$IPC_STAT(r2, 0x2, &(0x7f0000000000)=""/46) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000100)) gettid() syz_open_dev$tty1(0xc, 0x4, 0x4) sync() msgrcv(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="0000000000000000000000000080da0500000000000000000000000000000000000000000000000000000000000918000000000000000004000000000000000000000000000000000000120c00000000175b2bc8ab73860de038e9b5d1d0a500000010000000000000000000001bc0f7970000000600000000000000fd000000000000000000000000000000000000000800"/188], 0xd2, 0x1, 0x1000) ioctl$F2FS_IOC_GARBAGE_COLLECT(r1, 0x4004f506, &(0x7f0000000040)=0x1) 13:09:46 executing program 5: r0 = socket$inet(0x2, 0xa, 0x0) getpeername$inet(r0, 0x0, &(0x7f0000000140)) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key$user(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x66, 0xd9f, 0x0) keyctl$set_reqkey_keyring(0xe, 0x4) request_key(&(0x7f0000000100)='user\x00', &(0x7f00000000c0), &(0x7f0000000040)='\x7f\x00\x9d\x98\x06\x00\x8a\xe3\x7fs\x00\x00\xa0\xf4\xdb\xae\x00\x00\xed\x00\x00\x00\x00\x00', 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 13:09:46 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000000c0)=0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) lseek(r3, 0x7ffffc, 0x0) write$binfmt_elf64(r3, &(0x7f0000001700)=ANY=[], 0xfd14) fallocate(r3, 0x100000003, 0x80bf13, 0x28120001) fallocate(r0, 0x100000003, 0x0, 0x28120001) 13:09:46 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010800000000080044946beba71a4976e27aabffff8f6e2e2aba000000012e0b3836015404b0e0301a4c0275f2e3ff5f163e10000000000101013c581d039e14775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100000000000000497400003a09ffc2c65400"}, 0x80) 13:09:46 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000000)={{{@in=@private, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {}, {}, 0x0, 0x0, 0x3}, {{@in=@empty}, 0x0, @in6=@private2}}, 0xe8) 13:09:46 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000006f40)=[{{&(0x7f0000002fc0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_PROTOCOL_FEATURES(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x14, r1, 0x201}, 0x14}}, 0x0) 13:09:46 executing program 0: ioprio_set$pid(0x1, 0x0, 0x4004) 13:09:49 executing program 3: unshare(0x20000400) r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000080)={0x0, 0x24, 0x0, 0x0, "8619cc42ed916cf724f678d869f81043e4783e65da1606fb14a9d45f109f7b10"}) 13:09:49 executing program 0: pipe(&(0x7f00000001c0)={0xffffffffffffffff}) accept4(r0, 0x0, 0x0, 0x80400) 13:09:49 executing program 5: clock_settime(0xa, 0x0) 13:09:49 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x800000000009031, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)='cpu&3!\x00\n\xc0\xf9*`\x00OE\xd2&hIC\xff0&e\x10\xb1\x85o\x9e\xc4\xb5=\xb6\x85\x80\x14\xcem\xda\x85\x16ew\xd6\xecC\xa6\xbf\x16#\xb9\xb7;\xc5z\xc8\xca\xeb\x82\aU\x13\xb4Y\xa9LO^R\xf3\xbcM\x1c\xa2G\x87\xea4\xa1tlo|\xb2\xad\xc7~\x11\xe9:w2\xd1A\xda\x04\xb3F\xe7\xfb\xe9\xb0\xd3\'H\xed') 13:09:49 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x2) write$evdev(r1, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000080)=0x1) ioctl$EVIOCGRAB(r1, 0x40044590, 0x0) getrlimit(0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x20) 13:09:49 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[], [{@context={'context', 0x2c, 'staff_u'}}]}) 13:09:49 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001580)={0x80, 0x0, 0x2, 0x401, 0x0, 0x0, {0x2}, [@CTA_EXPECT_TUPLE={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x24, 0x3, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASTER={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @local}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}]}]}, 0x80}}, 0x0) 13:09:49 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) 13:09:49 executing program 4: bind$inet(0xffffffffffffffff, 0x0, 0x0) gettid() recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./bus/file0\x00', 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000600)='./bus/file0\x00', 0xf0000423) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f00000002c0)={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x0, @link_local}, 0x78, {0x2, 0x0, @private}, 'wlan1\x00'}) lstat(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f0000000640)=[{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000300)='|', 0x1}], 0x1, &(0x7f0000000600)=ANY=[@ANYBLOB="14000000000000000100000001"], 0x14}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000000)=[{{0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x3df, 0x86, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x108c0, 0x0) 13:09:49 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f00007e6000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000500)=ANY=[@ANYBLOB="e00000027f0000010000000009000000ac1e7bf5707c5a810201ac26ea15ac14ea15ac141492ffff000000003d"], 0x34) setsockopt$inet_mreqsrc(r0, 0x0, 0x25, &(0x7f00003fdff5)={@multicast2, @loopback}, 0xc) 13:09:49 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda6, 0x4) writev(r0, &(0x7f0000000780)=[{&(0x7f0000000100)="dff548771d77ce8786aca76dda6fb054ab8ea73799d7293eda90ba41a2db81fab55b5415692300a8e64bca2f60e1717f85f06a6bbca90f392b04f34940db7ffccc33ed6ea82296de9683c9e360cd1c477304bd8f9bd74d44a4c7d1c7e625a86cd54b72c5745f475a772b84977a6b05381dbe6259bc510f0f70c3e9946a78c7b5a19e97447799d930f9", 0x89}, {&(0x7f00000001c0)="96431fb1cb119741590ad657dc5e5ce3e5fe9f1f639e6a18bc7b6c1d0b424eb306f34cf2429c62c0fdefbae36740a7169721af852826d7f14b6cae8af86507ff78a1dda991aea5952f43e7e0146a3c035f0113d617240e8940c60cdf3400193bbe3a0c0b1eae5799db27b4ee9c13475210defa4dac9d784e0c89135b82b321f8e43d7a5db9ab1bfd319f472a", 0x8c}, {&(0x7f0000001340)="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", 0x1b9}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="1a268a927f1f6588b967480241ba78600453f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x1cc, 0x11, 0x0, 0x27) 13:09:49 executing program 0: r0 = syz_io_uring_setup(0x1e28, &(0x7f0000000080)={0x0, 0x0, 0x1}, &(0x7f0000ff3000/0x3000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000200)) syz_open_pts(r3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_SPLICE={0x1e, 0x0, 0x0, @fd_index}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x34) 13:09:49 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x20012, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mlock2(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0) mlock(&(0x7f0000005000/0x1000)=nil, 0x1000) mlock(&(0x7f0000003000/0x3000)=nil, 0x3002) 13:09:49 executing program 4: socket$inet6(0xa, 0x802, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x200000000011, r1, 0x0) poll(&(0x7f00000000c0)=[{r1}, {}], 0x2, 0x6) 13:09:49 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = dup(r0) sendmsg$NL80211_CMD_TESTMODE(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0xfffffffffffffffc}}, 0x0) 13:09:49 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x800000000009031, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000140)='cpu&3!\x00\n\xc0\xf9*`\x00OE\xd2&hIC\xff0&e\x10\xb1\x85o\x9e\xc4\xb5=\xb6\x85\x80\x14\xcem\xda\x85\x16ew\xd6\xecC\xa6\xbf\x16#\xb9\xb7;\xc5z\xc8\xca\xeb\x82\aU\x13\xb4Y\xa9LO^R\xf3\xbcM\x1c\xa2G\x87\xea4\xa1tlo|\xb2\xad\xc7~\x11\xe9:w2\xd1A\xda\x04\xb3F\xe7\xfb\xe9\xb0\xd3\'H\xed') 13:09:49 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x2) write$evdev(r1, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000080)=0x1) ioctl$EVIOCGRAB(r1, 0x40044590, 0x0) getrlimit(0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x20) 13:09:49 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(r1, 0x0, 0x2b, &(0x7f00000004c0)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @dev}}}, 0x108) setsockopt$inet_group_source_req(r1, 0x0, 0x2c, &(0x7f00000004c0)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @dev}}}, 0x108) 13:09:49 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) getrlimit(0x0, &(0x7f0000000080)) 13:09:49 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/tty/drivers\x00', 0x0, 0x0) close(r1) 13:09:49 executing program 4: r0 = socket(0x10, 0x803, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x30, &(0x7f0000000000), 0x20a154cc) 13:09:49 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05c41bd34e", 0x17}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 602.061180][ T25] audit: type=1326 audit(1619960989.936:954): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28689 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 602.125773][ T25] audit: type=1326 audit(1619960989.955:955): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28689 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=56 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 602.179140][ T25] audit: type=1326 audit(1619960989.955:956): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28689 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 602.217088][ T25] audit: type=1326 audit(1619960989.955:957): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28689 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 602.242202][ T25] audit: type=1326 audit(1619960989.955:958): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28689 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=186 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 602.267098][ T25] audit: type=1326 audit(1619960989.955:959): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28689 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 602.291775][ T25] audit: type=1326 audit(1619960989.955:960): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28689 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 602.316472][ T25] audit: type=1326 audit(1619960989.955:961): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28689 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=61 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 602.341212][ T25] audit: type=1326 audit(1619960989.955:962): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28695 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 602.365605][ T25] audit: type=1326 audit(1619960989.955:963): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28695 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 13:09:50 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fork() 13:09:50 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8682) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000200)="d70eae548e0d679aae4562d0ba63160c1701c42887e84927", 0x18}], 0x1) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 13:09:50 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000001340)={&(0x7f0000000180)=@getpolicy={0xec4, 0x15, 0x1, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}, [@XFRMA_IF_ID={0x8}, @algo_auth={0xe45, 0x1, {{'cbcmac(twofish-generic)\x00'}, 0x6fe8, "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"}}, @sec_ctx={0xc, 0x8, {0x8}}, @policy_type={0xa}, @offload={0xc}]}, 0xec4}}, 0x0) 13:09:50 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002ac0)={&(0x7f00000004c0)=@acquire={0x16c, 0x17, 0x1, 0x0, 0x0, {{@in=@local}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {@in=@multicast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {{@in6=@mcast2, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x8}}, [@tmpl={0x44, 0x8, [{{@in6=@remote}, 0x0, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}]}]}, 0x16c}}, 0x0) 13:09:50 executing program 2: r0 = syz_io_uring_setup(0xea4, &(0x7f0000000080), &(0x7f000003f000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_STATX={0x15, 0x58ff346b9ab41012, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) 13:09:50 executing program 2: r0 = syz_io_uring_setup(0xea4, &(0x7f0000000080), &(0x7f000003f000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_STATX={0x15, 0x58ff346b9ab41012, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) 13:09:50 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x2) write$evdev(r1, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000080)=0x1) ioctl$EVIOCGRAB(r1, 0x40044590, 0x0) getrlimit(0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x20) 13:09:50 executing program 4: r0 = syz_io_uring_setup(0xea4, &(0x7f0000000080), &(0x7f000003f000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_STATX={0x15, 0x58ff346b9ab41012, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) 13:09:50 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000140)={[{@mpol={'mpol', 0x3d, {'prefer', '=relative', @val={0x3a, [0x30, 0x2d, 0x35, 0x3a]}}}, 0x4e}]}) 13:09:50 executing program 5: mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='cgroup2\x00', 0x1, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000340)=""/157, 0x200003dd) 13:09:50 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY(0xffffffffffffffff, 0x5000940f, &(0x7f0000000000)={{}, "a7bce6587618f1b0bab4d1ebaee917ef02dfea10fa245120e39ba5b64cf3ac55ea897be5a423c5cb7a227c280485ce7c471a3f216b6023dac6d674dc57a8dff08b7a860fa9a2664f03a0abd0817938af8a85d6e42e8009793f2bfa1aa7964547a7c2bf6e31d675ca3e4b0ca6c38a33a2e5a2472cc0e19170bc662d91d9212502514382fd196a4d1175d498a1bd4db7048e2c05039b02c4a00da4828dbce9de855f5e4e6861bc3c2841bb5ec5e0647d09bed35423a83095d8c28078881dadeda4b5b4ae200c99082c3f42e3708cfe12aa91cba9d0191208b0d0fa1defc3f7af944cf7c50ff65a7c57054be058d9c612984939c84ded12c159816517396318a0479dbbac6ea447579d880b0abac2aa7f5690d69a87fcb184ba278126fa96fcb37270ff45b12cc58b36b2d2c24c4338426ba5e90d7236e0d81d89171a7b6b08e86b1eed05185311179e04c4e01f867c0dda553ba604b694c68a198b061c1904b0cf94e4475dd6110eef1351319056a4f673888083d8c8618be19bcb36edc318dd133e5a9f10c319390d5b06aa0025521a6dafd0df8218789acaf9c6c8af2e9b2f0de25f8cddc507de82f66bd7166500db23bed3d9f964ed16d05e7c30ef30e439b3a447fbe98a054c75d9cab54855a22a580b142911ccbd61b55016883046741cc90b83a0dcd209fa030b126ca75aace80756bd8adcc4b8d8aaf73d0cf27a08273276c62f3b2d69fe9fbb47cfe13a5bcfb0d10ba15d6c19e9b12a81dd119d817617128d0fdcd7a5ae5602716c48c4291c9ebbf1bd06978dae0b2efc854a05f087fc48230c5ffef9698b54466f195980033064b7f2b754ddd18cec1aad33120971b5963b941c1ca745813eeb76b50631f4b2af7ef542812831f28bb9087d8403fae1fd036528fc8e2d050417f33b739195252d7e7c0a70e6f400e4cfe302a90542a5e835df88247fc89e6aa4964928674bb993b844bb5dce801daef1867eacaa4782e57d410acfd9b8551b6a23f47964861f55eb74bbca1b7609dc075b8e697aa57b9b8d12427b19cfd689e9b8467efe78aaf511873bde97aa07a78e9f289039314866a526ec9901e01a665503ed57f711e505cae9d76cc341c12033d0ec8e270084647f2baef6754629f30ef26910b02c07e2bb5e29eee0557e501f60304073be69968100b46113e4b4570f545f101889d0351171f971c053ebf16c80d331f9c7a1eb112597feac7b5a97f6d470dd925f018b31c390cda0626c0365e50cb1baa365b1f43021070c5ee4c54e054cb6c76e9fca0a769b08d4acb61d1f935e435bfdb3123296cf1b8885f9c4c5ef6a7fb7df98e18e3a951deb09e22971c1b04ed936df9eda151bcc6cbe946fdf82dc23a21ed00269560a6c5abb53205158e70c5777c57af4fb37d50329d110860781e083e8554b7a0f2abb16e3c99c5298e6e1ad0c5b0a81ee4c42bd19a0727fa405286b5cef1b3f9e8ad9afd13f96974434d191aab52d01b473ddb8381b8bd57b258fb97f0b998d91f76b582a963f7c3f39de2c79378b82973033e8e46191bdc7bbdc297b1527205ec46c3abedcf16302cf67384aff96654d9e62705f0e32c14eba2e01a998ac8d6e92b1e85da6dc750872f254a9718e9b0d9a357cf764dd6faeaa36ce585e566ffbc8afb5178de04b980b3d3dc4b7c3d66a7595716001fd8d38ecde478b616a05eaeaaded14711472f80273f06c76d375ab563c626c48cd9f26c8e1438be65e931d9743fe5e4a4d775d06df1d831bd4689152999a60c06a138dcb79a17ca543f6ff6c1eca030ea1f389b1862329d18a2a0334aa84b44e6e339bc14e2d679f134f3d4c1bc3dac892f8fe51af70ee426d5d4a6d649105eca9ba8bbe9858b000a0a1bd7e8f53c21422e764e5a034341b98abd00c113a2eb480f7c3bd3757d76e4812be76c8ddef8cf031e557f50e72e1ba4d0cf7c54d542431f55059c7791d50ca803db961a4327f4202addce22f850e18d83b6507f71251b5cfdf18221e5c8c2decc5fc7a8bfb47843ea0ee1ef437efe057235cdb93696e9c35aaa923c60efac834d0dc35e95d526d7e606ae5a6e87772909de9962848ac68e8e3d594d3f1f8a7960679f79fcf6fadb3acd88284a83dda8fb524a3a2e2249852c413ce4dbd4e264a049a2745507ee0fd72d02776548fd8d9c61bf4a3c3c8d4905e086865bc0b5fc5bf211fb467ddbf2fe3e99b850c057a296a09b8d9574aa714d421f4ce40f1acc368b7c820e4253e02a19815101d2af59cd99282b925d29b2a69446988897f95a8d68c23f403cb0619dea46b44b2e2f0365f0133e27e620b95360ec351fe8e2159d8e6a7978cebbb752921ea722f4b527ef41a7299c0be55bd283c96623a1f9ca9cfa6bd328e52cef408bd459b55e70fc51df9e45eed8c054bfa7c18990a5e0f3e1c9097996f5bd29e0512e16ec6a55f16d3334d94f79013bb398f6c8f3e9404e1224fd2f4ce2521705bd52a3e458094b5313cf5ee03acdf5c5ee3a6dbe3ffacd55764d9bb2fc36f315e01519204802590bf9a0c88464e0b19e95117b3d7bf95c2c473090915d83acc93d1f9d5dc8f800b1bfc838cfc347de6f7c42d266b6a9997c0ad071723a4c2041bb33f78e915593d16015129e14f39cbcd1b3991b56121f509f75d86c8c7c524dbef68935914aa98dc8011d74371ffa2db2dd1d2e3c5312d827ac40eaa105a09e6e67eb2946beb6bc73c77ac8336a54634c27a9b72d0ec0ffd846e34aee3a5b9a3c871ca7dd3cb6db6e1e1ece60e4a91b23f151c0a9efacd3ce5d7d4eaddbdeaa3ef8b8a7bc4ab1c35e1ddebbea15122f8cc8bffbf90259ccf35d77f143a93c1981cbef19e576c3f462a46e54583f401897df386cb736d59b1abc7f03688ea7f4b7cd8ddcac356d03233f8432accf819da82c75f8ccdb5f56cf58369dab3cc6c83cef8002a4a4f33ac5b9c51b57dc11da227a5eacd84258684129b53fcaae829be7a49d56446fa4ebb6450ea3bbcf78618e901fcc6105f5ed73d46a2a8c14cab9cf4918e218e3be710fe9b214e9c58232d4355249eb9d96ab9fc3478b402a1e38b76b3ded75dee9b373b541c5952242e2adbb4bfa3402f54228f5d5cd1c13847df49d298c6686cc5a27f3d9406490d0efe0c51fa4a137ba1fad9d6e5b7ed2729361e84c7fefbd559ce70c85536f572f4f9674189189c1d8302dd7869d67a177b44e33eba4a110f19b742cf983d6af7bbfe2e7ef9113a003ce6035cd5371478fcbfce19496dda388b52960ab47d3bd4e5fc6316e23cda017260c9cc689ffd6bfd2bbcf18d04ebe38928b9897bf9ee6f06fcef5e37942f2c72827e506b77d7ee1cf2cc66ea6b613957c379019fffdb06460c64552cd5101c51b3951f7fadaaed5588697c057deca01ff8e3c58df0b4da36fdb3a8694db750005b1a07b0f98868ebf5261831b41ec4f5673d8831ad32e999a8b89c1e4971f5af493f5278c11b5640e26a539ed4fd7e455573b93eab0b8d066218db88f9e75d75bdff05065ccc6de8fe679fab0ff4ab58220bb11956b78f025607f0678d302858d4937f726691ff58da7719d5f50407e5c07a8afca07cc14b3dbf7eb18a37210d9d25777d7be3239a846ff9fcccdca8b61dc7ef43e382a52b3cd4eb24e767a77571296bf5923a2678d487ed91a7e8f637543db58b09f01f63cab7bbb01e2988b2be00399eb58daf0722bae1fc8e016e729cc96395ef6bd8789ae552315dd9bbea028a6a3728ea5b51c3e5421ff02ce04f84abd94a4ca6c4c8d74fc909d233e10d147c4da040bd205e04f5b3d2b49deafd5bf76cbc2ebaa50b139b11e6b5daa54908039085db955ba713f18e006543bfb01399298e35b8a16e29e3661aae345b56839c156100f8b629fbf4a7fc1635ce6e74582154a2b4f09a2c538c3d64e95f65555784651cf89a1b7809e6c8c57ccb609329b0d8c48bc02a348f36bd1524582a751ed65cbed8c4a0940f57441af7fdc38cdbba7dc689f222a7d56a430f487da390f4ada7300babdb4ac09cea1fbcc176e5397fa2ea042f1fdf1511062ec56bf915cda78c05206b6446097206c22e433ff58e987709ad48ad36a1b4f3378e3e5476f99e9baa67679746b32fc00b96640e810d3fe772fccf58b4d9c77ef9f29f411851147847b7a3ef84c9ddcdf5b6bc0ac79ef7478fafc31d4e632c4801e0106c7bab62e3941cd798d77a867c48ef3168c309a29060e1dc680c691e6411819473463319d739220e29d8a6e9e4064f53533a49290616db2eb4dda35df5b367352a887b081adc0ba0e6c04585405c29dfc6a3dd883197059242d415282f39ba2b159fe6a171f31bcba394872e0bba946aae9e2e5d82674bdf27b96f98512b776dbac292e2164a3472f18946807938bba1a0ae410d035ec00d02e33a28291a4714950a64ace533ea5d0a96f9eb060a36aa2c739fca4709c66ba923c5bafc3ee33be1656c0b145a2c47cc1d2f9e81cfdf455c1c663c821d4f93a46b32d71628b30bd538ec02d2229874a4e0a26a6e66f02af47ecedc1e69671b6da64079fcf77d697b0a013dadd43eb7e6d7305fba4a7052ac36df41524e6c94717e29abe45503d934f32d40cb7bbc339f4d4f880e90f2d0181f1f7d657dfdebe679a1afbc17e75d68cf87ea6ac3373933aa917611939e649022f43836d58216b381d22c3b1a0172e7c9346263c7f3ada53362168e72f96a3faec874d729958af586fba1dc3f16eaed4ab3905d7a1d75da1b606cae86fae5e112e3e685cb3bce9e441583e5639721f6f733a729fcf9db860cc903eda6e6a7a8beba3c7171f4149199cdb7002a62601f4b49fb8820cd6700b97b0ad4f43ba6c8bc1fead29d4d4fefa28772aec94d82d650c90d6d8dc92bde64081cf6d3e929f10fb78eedd651b754b9f1a89833d2e93fc2265ae23ed5cb627719473c2a3bbc5e09a378465a1ceced878c23964989c5c9a6d47aebbab603db24adeab77aba115b413315b3c84a14e87915cd82012f33e96a3398c51c20ed70af576fa472d3f12506c7ce791a87548896d7da77f1a30adf3c85d7cc53ac1aee2d074e742a4c6a35f16cc4c345a45cba0f52c7280f076db172c89faefa38bf629b70dfa82c936a243774baa739a9d2527d79562015bb256e5c1bfec3906b218fe4ca56e00e425ec4d47f643f2f8e3baf9c35f83da7d2fb478f602b308c3c97a819c7d972949510fe4ea8cc62d4fff5206f51cc364c61f5695b9e3634060f3ed8352201ab6a6bed31175ecd6c2d9bcc0e188c31373ee87e3455bb9dc2d7345b4e4ea4f8b3cfddff5cdf8c6e63a9aa7eef273115851f661c22ca14b8d273a2e9091c260df2768fe6e12fe257983b4d5a6f0efcc4126a868f49474305374b3deff48ae38334732b24b2b74751012c388e94b029536621db4efc264374a2b8d16e2cb8f69225e8445040bf7dd72638e81d9818d9eca47804805e6332373f7f7944a9099760571ae0208cd0ef2d1dabe51e38044a2cf69089fb3aab21de7dde72dc7de4f38be9be794b47629452d345a71fa361100671e2812a27f937e32c33dd346f12b2c36b371211aa0f043755c517311da4baa418887f825bb2df06468049da1180dcff52313243084d4123016fd4ae83eeb90764438b61e465bf88ca650822d8d81c79d81ee6903dee922c0eb6ebc5f51c05a523162ffd4aa6db148e3110aa386a32060ac1c62ed942b5e65520c2918c918fd4d63ff96536ab3c50e562662bbf772bf397fb94779f01d630dc890391a9e5337cb7075c6be6d8122a90d7f8"}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) setsockopt(r0, 0x0, 0x40, &(0x7f0000000040), 0x0) 13:09:50 executing program 2: r0 = syz_io_uring_setup(0xea4, &(0x7f0000000080), &(0x7f000003f000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_STATX={0x15, 0x58ff346b9ab41012, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) 13:09:50 executing program 2: r0 = syz_io_uring_setup(0xea4, &(0x7f0000000080), &(0x7f000003f000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_STATX={0x15, 0x58ff346b9ab41012, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) 13:09:50 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000140)={[{@mpol={'mpol', 0x3d, {'prefer', '=relative', @val={0x3a, [0x30, 0x2d, 0x35, 0x3a]}}}, 0x4e}]}) 13:09:50 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xee00, r1) ioctl$GIO_UNIMAP(r0, 0x4b62, &(0x7f0000000040)={0x0, 0x0}) [ 602.655268][T28741] tmpfs: Bad value for 'mpol' 13:09:50 executing program 4: r0 = syz_io_uring_setup(0xea4, &(0x7f0000000080), &(0x7f000003f000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_STATX={0x15, 0x58ff346b9ab41012, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) 13:09:50 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000140)={[{@mpol={'mpol', 0x3d, {'prefer', '=relative', @val={0x3a, [0x30, 0x2d, 0x35, 0x3a]}}}, 0x4e}]}) 13:09:50 executing program 5: r0 = getpgrp(0x0) tkill(r0, 0x0) [ 602.725293][T28759] tmpfs: Bad value for 'mpol' [ 602.777928][T28774] tmpfs: Bad value for 'mpol' 13:09:51 executing program 2: r0 = syz_io_uring_setup(0x187, &(0x7f0000000000), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000980)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd=r3, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000440)=@IORING_OP_STATX={0x15, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) 13:09:51 executing program 4: r0 = syz_io_uring_setup(0xea4, &(0x7f0000000080), &(0x7f000003f000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_STATX={0x15, 0x58ff346b9ab41012, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) 13:09:51 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/241, 0xf1) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000180)={0x1d3}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0xc0605345, &(0x7f0000000300)={0x80, 0x0, 'client1\x00', 0x0, "3f5ac29df43e8d7f", "f1520b1b5492c66dea258adfddf281cda740ad5f71139be35580178517d85eb6"}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) tkill(r1, 0x1004000000016) 13:09:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000140)={[{@mpol={'mpol', 0x3d, {'prefer', '=relative', @val={0x3a, [0x30, 0x2d, 0x35, 0x3a]}}}, 0x4e}]}) 13:09:51 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) read$char_raw(r0, 0x0, 0x0) 13:09:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="000000ed020000000000000000000000000000000000090000000000200004000000000000000500400000000000000e", 0x30, 0x540}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012e00)) 13:09:51 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x441, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) [ 603.154469][T28784] tmpfs: Bad value for 'mpol' 13:09:51 executing program 2: r0 = syz_io_uring_setup(0x187, &(0x7f0000000000), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000980)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd=r3, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000440)=@IORING_OP_STATX={0x15, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) 13:09:51 executing program 4: r0 = perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, r0, 0x0) 13:09:51 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, r2, 0x3e1a485fa68f9349}, 0x14}}, 0x0) 13:09:51 executing program 0: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xee00, r1, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) fstat(r2, &(0x7f00000024c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, r3) setresgid(0xffffffffffffffff, 0x0, 0x0) [ 603.193253][T28797] loop1: detected capacity change from 0 to 2048 [ 603.203938][T28797] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 13:09:51 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x116}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 13:09:51 executing program 2: r0 = syz_io_uring_setup(0x187, &(0x7f0000000000), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000980)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd=r3, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000440)=@IORING_OP_STATX={0x15, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) 13:09:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000000)=0xfffffffd, 0x4) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendto$inet6(r0, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0xfffffffffffffee0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) [ 603.257477][T28797] loop1: detected capacity change from 0 to 2048 [ 603.269361][T28797] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 13:09:51 executing program 5: r0 = epoll_create(0x7) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)={0x10000000}) 13:09:51 executing program 1: syz_mount_image$iso9660(0x0, &(0x7f0000000200)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/rt6_stats\x00') r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000800)='numa_maps\x00') mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000180), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@fsuuid}]}}) 13:09:51 executing program 2: r0 = syz_io_uring_setup(0x187, &(0x7f0000000000), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000980)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd=r3, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000440)=@IORING_OP_STATX={0x15, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) 13:09:51 executing program 3: mlock2(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x2) mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) 13:09:51 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000440)="d0026e", 0x3}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2fc903c2b54706c05e4cb2e2875107608f9143f299d8e3f78f4bf076484885fd4089cb084607435b77c7f44cf0783279a494c8e4eba955b16e77f57966d4ba7560f29500352543b498fccba20bcae2b6f577b36b79f72f77e153f55e4fa6ad43af0d450a8f2c60baabf84ab4350874b05f4635c7449bac4383622ae4da09326e51bc3130b44a9df8704c9656b60912f", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 13:09:51 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = semget$private(0x0, 0x20000000102, 0x0) unlinkat(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f0000000140)=@nfc, &(0x7f0000000240)=0x80) semop(r0, &(0x7f0000000000)=[{0x0, 0x2}, {}], 0x2) semctl$IPC_RMID(r0, 0x0, 0x0) 13:09:51 executing program 2: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000000)=ANY=[@ANYRESHEX], 0x64, 0x0) msgsnd(r0, &(0x7f0000000240)={0x3, "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"}, 0x39d, 0x0) msgrcv(r0, &(0x7f0000000040)={0x0, ""/102}, 0x6e, 0x0, 0x0) 13:09:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@private1, 0x0, 0x0, 0xff, 0xb, 0x8000, 0xe93}, 0x20) 13:09:52 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000440)="d0026e", 0x3}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2fc903c2b54706c05e4cb2e2875107608f9143f299d8e3f78f4bf076484885fd4089cb084607435b77c7f44cf0783279a494c8e4eba955b16e77f57966d4ba7560f29500352543b498fccba20bcae2b6f577b36b79f72f77e153f55e4fa6ad43af0d450a8f2c60baabf84ab4350874b05f4635c7449bac4383622ae4da09326e51bc3130b44a9df8704c9656b60912f", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 13:09:52 executing program 5: r0 = epoll_create(0x7) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)={0x10000000}) 13:09:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000000)=0xfffffffd, 0x4) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendto$inet6(r0, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0xfffffffffffffee0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) 13:09:52 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x88880, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, '\x00', 0xfc}}, 0x1c) sendto$inet6(r0, &(0x7f00000009c0)="c7cfcaaa22e10542fca5c0195350f15147657e0bfc59d383a47190db88690e6fedc3040ab5809ae02a54cd429cc3338c5afa0c9dce3f91950d1f567f358ac21154159130e88cbb6c43197813b2f23f3e442f80877490b393408142ebcfea6821f543e5ee9e27032e2b75d78f1b79f5a6bb6f0645e267770ef7e8f3a92148091217450ce8581e54223eeb6486205a209bf1fe854d211c03f8c3140fc3979d824082990d119473d20e94f253c9621fac339560ae46cb24b88bf2d01559bb658e343257b90f233b81bc5c398be3bbddb23a1e", 0xffd6, 0xc001, 0x0, 0xffffffffffffff0c) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000040)=0x3, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@dev}, 0x14) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000000), 0x4) 13:09:52 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000440)="d0026e", 0x3}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2fc903c2b54706c05e4cb2e2875107608f9143f299d8e3f78f4bf076484885fd4089cb084607435b77c7f44cf0783279a494c8e4eba955b16e77f57966d4ba7560f29500352543b498fccba20bcae2b6f577b36b79f72f77e153f55e4fa6ad43af0d450a8f2c60baabf84ab4350874b05f4635c7449bac4383622ae4da09326e51bc3130b44a9df8704c9656b60912f", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 13:09:52 executing program 1: socket(0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x49d8, 0x12) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x2c060000) r0 = semget$private(0x0, 0x4007, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{}], 0x185, 0x0) unshare(0x44020000) semtimedop(0x0, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) semop(r0, &(0x7f0000000100)=[{0x0, 0x4}, {0x2, 0x2}, {0x2, 0xe1dd, 0x1000}], 0x3) semget(0x2, 0x0, 0x0) unshare(0x400) 13:09:52 executing program 5: r0 = epoll_create(0x7) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)={0x10000000}) 13:09:52 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000440)="d0026e", 0x3}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2fc903c2b54706c05e4cb2e2875107608f9143f299d8e3f78f4bf076484885fd4089cb084607435b77c7f44cf0783279a494c8e4eba955b16e77f57966d4ba7560f29500352543b498fccba20bcae2b6f577b36b79f72f77e153f55e4fa6ad43af0d450a8f2c60baabf84ab4350874b05f4635c7449bac4383622ae4da09326e51bc3130b44a9df8704c9656b60912f", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 13:09:52 executing program 2: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000000)=ANY=[@ANYRESHEX], 0x64, 0x0) msgsnd(r0, &(0x7f0000000240)={0x3, "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"}, 0x39d, 0x0) msgrcv(r0, &(0x7f0000000040)={0x0, ""/102}, 0x6e, 0x0, 0x0) 13:09:52 executing program 5: r0 = epoll_create(0x7) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)={0x10000000}) 13:09:52 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6641db6e0551832d303744e57e897094b15ba5d9e70400b1f14712d8ebca47f8b25e7717fd68a8378f362fbf30b8a40a525b7be87baeb12d8e440a49eb252ea2f7fc05d7e532e1a906abffff030000000000008bc3b53e32de099dad2f8fea962d0cbb0f359530f5bc65e8e7d6d01252f603eaab1c436d0a063b764392e63adca6ad5ff795a4f8f816f99b8189589fb3fbdc4b62b4bdadbebb99bd02b3dc8ade", 0xa0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 13:09:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10) connect$unix(r0, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r0, &(0x7f0000000140)="1102962a3b814a508870092479bd5f", 0x1, 0x8000, 0x0, 0x59) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), 0x14) recvfrom$inet(r0, &(0x7f0000001300)=""/4096, 0x1000, 0x62, 0x0, 0x0) 13:09:52 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="66530700ae897094e71b0fb1f147a8378f364602812c66538d750f6ee1d001f43f0500bb9fb0", 0x26}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) 13:09:52 executing program 3: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/102, 0x66}], 0x1, 0x0, 0x4a, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) readv(r0, &(0x7f0000000100), 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)={@local, @mcast1, @mcast2}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000200)=ANY=[@ANYBLOB="51526ccf9657d11a246d5ae2b59366ed8216e316e1e1a687bcb77a106ec8bfceb0b2dc5462269162c14b2409a99fb60725cd5df9b077c57c026893b728ef28c6083dd652db34f2c8b286820962bf88caabebfef43f1d79371241f11c283b2513e0e0bc282281"]) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r1, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r1) 13:09:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000000)=0xfffffffd, 0x4) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendto$inet6(r0, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0xfffffffffffffee0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) 13:09:52 executing program 2: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000000)=ANY=[@ANYRESHEX], 0x64, 0x0) msgsnd(r0, &(0x7f0000000240)={0x3, "22251450169831c7f027caeeafafb1fb73890ef4d0bb8f067fc3e84af02468240320df94261b9307b3331cea8354b2588db852c6bbad8db77b9b6f577618bf7e43ce6d6c952fe094d44ef441438e3c695c4687c6cb51471b0b89c2da9033f430a58422eaf04dd2d4fcb8b425a6ebc7fe53ed70375ab00db36e0608d763af17fd08b068e76d7916e0ad7676e35e6139bb6640ad837d40417e5597f058c8fb98099bfad25d64eb9c2ba64b5d31e2bcf6370d2523224928cc88814bc0152189172b1923865af140c207786219a1caed4deb552939437b04a9cffedbb7f4a2451afd91349f734ce68457f7faaf4ebdb3390ac8fbb5b23cb6bbf3706e16385a80c703e17a319031c84d9b8d5024bf11ad05b19b76886f7dd5a76b5a8ef5f781676495517eaeb5348c6f53f8b8e2c991fff5d99f5d7f4c5f504ee1c487441635dabea40bc3adc1554e7bd2f0be9383f0b4fcb8e7fe116085aead66ef1cf4a2d0d6b0dc3f27ae02914a4bb9f80f93ba76500f7790620231ee8bfe511e6d5d1e8eced0c807eac83ffa8ad74306bbe1c4d8aa5f02b0875e195fd440d4d93a81821142e1470ebb6dcab37f75eb5399bb6b2127c3a2a43af00e9aaadb4b66f7670a2146c502962f2826ca7a5ea97a69dc4a895bc63ec932b21907212747fea8749714ca7eefbf16e177ce162704107c41446d3fe80dccb5377d46b097af061dd242281e6abba13f178bd333991f106e6bda7bc53cb8f1e1495e8fa2b2e3e1dccd099ddef8abb9139e42e983704a51cb694a5281af9fc2970f6463e92bb8bf8269d3d8e503532e61ce7e15a0ec7e94965fee959cfaed164e0a37942efbc25a5c505eb98e661edefb4f27f9b6769d8db90aa45281d223654d1b7ebd2150cb7de15983dedf7513976ff7294d8193b1843b58e07341265e805ab084ed884152df751257dc9829a3d11ef4f34940691523cd7bc5114dab3e8d9581381cfa9a807515734b9e16586826c724e05c6c7fd7041a1c0ef6e94418ef066683d7d72eccaf834040f9a159ceee32191f931d01d5be748bd2f84d85e52f6c995eb710947c9b00d50940064983089e129b68e2db3efb634eb5fe1f5678e1c46261b4a0bb1a6bd1848d6493f056db783b3b9f51aa2b46fb7e97f6ebca4dd4f2561a4792536f2509bf0c8f6c7f41d4610b5b4ae84123b36ed1268712f0cc4fe4130b34d0935cecabcfba6f5ca0dc6848de3cffe2ca89127f1b610cbe400195666acdfda122d12b82b18c0cb61723a21303500b2c75498360abeb82d4b8147017bc5679"}, 0x39d, 0x0) msgrcv(r0, &(0x7f0000000040)={0x0, ""/102}, 0x6e, 0x0, 0x0) 13:09:52 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6641db6e0551832d303744e57e897094b15ba5d9e70400b1f14712d8ebca47f8b25e7717fd68a8378f362fbf30b8a40a525b7be87baeb12d8e440a49eb252ea2f7fc05d7e532e1a906abffff030000000000008bc3b53e32de099dad2f8fea962d0cbb0f359530f5bc65e8e7d6d01252f603eaab1c436d0a063b764392e63adca6ad5ff795a4f8f816f99b8189589fb3fbdc4b62b4bdadbebb99bd02b3dc8ade", 0xa0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 13:09:52 executing program 1: socket(0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x49d8, 0x12) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x2c060000) r0 = semget$private(0x0, 0x4007, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{}], 0x185, 0x0) unshare(0x44020000) semtimedop(0x0, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) semop(r0, &(0x7f0000000100)=[{0x0, 0x4}, {0x2, 0x2}, {0x2, 0xe1dd, 0x1000}], 0x3) semget(0x2, 0x0, 0x0) unshare(0x400) 13:09:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x12, &(0x7f0000000080)="45201a7e", 0x4) 13:09:52 executing program 2: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000000)=ANY=[@ANYRESHEX], 0x64, 0x0) msgsnd(r0, &(0x7f0000000240)={0x3, "22251450169831c7f027caeeafafb1fb73890ef4d0bb8f067fc3e84af02468240320df94261b9307b3331cea8354b2588db852c6bbad8db77b9b6f577618bf7e43ce6d6c952fe094d44ef441438e3c695c4687c6cb51471b0b89c2da9033f430a58422eaf04dd2d4fcb8b425a6ebc7fe53ed70375ab00db36e0608d763af17fd08b068e76d7916e0ad7676e35e6139bb6640ad837d40417e5597f058c8fb98099bfad25d64eb9c2ba64b5d31e2bcf6370d2523224928cc88814bc0152189172b1923865af140c207786219a1caed4deb552939437b04a9cffedbb7f4a2451afd91349f734ce68457f7faaf4ebdb3390ac8fbb5b23cb6bbf3706e16385a80c703e17a319031c84d9b8d5024bf11ad05b19b76886f7dd5a76b5a8ef5f781676495517eaeb5348c6f53f8b8e2c991fff5d99f5d7f4c5f504ee1c487441635dabea40bc3adc1554e7bd2f0be9383f0b4fcb8e7fe116085aead66ef1cf4a2d0d6b0dc3f27ae02914a4bb9f80f93ba76500f7790620231ee8bfe511e6d5d1e8eced0c807eac83ffa8ad74306bbe1c4d8aa5f02b0875e195fd440d4d93a81821142e1470ebb6dcab37f75eb5399bb6b2127c3a2a43af00e9aaadb4b66f7670a2146c502962f2826ca7a5ea97a69dc4a895bc63ec932b21907212747fea8749714ca7eefbf16e177ce162704107c41446d3fe80dccb5377d46b097af061dd242281e6abba13f178bd333991f106e6bda7bc53cb8f1e1495e8fa2b2e3e1dccd099ddef8abb9139e42e983704a51cb694a5281af9fc2970f6463e92bb8bf8269d3d8e503532e61ce7e15a0ec7e94965fee959cfaed164e0a37942efbc25a5c505eb98e661edefb4f27f9b6769d8db90aa45281d223654d1b7ebd2150cb7de15983dedf7513976ff7294d8193b1843b58e07341265e805ab084ed884152df751257dc9829a3d11ef4f34940691523cd7bc5114dab3e8d9581381cfa9a807515734b9e16586826c724e05c6c7fd7041a1c0ef6e94418ef066683d7d72eccaf834040f9a159ceee32191f931d01d5be748bd2f84d85e52f6c995eb710947c9b00d50940064983089e129b68e2db3efb634eb5fe1f5678e1c46261b4a0bb1a6bd1848d6493f056db783b3b9f51aa2b46fb7e97f6ebca4dd4f2561a4792536f2509bf0c8f6c7f41d4610b5b4ae84123b36ed1268712f0cc4fe4130b34d0935cecabcfba6f5ca0dc6848de3cffe2ca89127f1b610cbe400195666acdfda122d12b82b18c0cb61723a21303500b2c75498360abeb82d4b8147017bc5679"}, 0x39d, 0x0) msgrcv(r0, &(0x7f0000000040)={0x0, ""/102}, 0x6e, 0x0, 0x0) 13:09:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000000)=0xfffffffd, 0x4) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendto$inet6(r0, &(0x7f00000000c0)="044aac2f202c5feda71e039a57a93088fdcce4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d1014e5b896f000fcf6521928480be9af82613a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864dc30ae921db100f1ee97a234503338f8fdf356472da0c7ab62f274f34", 0xfffffffffffffee0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) 13:09:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip6_tables_targets\x00') preadv(r1, &(0x7f00000011c0)=[{&(0x7f0000001200)=""/112, 0x70}], 0x1, 0x10, 0x0) 13:09:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x9, &(0x7f0000000040)=0x40000007, 0x4) getsockopt$inet6_tcp_int(r1, 0x6, 0x9, 0x0, &(0x7f00000000c0)) 13:09:53 executing program 0: set_mempolicy(0x1, 0x0, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000040), 0xffffffffffffffff) 13:09:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = semget$private(0x0, 0x4, 0x0) r2 = semget$private(0x0, 0x5, 0x0) semtimedop(r2, &(0x7f0000000040)=[{0x0, 0x6}], 0x1, 0x0) semtimedop(r2, &(0x7f0000000000)=[{}, {}], 0x2, 0x0) r3 = semget$private(0x0, 0x5, 0x0) semctl$SETALL(r3, 0x0, 0x11, &(0x7f0000000080)=[0x4b28]) semtimedop(r2, &(0x7f0000000040)=[{0x4, 0xaf0}, {0x1, 0x0, 0x2800}, {0x1, 0x2}, {0x3, 0x1, 0x27216bdd3ee0433b}], 0x4, &(0x7f00000000c0)) semctl$GETZCNT(r2, 0x0, 0xf, &(0x7f0000000040)=""/125) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000000)) r4 = semget$private(0x0, 0x5, 0x0) semtimedop(r4, &(0x7f0000000040)=[{0x0, 0x6}], 0x1, 0x0) semtimedop(r4, &(0x7f0000000000)=[{}, {}], 0x2, 0x0) semctl$SETALL(r4, 0x0, 0x11, &(0x7f0000000080)=[0x4b28]) semtimedop(r4, &(0x7f0000000040)=[{0x4, 0xaf0}, {0x0, 0x0, 0x2800}, {0x4, 0x2}, {0x3, 0x4001, 0x27216bdd3ee0433b}], 0x4, &(0x7f00000000c0)) semctl$IPC_RMID(r4, 0x0, 0x0) semop(r1, &(0x7f00000000c0)=[{}], 0x1) semctl$IPC_RMID(r1, 0x0, 0x0) 13:09:53 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='(\x00') 13:09:53 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='oom_score_adj\x00') read$eventfd(r0, 0x0, 0x0) 13:09:53 executing program 2: set_mempolicy(0x2, &(0x7f0000000100)=0x1, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200002, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34cc0006ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 13:09:55 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6641db6e0551832d303744e57e897094b15ba5d9e70400b1f14712d8ebca47f8b25e7717fd68a8378f362fbf30b8a40a525b7be87baeb12d8e440a49eb252ea2f7fc05d7e532e1a906abffff030000000000008bc3b53e32de099dad2f8fea962d0cbb0f359530f5bc65e8e7d6d01252f603eaab1c436d0a063b764392e63adca6ad5ff795a4f8f816f99b8189589fb3fbdc4b62b4bdadbebb99bd02b3dc8ade", 0xa0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 13:09:55 executing program 3: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00') lsetxattr$trusted_overlay_redirect(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240), &(0x7f00000003c0)='./file0/../file0\x00', 0x11, 0x0) 13:09:55 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) 13:09:55 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) splice(r0, 0x0, r2, 0x0, 0x2ffff, 0x0) 13:09:55 executing program 1: socket(0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x49d8, 0x12) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x2c060000) r0 = semget$private(0x0, 0x4007, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{}], 0x185, 0x0) unshare(0x44020000) semtimedop(0x0, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) semop(r0, &(0x7f0000000100)=[{0x0, 0x4}, {0x2, 0x2}, {0x2, 0xe1dd, 0x1000}], 0x3) semget(0x2, 0x0, 0x0) unshare(0x400) 13:09:55 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = semget$private(0x0, 0x4, 0x0) r2 = semget$private(0x0, 0x5, 0x0) semtimedop(r2, &(0x7f0000000040)=[{0x0, 0x6}], 0x1, 0x0) semtimedop(r2, &(0x7f0000000000)=[{}, {}], 0x2, 0x0) r3 = semget$private(0x0, 0x5, 0x0) semctl$SETALL(r3, 0x0, 0x11, &(0x7f0000000080)=[0x4b28]) semtimedop(r2, &(0x7f0000000040)=[{0x4, 0xaf0}, {0x1, 0x0, 0x2800}, {0x1, 0x2}, {0x3, 0x1, 0x27216bdd3ee0433b}], 0x4, &(0x7f00000000c0)) semctl$GETZCNT(r2, 0x0, 0xf, &(0x7f0000000040)=""/125) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000000)) r4 = semget$private(0x0, 0x5, 0x0) semtimedop(r4, &(0x7f0000000040)=[{0x0, 0x6}], 0x1, 0x0) semtimedop(r4, &(0x7f0000000000)=[{}, {}], 0x2, 0x0) semctl$SETALL(r4, 0x0, 0x11, &(0x7f0000000080)=[0x4b28]) semtimedop(r4, &(0x7f0000000040)=[{0x4, 0xaf0}, {0x0, 0x0, 0x2800}, {0x4, 0x2}, {0x3, 0x4001, 0x27216bdd3ee0433b}], 0x4, &(0x7f00000000c0)) semctl$IPC_RMID(r4, 0x0, 0x0) semop(r1, &(0x7f00000000c0)=[{}], 0x1) semctl$IPC_RMID(r1, 0x0, 0x0) 13:09:55 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0x100000110) read(r0, &(0x7f0000000280)=""/4081, 0xff1) 13:09:55 executing program 3: r0 = syz_io_uring_setup(0x7a2, &(0x7f0000000180), &(0x7f00005df000/0x1000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000240)) r1 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r0, 0x7, &(0x7f0000000140)=r1, 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) 13:09:55 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clock_getres(0x3, &(0x7f0000000040)) 13:09:55 executing program 3: r0 = syz_mount_image$iso9660(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55482020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}], 0x0, &(0x7f0000000140)={[{}]}) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:09:55 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f80000200040000300000000000000010000000000000002", 0x2d}, {0x0, 0x0, 0x3e0}], 0x0, &(0x7f0000011300)) [ 607.670167][T29039] loop3: detected capacity change from 0 to 224 [ 607.761579][T29048] loop3: detected capacity change from 0 to 3 [ 607.770565][T29048] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 607.781911][T29048] FAT-fs (loop3): FAT read failed (blocknr 32) [ 607.815466][T29048] loop3: detected capacity change from 0 to 3 [ 607.828025][T29048] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 607.837426][T29048] FAT-fs (loop3): FAT read failed (blocknr 32) 13:09:55 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f80000200040000300000000000000010000000000000002", 0x2d}, {0x0, 0x0, 0x3e0}], 0x0, &(0x7f0000011300)) [ 607.918577][T29062] loop3: detected capacity change from 0 to 3 [ 607.927367][T29062] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 607.936481][T29062] FAT-fs (loop3): FAT read failed (blocknr 32) 13:09:58 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6641db6e0551832d303744e57e897094b15ba5d9e70400b1f14712d8ebca47f8b25e7717fd68a8378f362fbf30b8a40a525b7be87baeb12d8e440a49eb252ea2f7fc05d7e532e1a906abffff030000000000008bc3b53e32de099dad2f8fea962d0cbb0f359530f5bc65e8e7d6d01252f603eaab1c436d0a063b764392e63adca6ad5ff795a4f8f816f99b8189589fb3fbdc4b62b4bdadbebb99bd02b3dc8ade", 0xa0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 13:09:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f80000200040000300000000000000010000000000000002", 0x2d}, {0x0, 0x0, 0x3e0}], 0x0, &(0x7f0000011300)) 13:09:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = semget$private(0x0, 0x4, 0x0) r2 = semget$private(0x0, 0x5, 0x0) semtimedop(r2, &(0x7f0000000040)=[{0x0, 0x6}], 0x1, 0x0) semtimedop(r2, &(0x7f0000000000)=[{}, {}], 0x2, 0x0) r3 = semget$private(0x0, 0x5, 0x0) semctl$SETALL(r3, 0x0, 0x11, &(0x7f0000000080)=[0x4b28]) semtimedop(r2, &(0x7f0000000040)=[{0x4, 0xaf0}, {0x1, 0x0, 0x2800}, {0x1, 0x2}, {0x3, 0x1, 0x27216bdd3ee0433b}], 0x4, &(0x7f00000000c0)) semctl$GETZCNT(r2, 0x0, 0xf, &(0x7f0000000040)=""/125) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000000)) r4 = semget$private(0x0, 0x5, 0x0) semtimedop(r4, &(0x7f0000000040)=[{0x0, 0x6}], 0x1, 0x0) semtimedop(r4, &(0x7f0000000000)=[{}, {}], 0x2, 0x0) semctl$SETALL(r4, 0x0, 0x11, &(0x7f0000000080)=[0x4b28]) semtimedop(r4, &(0x7f0000000040)=[{0x4, 0xaf0}, {0x0, 0x0, 0x2800}, {0x4, 0x2}, {0x3, 0x4001, 0x27216bdd3ee0433b}], 0x4, &(0x7f00000000c0)) semctl$IPC_RMID(r4, 0x0, 0x0) semop(r1, &(0x7f00000000c0)=[{}], 0x1) semctl$IPC_RMID(r1, 0x0, 0x0) 13:09:58 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) splice(r0, 0x0, r2, 0x0, 0x2ffff, 0x0) 13:09:58 executing program 1: socket(0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x49d8, 0x12) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x2c060000) r0 = semget$private(0x0, 0x4007, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{}], 0x185, 0x0) unshare(0x44020000) semtimedop(0x0, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) semop(r0, &(0x7f0000000100)=[{0x0, 0x4}, {0x2, 0x2}, {0x2, 0xe1dd, 0x1000}], 0x3) semget(0x2, 0x0, 0x0) unshare(0x400) 13:09:58 executing program 2: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_nanosleep(0x2, 0x0, &(0x7f0000051ff0)={0x2000000000003}, 0x0) poll(0x0, 0x0, 0x204) 13:09:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f80000200040000300000000000000010000000000000002", 0x2d}, {0x0, 0x0, 0x3e0}], 0x0, &(0x7f0000011300)) [ 610.400843][T29086] loop3: detected capacity change from 0 to 3 [ 610.412183][T29086] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 610.421702][T29086] FAT-fs (loop3): FAT read failed (blocknr 32) 13:09:58 executing program 3: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_EEE_SET(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x14, r0, 0x1}, 0x14}}, 0x0) [ 610.485943][T29102] loop3: detected capacity change from 0 to 3 [ 610.496168][T29102] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 610.506823][T29102] FAT-fs (loop3): FAT read failed (blocknr 32) 13:09:58 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x18, &(0x7f0000000240)=0x8, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @multicast2}, 0x10) 13:09:58 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000080)) 13:09:58 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e20, @multicast2}, 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000000)=0x1, 0x1039c) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d413ffaefd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0xffffffffffffffd0, 0x401c005, 0x0, 0xffffffffffffff36) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 13:09:58 executing program 2: unshare(0x8020600) r0 = socket$netlink(0x10, 0x3, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) splice(r0, 0x0, r1, &(0x7f0000000080), 0x100000001, 0x0) 13:10:01 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000040)={0x0, 0x0, 0x1000, 0x0, 0x0, "42fa60aef55614e992be3950a53359d32b7db2", 0x0, 0xffff2642}) 13:10:01 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2c2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r1, &(0x7f0000004b40)=[{{&(0x7f0000000b00)=@rc, 0x80, 0x0, 0x0, &(0x7f0000001e40)=""/239, 0xef}}, {{&(0x7f0000003300)=@tipc=@id, 0x80, &(0x7f00000049c0)=[{&(0x7f0000003380)=""/83, 0x53}, {0x0}, {0x0}, {&(0x7f0000004580)=""/203, 0xcb}, {0x0}, {&(0x7f00000048c0)=""/218, 0x1f}], 0x6, &(0x7f0000004a40)=""/243, 0xf3}}], 0x20004582, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4), 0x1c) 13:10:01 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) splice(r0, 0x0, r2, 0x0, 0x2ffff, 0x0) 13:10:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = semget$private(0x0, 0x4, 0x0) r2 = semget$private(0x0, 0x5, 0x0) semtimedop(r2, &(0x7f0000000040)=[{0x0, 0x6}], 0x1, 0x0) semtimedop(r2, &(0x7f0000000000)=[{}, {}], 0x2, 0x0) r3 = semget$private(0x0, 0x5, 0x0) semctl$SETALL(r3, 0x0, 0x11, &(0x7f0000000080)=[0x4b28]) semtimedop(r2, &(0x7f0000000040)=[{0x4, 0xaf0}, {0x1, 0x0, 0x2800}, {0x1, 0x2}, {0x3, 0x1, 0x27216bdd3ee0433b}], 0x4, &(0x7f00000000c0)) semctl$GETZCNT(r2, 0x0, 0xf, &(0x7f0000000040)=""/125) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000000)) r4 = semget$private(0x0, 0x5, 0x0) semtimedop(r4, &(0x7f0000000040)=[{0x0, 0x6}], 0x1, 0x0) semtimedop(r4, &(0x7f0000000000)=[{}, {}], 0x2, 0x0) semctl$SETALL(r4, 0x0, 0x11, &(0x7f0000000080)=[0x4b28]) semtimedop(r4, &(0x7f0000000040)=[{0x4, 0xaf0}, {0x0, 0x0, 0x2800}, {0x4, 0x2}, {0x3, 0x4001, 0x27216bdd3ee0433b}], 0x4, &(0x7f00000000c0)) semctl$IPC_RMID(r4, 0x0, 0x0) semop(r1, &(0x7f00000000c0)=[{}], 0x1) semctl$IPC_RMID(r1, 0x0, 0x0) 13:10:01 executing program 3: setreuid(0x0, 0xee01) timer_create(0x8, 0x0, &(0x7f0000000100)) 13:10:01 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="66530700ae897094e71b0fa1f107000000364603812c66538d750f6ee1d001f43f0500bb9fb045f2d1c190926c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb298802d8f6c1f3b18d6d352507f7018b311fef2c560001000000000000fb8005128e7e4d939955f8ac396203784000400f573fbf0000000000", 0x7d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x7) 13:10:01 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, &(0x7f0000000040)=@sco, 0x80) 13:10:01 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x8d, &(0x7f0000000200)="c4c6910199198c3ff795c6dc6faeda078a00ea57ff22ea97be19af3dcba01419cd1486ad59157689c9c6a47312334c2a97ac2b7f0db4aabebae8dc5dffbcd48a70502173d6efa56b60f48cf0c9d0989ecbbfc220bd2b39df9ae500b14910f4a869863009780dd6e673a02f7ed846ed78432f40079041c28d5300000000c5f255c75733064c5e8b21bbe1a24c56"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) clone(0x0, &(0x7f0000000080)="746d6a30b6d22dd453a11141f666786f633bd8c1b9ac67b2baf385fd858459600febca9fa270724a5d", 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 13:10:01 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000006d80)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:10:01 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000006d80)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:10:01 executing program 5: set_mempolicy(0x2, &(0x7f0000000000)=0x3, 0x40) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f00000009c0)={0x1c, r0, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}]}, 0x1c}}, 0x0) 13:10:01 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000006d80)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:10:01 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_aout(r0, &(0x7f00000003c0)={{}, "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", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x1820) 13:10:02 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2c2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r1, &(0x7f0000004b40)=[{{&(0x7f0000000b00)=@rc, 0x80, 0x0, 0x0, &(0x7f0000001e40)=""/239, 0xef}}, {{&(0x7f0000003300)=@tipc=@id, 0x80, &(0x7f00000049c0)=[{&(0x7f0000003380)=""/83, 0x53}, {0x0}, {0x0}, {&(0x7f0000004580)=""/203, 0xcb}, {0x0}, {&(0x7f00000048c0)=""/218, 0x1f}], 0x6, &(0x7f0000004a40)=""/243, 0xf3}}], 0x20004582, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4), 0x1c) 13:10:02 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000006d80)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:10:02 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) unshare(0x400) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) 13:10:02 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000180), 0x3, 0x0) fadvise64(r0, 0x0, 0x0, 0x3) 13:10:02 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) splice(r0, 0x0, r2, 0x0, 0x2ffff, 0x0) 13:10:02 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x52, 0x2}}) r1 = syz_open_dev$evdev(&(0x7f00000000c0), 0x2, 0x822b01) write$char_usb(r1, &(0x7f0000000040)="e2", 0x35000) [ 615.468207][ T25] kauditd_printk_skb: 32 callbacks suppressed [ 615.468220][ T25] audit: type=1326 audit(1619961003.415:996): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29204 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 615.499479][ T25] audit: type=1326 audit(1619961003.415:997): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29204 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 13:10:04 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@local, @private2, @mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200b2, r2}) 13:10:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3000002, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000017c0)=[{&(0x7f0000000240)=""/163, 0xa3}], 0x1, &(0x7f0000001e40)=[{0x0}, {&(0x7f0000000800)=""/168, 0xa8}], 0x2, 0x0) 13:10:04 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x52, 0x2}}) r1 = syz_open_dev$evdev(&(0x7f00000000c0), 0x2, 0x822b01) write$char_usb(r1, &(0x7f0000000040)="e2", 0x35000) 13:10:04 executing program 4: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x2) fstatfs(r0, 0x0) 13:10:04 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x13, 0x0, 0xc04a01) 13:10:04 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2c2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r1, &(0x7f0000004b40)=[{{&(0x7f0000000b00)=@rc, 0x80, 0x0, 0x0, &(0x7f0000001e40)=""/239, 0xef}}, {{&(0x7f0000003300)=@tipc=@id, 0x80, &(0x7f00000049c0)=[{&(0x7f0000003380)=""/83, 0x53}, {0x0}, {0x0}, {&(0x7f0000004580)=""/203, 0xcb}, {0x0}, {&(0x7f00000048c0)=""/218, 0x1f}], 0x6, &(0x7f0000004a40)=""/243, 0xf3}}], 0x20004582, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4), 0x1c) 13:10:04 executing program 4: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x2) fstatfs(r0, 0x0) 13:10:04 executing program 5: io_setup(0x400, &(0x7f0000000080)=0x0) r1 = memfd_create(&(0x7f000088f000)='b\n\"', 0x4) ftruncate(r1, 0x200000) io_submit(r0, 0x1, &(0x7f0000000580)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000000c0)='o', 0x200000c1}]) 13:10:04 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x52, 0x2}}) r1 = syz_open_dev$evdev(&(0x7f00000000c0), 0x2, 0x822b01) write$char_usb(r1, &(0x7f0000000040)="e2", 0x35000) 13:10:04 executing program 4: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x2) fstatfs(r0, 0x0) 13:10:04 executing program 0: timer_create(0x0, 0x0, 0xfffffffffffffffe) 13:10:04 executing program 4: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x2) fstatfs(r0, 0x0) 13:10:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x22b41b9a8748b1b5, 0x0, 0x0, 0x800e00510) readv(r0, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/91, 0x5b}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/116, 0x74}], 0x1}, 0x0) recvfrom$inet(r2, 0x0, 0x22b41b9a8748b1b5, 0x0, 0x0, 0x800e00510) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r3, 0x3, 0xffffffffffffffff) writev(r4, &(0x7f0000000500)=[{&(0x7f0000000040)="77628680eee662b2b250fe01b1e678f4fed45e0fc89bc031bd46ed196b4ff43b9d498aab1ea14b8d0cdd167620638f1195cdc49e9f144bac79ecd2bd9fe26e91e1b3471779e2e28b730bc658f7f2366087fb80d3c6b78bed0a", 0x59}, {&(0x7f00000000c0)="e51ea5444120adc9d391784c1207da587af8c48e33997f75901917e515e5d17e73ff2708233c9a8c748c3bf6d0e80b88cc40950e865a1a77f4a270776cc8661bd5d3517a2159c3e60d0cd0d2f3f70c7e4f5147348f19b272b1cadf17c30e907513860534333c21c00bbd0c69be20bf62e742b2", 0x73}, {&(0x7f0000000140)="7b787088edff2c9dd00bca7fb80a13d7649b7ef1a3e784aa837f851647d7910a333044ff314360036ee93d022b88cef9a69268cc89d2791e5a998c243d1238eda6b955652ce0e6511a02534b143663f75f00deb870935c8a70e5709ef12ff5ba7d1fea746117e7237bdb39a3b43fbd014a94f1bb880971edf9ebc5d543169e4ef2dcc957ab2cbda9b75173dd6ea3e68bec9833ab0f2a3f3d47dc0abca21bae1a943eb6412b329966bff5df0b7e6f9737e8cd96dbfd6ebb25e90da575698fb824c3", 0xc1}, {&(0x7f0000000380)="45f12ebfe3bcc5e811a77d29ebf3b133c7d666b1ccca81ed61917f647274051b2b8e6047d42d3dcf63c675c42fa06cb36ea49e2292384364cb5afe8695fb89a8164d46731d22", 0x46}, {&(0x7f00000002c0)="e20185b6690d2d8b8da640c39adf8107b73020cd4fb8019e2a473941b11a3ca815bc3a00b5719a00f38508f8b7a544c88c63556d414b5965bad2f48334593686b6c7a83f6da1f27a8633d33688adbfbfb914b19416366bc4fcfc4b6084b61e1269f9a87f5fa495df2ce5aba76fc00d5a073bb7512bef86943b384e20a12c1f2fba7925cfe1c22c0a5e7dbbaa6938ecd1", 0xffffff43}, {&(0x7f0000000580)="9ab534f40500000056013f5eb70ea6fcfd787a2cfff73f6538c5b26785bb5fd2fe0737595d1c133c5cd688765b8ee2f2c21697eb59a3607a1688ef14064af417daaffb4899a2fefcb2ab3c0000", 0x4d}], 0x6) shutdown(r2, 0x0) execve(0x0, 0x0, 0x0) 13:10:04 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x52, 0x2}}) r1 = syz_open_dev$evdev(&(0x7f00000000c0), 0x2, 0x822b01) write$char_usb(r1, &(0x7f0000000040)="e2", 0x35000) 13:10:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:10:04 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000001600)=0xfffffffffffffe25) 13:10:04 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000002c0), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000340)={0x50, r1, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}]}, 0x50}}, 0x0) 13:10:05 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2c2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r1, &(0x7f0000004b40)=[{{&(0x7f0000000b00)=@rc, 0x80, 0x0, 0x0, &(0x7f0000001e40)=""/239, 0xef}}, {{&(0x7f0000003300)=@tipc=@id, 0x80, &(0x7f00000049c0)=[{&(0x7f0000003380)=""/83, 0x53}, {0x0}, {0x0}, {&(0x7f0000004580)=""/203, 0xcb}, {0x0}, {&(0x7f00000048c0)=""/218, 0x1f}], 0x6, &(0x7f0000004a40)=""/243, 0xf3}}], 0x20004582, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4), 0x1c) 13:10:05 executing program 4: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee6000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f00000004c0), &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r5, &(0x7f0000000240)=@IORING_OP_SEND={0x1a, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0xf0ffffff) sendmmsg(r4, &(0x7f0000005000)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000140)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, 0x0}}], 0x2, 0x0) 13:10:05 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGREP(r0, 0x40104593, 0x0) 13:10:05 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000002c0), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000340)={0x50, r1, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}]}, 0x50}}, 0x0) 13:10:05 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/rt_cache\x00') pread64(r0, &(0x7f0000000340)=""/191, 0xbf, 0x3a) 13:10:05 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000002c0), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000340)={0x50, r1, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}]}, 0x50}}, 0x0) 13:10:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x2c, 0x3, 0x1, 0x5, 0x0, 0x0, {}, [@CTA_LABELS_MASK={0x3, 0x17, [0x0, 0x0, 0x0, 0x0, 0x0]}]}, 0x2c}}, 0x0) 13:10:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x22b41b9a8748b1b5, 0x0, 0x0, 0x800e00510) readv(r0, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/91, 0x5b}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/116, 0x74}], 0x1}, 0x0) recvfrom$inet(r2, 0x0, 0x22b41b9a8748b1b5, 0x0, 0x0, 0x800e00510) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r3, 0x3, 0xffffffffffffffff) writev(r4, &(0x7f0000000500)=[{&(0x7f0000000040)="77628680eee662b2b250fe01b1e678f4fed45e0fc89bc031bd46ed196b4ff43b9d498aab1ea14b8d0cdd167620638f1195cdc49e9f144bac79ecd2bd9fe26e91e1b3471779e2e28b730bc658f7f2366087fb80d3c6b78bed0a", 0x59}, {&(0x7f00000000c0)="e51ea5444120adc9d391784c1207da587af8c48e33997f75901917e515e5d17e73ff2708233c9a8c748c3bf6d0e80b88cc40950e865a1a77f4a270776cc8661bd5d3517a2159c3e60d0cd0d2f3f70c7e4f5147348f19b272b1cadf17c30e907513860534333c21c00bbd0c69be20bf62e742b2", 0x73}, {&(0x7f0000000140)="7b787088edff2c9dd00bca7fb80a13d7649b7ef1a3e784aa837f851647d7910a333044ff314360036ee93d022b88cef9a69268cc89d2791e5a998c243d1238eda6b955652ce0e6511a02534b143663f75f00deb870935c8a70e5709ef12ff5ba7d1fea746117e7237bdb39a3b43fbd014a94f1bb880971edf9ebc5d543169e4ef2dcc957ab2cbda9b75173dd6ea3e68bec9833ab0f2a3f3d47dc0abca21bae1a943eb6412b329966bff5df0b7e6f9737e8cd96dbfd6ebb25e90da575698fb824c3", 0xc1}, {&(0x7f0000000380)="45f12ebfe3bcc5e811a77d29ebf3b133c7d666b1ccca81ed61917f647274051b2b8e6047d42d3dcf63c675c42fa06cb36ea49e2292384364cb5afe8695fb89a8164d46731d22", 0x46}, {&(0x7f00000002c0)="e20185b6690d2d8b8da640c39adf8107b73020cd4fb8019e2a473941b11a3ca815bc3a00b5719a00f38508f8b7a544c88c63556d414b5965bad2f48334593686b6c7a83f6da1f27a8633d33688adbfbfb914b19416366bc4fcfc4b6084b61e1269f9a87f5fa495df2ce5aba76fc00d5a073bb7512bef86943b384e20a12c1f2fba7925cfe1c22c0a5e7dbbaa6938ecd1", 0xffffff43}, {&(0x7f0000000580)="9ab534f40500000056013f5eb70ea6fcfd787a2cfff73f6538c5b26785bb5fd2fe0737595d1c133c5cd688765b8ee2f2c21697eb59a3607a1688ef14064af417daaffb4899a2fefcb2ab3c0000", 0x4d}], 0x6) shutdown(r2, 0x0) execve(0x0, 0x0, 0x0) 13:10:05 executing program 4: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee6000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f00000004c0), &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r5, &(0x7f0000000240)=@IORING_OP_SEND={0x1a, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0xf0ffffff) sendmmsg(r4, &(0x7f0000005000)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000140)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, 0x0}}], 0x2, 0x0) 13:10:05 executing program 1: prlimit64(0x0, 0x7, &(0x7f00000003c0), 0x0) socket$unix(0x1, 0x5, 0x0) 13:10:05 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000002c0), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000340)={0x50, r1, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}]}, 0x50}}, 0x0) 13:10:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x2c, 0x3, 0x1, 0x5, 0x0, 0x0, {}, [@CTA_LABELS_MASK={0x3, 0x17, [0x0, 0x0, 0x0, 0x0, 0x0]}]}, 0x2c}}, 0x0) [ 617.718825][T29318] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 617.781088][T29325] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 13:10:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x22b41b9a8748b1b5, 0x0, 0x0, 0x800e00510) readv(r0, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/91, 0x5b}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/116, 0x74}], 0x1}, 0x0) recvfrom$inet(r2, 0x0, 0x22b41b9a8748b1b5, 0x0, 0x0, 0x800e00510) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r3, 0x3, 0xffffffffffffffff) writev(r4, &(0x7f0000000500)=[{&(0x7f0000000040)="77628680eee662b2b250fe01b1e678f4fed45e0fc89bc031bd46ed196b4ff43b9d498aab1ea14b8d0cdd167620638f1195cdc49e9f144bac79ecd2bd9fe26e91e1b3471779e2e28b730bc658f7f2366087fb80d3c6b78bed0a", 0x59}, {&(0x7f00000000c0)="e51ea5444120adc9d391784c1207da587af8c48e33997f75901917e515e5d17e73ff2708233c9a8c748c3bf6d0e80b88cc40950e865a1a77f4a270776cc8661bd5d3517a2159c3e60d0cd0d2f3f70c7e4f5147348f19b272b1cadf17c30e907513860534333c21c00bbd0c69be20bf62e742b2", 0x73}, {&(0x7f0000000140)="7b787088edff2c9dd00bca7fb80a13d7649b7ef1a3e784aa837f851647d7910a333044ff314360036ee93d022b88cef9a69268cc89d2791e5a998c243d1238eda6b955652ce0e6511a02534b143663f75f00deb870935c8a70e5709ef12ff5ba7d1fea746117e7237bdb39a3b43fbd014a94f1bb880971edf9ebc5d543169e4ef2dcc957ab2cbda9b75173dd6ea3e68bec9833ab0f2a3f3d47dc0abca21bae1a943eb6412b329966bff5df0b7e6f9737e8cd96dbfd6ebb25e90da575698fb824c3", 0xc1}, {&(0x7f0000000380)="45f12ebfe3bcc5e811a77d29ebf3b133c7d666b1ccca81ed61917f647274051b2b8e6047d42d3dcf63c675c42fa06cb36ea49e2292384364cb5afe8695fb89a8164d46731d22", 0x46}, {&(0x7f00000002c0)="e20185b6690d2d8b8da640c39adf8107b73020cd4fb8019e2a473941b11a3ca815bc3a00b5719a00f38508f8b7a544c88c63556d414b5965bad2f48334593686b6c7a83f6da1f27a8633d33688adbfbfb914b19416366bc4fcfc4b6084b61e1269f9a87f5fa495df2ce5aba76fc00d5a073bb7512bef86943b384e20a12c1f2fba7925cfe1c22c0a5e7dbbaa6938ecd1", 0xffffff43}, {&(0x7f0000000580)="9ab534f40500000056013f5eb70ea6fcfd787a2cfff73f6538c5b26785bb5fd2fe0737595d1c133c5cd688765b8ee2f2c21697eb59a3607a1688ef14064af417daaffb4899a2fefcb2ab3c0000", 0x4d}], 0x6) shutdown(r2, 0x0) execve(0x0, 0x0, 0x0) 13:10:06 executing program 4: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee6000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f00000004c0), &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r5, &(0x7f0000000240)=@IORING_OP_SEND={0x1a, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0xf0ffffff) sendmmsg(r4, &(0x7f0000005000)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000140)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, 0x0}}], 0x2, 0x0) 13:10:06 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x1e, &(0x7f0000000400)="c4c691019919da078a0098d1e0a593b040f762910000000000000022adde"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x17) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x40) 13:10:06 executing program 5: set_mempolicy(0x2, &(0x7f0000000100)=0x9, 0xdac) r0 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f0000050c1008000800080004000000", 0x24}], 0x1}, 0x0) 13:10:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x2c, 0x3, 0x1, 0x5, 0x0, 0x0, {}, [@CTA_LABELS_MASK={0x3, 0x17, [0x0, 0x0, 0x0, 0x0, 0x0]}]}, 0x2c}}, 0x0) 13:10:06 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt(r0, 0x0, 0xd4, 0x0, 0x0) 13:10:06 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x1a, 0x0, 0x0, &(0x7f0000000380)="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"}) 13:10:06 executing program 4: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee6000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f00000004c0), &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r5, &(0x7f0000000240)=@IORING_OP_SEND={0x1a, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0xf0ffffff) sendmmsg(r4, &(0x7f0000005000)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000140)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, 0x0}}], 0x2, 0x0) 13:10:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x5421, &(0x7f00000000c0)={'wlan0\x00', @ifru_mtu}) 13:10:06 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001440)={&(0x7f0000001000)={0xa, 0x4e21, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000001100)=[@flowinfo={{0x14}}], 0x18}, 0x0) [ 618.817829][T29353] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 13:10:06 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18}, 0x1) 13:10:06 executing program 2: r0 = socket(0x10, 0x2, 0x0) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={&(0x7f00000003c0)={0x420, 0x2e, 0x1}, 0x420}}, 0x0) [ 618.935043][T29377] netlink: 1020 bytes leftover after parsing attributes in process `syz-executor.2'. 13:10:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x22b41b9a8748b1b5, 0x0, 0x0, 0x800e00510) readv(r0, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/91, 0x5b}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/116, 0x74}], 0x1}, 0x0) recvfrom$inet(r2, 0x0, 0x22b41b9a8748b1b5, 0x0, 0x0, 0x800e00510) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r3, 0x3, 0xffffffffffffffff) writev(r4, &(0x7f0000000500)=[{&(0x7f0000000040)="77628680eee662b2b250fe01b1e678f4fed45e0fc89bc031bd46ed196b4ff43b9d498aab1ea14b8d0cdd167620638f1195cdc49e9f144bac79ecd2bd9fe26e91e1b3471779e2e28b730bc658f7f2366087fb80d3c6b78bed0a", 0x59}, {&(0x7f00000000c0)="e51ea5444120adc9d391784c1207da587af8c48e33997f75901917e515e5d17e73ff2708233c9a8c748c3bf6d0e80b88cc40950e865a1a77f4a270776cc8661bd5d3517a2159c3e60d0cd0d2f3f70c7e4f5147348f19b272b1cadf17c30e907513860534333c21c00bbd0c69be20bf62e742b2", 0x73}, {&(0x7f0000000140)="7b787088edff2c9dd00bca7fb80a13d7649b7ef1a3e784aa837f851647d7910a333044ff314360036ee93d022b88cef9a69268cc89d2791e5a998c243d1238eda6b955652ce0e6511a02534b143663f75f00deb870935c8a70e5709ef12ff5ba7d1fea746117e7237bdb39a3b43fbd014a94f1bb880971edf9ebc5d543169e4ef2dcc957ab2cbda9b75173dd6ea3e68bec9833ab0f2a3f3d47dc0abca21bae1a943eb6412b329966bff5df0b7e6f9737e8cd96dbfd6ebb25e90da575698fb824c3", 0xc1}, {&(0x7f0000000380)="45f12ebfe3bcc5e811a77d29ebf3b133c7d666b1ccca81ed61917f647274051b2b8e6047d42d3dcf63c675c42fa06cb36ea49e2292384364cb5afe8695fb89a8164d46731d22", 0x46}, {&(0x7f00000002c0)="e20185b6690d2d8b8da640c39adf8107b73020cd4fb8019e2a473941b11a3ca815bc3a00b5719a00f38508f8b7a544c88c63556d414b5965bad2f48334593686b6c7a83f6da1f27a8633d33688adbfbfb914b19416366bc4fcfc4b6084b61e1269f9a87f5fa495df2ce5aba76fc00d5a073bb7512bef86943b384e20a12c1f2fba7925cfe1c22c0a5e7dbbaa6938ecd1", 0xffffff43}, {&(0x7f0000000580)="9ab534f40500000056013f5eb70ea6fcfd787a2cfff73f6538c5b26785bb5fd2fe0737595d1c133c5cd688765b8ee2f2c21697eb59a3607a1688ef14064af417daaffb4899a2fefcb2ab3c0000", 0x4d}], 0x6) shutdown(r2, 0x0) execve(0x0, 0x0, 0x0) 13:10:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x2c, 0x3, 0x1, 0x5, 0x0, 0x0, {}, [@CTA_LABELS_MASK={0x3, 0x17, [0x0, 0x0, 0x0, 0x0, 0x0]}]}, 0x2c}}, 0x0) 13:10:07 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1) ptrace$setsig(0x4203, r1, 0x0, &(0x7f0000000040)={0x8, 0x0, 0xcd}) 13:10:07 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x401070c9, 0x0) 13:10:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x89, &(0x7f0000000080), &(0x7f0000ee7000/0x3000)=nil, &(0x7f00006d5000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x15b4, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000040)=0x0) syz_io_uring_submit(r2, r4, &(0x7f00000005c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r5, 0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0, 0x2045}, 0x0) io_uring_enter(r1, 0x52fe, 0x0, 0x0, 0x0, 0x0) 13:10:07 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{}, {}, {0x0, 0x0, 0x0, 0x6}]}) setsockopt(r0, 0x0, 0x40, &(0x7f0000000040), 0x0) 13:10:07 executing program 5: syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f0000000200)="5e1a68e210b1d95a08d421782ffe5cf3b4bdb3bc83483fa26279c7bb4bd24c2b5d1a305b5728bd13b6a156c2b1f05b440272891fc0665349ce768e1a11ca49eebf016628c07de802c426273a43bf2ceb813bb4a87cb11d000000", 0x5a, 0x401}, {&(0x7f0000000280)="cc7e9e26a515812e05c6ef785b362df94f59ff2616f3cf6b0d685f430600706b82b9afb33258ce28a4565bb0002578fd32cedd432492da7b48aa88", 0x3b, 0x99}, {&(0x7f00000002c0)="90395fb6b0c8d4cd96aaa8e496a604c2db55006c91fe22ac63b65d940ec71a3f783301200c540656f6f06eb93e54d127fb7cf3b022443b86e260bdc05c19e62f31cca1f2e1c7e958e029ad8638eb097e83829ddb2952e81ea486cbc6456da9e9c7a5ab989eacd78a07fa8032e60a2f8f214c0369f22b24f50dafb28f18879a84b09e8b625183623fc4b4f4ea691c4fc36f43a335adfe02a211bef9", 0x9b, 0x3ff}, {&(0x7f0000000cc0)="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", 0xb1315a32d52f12a9, 0x8}], 0x2080, &(0x7f0000000400)={[{@block}], [{@permit_directio}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/dev/null\x00'}}]}) 13:10:07 executing program 1: keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 13:10:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f00000008c0)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000980)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@block={'block', 0x3d, 0x400}}]}) 13:10:07 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="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", 0x117}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 13:10:07 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x8d, &(0x7f0000000140)="7430abdd777e5d2a816eac50bdca88577f315f96764e1821a759a9d88c08ef11c583ffa106d883c8213ef307a379bd7e425cd1b71f1f3f03322fe00d534fd8d2f676cbadfee1936f049ade103c89d5e4224f0105906f231bd3e0d9866152643f606b19604940bf58913250186970428e095ac11521b31065ebe09c523eaabaf647609c1eb9239d0be1d2e2fbe7"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 13:10:07 executing program 2: syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) [ 619.828697][T29402] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 619.895548][T29415] loop4: detected capacity change from 0 to 224 13:10:08 executing program 5: unshare(0x20040400) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) 13:10:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f00000008c0)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000980)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@block={'block', 0x3d, 0x400}}]}) 13:10:08 executing program 1: r0 = syz_io_uring_setup(0x1821, &(0x7f0000000180), &(0x7f0000ee8000/0x3000)=nil, &(0x7f00006d4000/0x1000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000040)=0x0) set_mempolicy(0x1, &(0x7f0000000180)=0x100000001, 0x7) syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_LINK_TIMEOUT={0xf, 0x5, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x77359400}}, 0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) syz_io_uring_submit(r1, r2, &(0x7f0000000440)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x0, 0x0, @fd=r3}, 0x400) io_uring_enter(r0, 0x55bc, 0x0, 0x0, 0x0, 0x0) 13:10:08 executing program 3: r0 = memfd_create(&(0x7f0000000080)='prodM\xb0\xea\a\x84c\xaen/\xce\x17\xbb\xa61fode\xd0\x00\x00\x82\x97\x8at\xa24>X@0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_aout(r0, &(0x7f0000000700)=ANY=[@ANYBLOB="c20314c8ea"], 0xfdef) 13:10:11 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='./'], &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) 13:10:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f00000008c0)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000980)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000040)={[{@block={'block', 0x3d, 0x400}}]}) 13:10:11 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.events\x00', 0x275a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) poll(&(0x7f00000000c0)=[{r1}], 0x1, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x6, &(0x7f0000000040)=[{0x8, 0x0, 0x95, 0x1}, {0x4, 0x0, 0x20, 0x95}, {0x1, 0x4, 0x3e, 0x1000}, {0x1f, 0x4, 0x7, 0x59f0}, {0x2, 0x1, 0x6, 0xfffffffe}, {0x100, 0x3, 0x20, 0x7f}]}) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$cont(0x7, r2, 0x3, 0xfffffffffffff5ce) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{0x3f, 0xe0, 0x62}, {0x99, 0x8, 0x35, 0x8}, {0x1ff, 0x2, 0x8, 0x8000}, {0x4e19, 0x0, 0x2a, 0x9}, {0x200, 0x7, 0x2, 0x6}]}) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x34) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r3, 0x0, 0x0) 13:10:11 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.events\x00', 0x275a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) poll(&(0x7f00000000c0)=[{r1}], 0x1, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x6, &(0x7f0000000040)=[{0x8, 0x0, 0x95, 0x1}, {0x4, 0x0, 0x20, 0x95}, {0x1, 0x4, 0x3e, 0x1000}, {0x1f, 0x4, 0x7, 0x59f0}, {0x2, 0x1, 0x6, 0xfffffffe}, {0x100, 0x3, 0x20, 0x7f}]}) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$cont(0x7, r2, 0x3, 0xfffffffffffff5ce) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{0x3f, 0xe0, 0x62}, {0x99, 0x8, 0x35, 0x8}, {0x1ff, 0x2, 0x8, 0x8000}, {0x4e19, 0x0, 0x2a, 0x9}, {0x200, 0x7, 0x2, 0x6}]}) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x34) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r3, 0x0, 0x0) 13:10:11 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.events\x00', 0x275a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) poll(&(0x7f00000000c0)=[{r1}], 0x1, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x6, &(0x7f0000000040)=[{0x8, 0x0, 0x95, 0x1}, {0x4, 0x0, 0x20, 0x95}, {0x1, 0x4, 0x3e, 0x1000}, {0x1f, 0x4, 0x7, 0x59f0}, {0x2, 0x1, 0x6, 0xfffffffe}, {0x100, 0x3, 0x20, 0x7f}]}) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$cont(0x7, r2, 0x3, 0xfffffffffffff5ce) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{0x3f, 0xe0, 0x62}, {0x99, 0x8, 0x35, 0x8}, {0x1ff, 0x2, 0x8, 0x8000}, {0x4e19, 0x0, 0x2a, 0x9}, {0x200, 0x7, 0x2, 0x6}]}) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x34) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r3, 0x0, 0x0) 13:10:11 executing program 0: io_setup(0x80, &(0x7f0000000080)=0x0) pipe(&(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff}) io_submit(r0, 0x1, &(0x7f0000000500)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x2, 0x0, r1, 0x0, 0x0, 0x7}]) 13:10:11 executing program 4: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r2, 0x0) write$cgroup_type(r0, &(0x7f0000000200), 0xf642e7e) lseek(r1, 0x0, 0x3) 13:10:11 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7a}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8e, &(0x7f0000000180)="c4c691019919da078a0098d1e0a593b040f710e7d5b925c099710cb6422ec536070ff7ae78886cb6508e094cf05f7512668917458e9f9694c0585fe8411e858d5f2eb3b53dd3d8f71b1cdfcc5b2af289981079bb6fc3ec9499e3c7d0720446f2e2bebaf9e44e717d90ebadaa689a7a2535e4b983142740cb09d6b51440a8fe25b4d33844360c39b75238f17598cb"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 13:10:11 executing program 5: clone(0x2102010ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(&(0x7f0000000080)=0x1, 0x9, 0x1, &(0x7f00000000c0)={0x77359400}, 0x0, 0x3) [ 623.717563][T29525] loop4: detected capacity change from 0 to 224 13:10:11 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="1b5a070700003200000000000000000000002851808835e7e09974cf744ca2555587a88b367b0000000000006d10000000000d00400000000000840a"], 0x78) 13:10:11 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000100)="66530700ae897094e7", 0x9}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x7) 13:10:11 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000000)={0x0, 0x9, '\x00', [@hao={0xc9, 0x10, @loopback}, @calipso={0x7, 0x0, {0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, @generic={0x0, 0xfffffffffffffd3f, '\v2fu'}]}, 0x58) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, 0x0, 0x0) 13:10:11 executing program 3: rseq(&(0x7f00000000c0), 0x20, 0x0, 0x0) poll(0x0, 0x0, 0x7f) 13:10:11 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x101002) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000080)="e339bfd0a7b5067b32202043815baddc6fd640f33d9f7efd231cf190019258ee0b5ab247cffe3ee0dcccc68e251896d0", 0x30}], 0x1) 13:10:11 executing program 4: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x5}, 0x0) io_uring_enter(r0, 0x2ff, 0x0, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f0000000480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f00000004c0)={0x77359400}) shutdown(r3, 0x1) shutdown(r4, 0x0) 13:10:11 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffff7}]}) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fdatasync(r0) 13:10:11 executing program 5: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000280)={0x4000}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001580)={0x14, 0x16, 0xa01}, 0x14}}, 0x0) 13:10:11 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockname$netlink(r0, 0x0, &(0x7f0000000180)=0xc) 13:10:11 executing program 5: personality(0x4000005) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)) 13:10:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x2) 13:10:12 executing program 0: timer_create(0x9, &(0x7f00000002c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000540)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x989680}, {0x77359400}}, &(0x7f0000000200)) 13:10:12 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x30, &(0x7f00000002c0)={{{@in, @in6=@ipv4={'\x00', '\xff\xff', @local}}}, {{@in6=@private2}, 0x0, @in=@local}}, 0xe8) 13:10:14 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000100)="66530700ae897094e7", 0x9}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x7) 13:10:14 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000009c0)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000a00)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000300)=ANY=[]) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000280)) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) creat(0x0, 0x0) 13:10:14 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000013c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0xc0a85320, &(0x7f0000000000)={0xbf80}) 13:10:14 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='cgroup.clone_children\x00', 0x2, 0x0) set_mempolicy(0x3, &(0x7f0000000080)=0x5, 0x2) r2 = dup2(r1, r1) sendfile(r1, r2, 0x0, 0x80000000) 13:10:14 executing program 5: perf_event_open(0x0, 0x0, 0xfffffffbffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x7ff, 0x400000008d}, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) setrlimit(0x6, &(0x7f0000000040)={0xffffffff, 0x4}) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_settime(r0, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) futex(&(0x7f0000000240)=0x1, 0x6, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f00000000c0)=0x1, 0x9, 0x0, &(0x7f0000001640), &(0x7f0000001680)=0x1, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000400)=ANY=[], 0x208e24b) 13:10:14 executing program 2: io_setup(0xff, &(0x7f0000000040)=0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) io_submit(r0, 0x1, &(0x7f0000000500)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_getevents(r0, 0x0, 0x1, &(0x7f0000000180)=[{}], &(0x7f0000000100)) 13:10:15 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r1, &(0x7f0000000040)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) accept(r1, 0x0, 0x0) [ 627.041745][T29607] loop4: detected capacity change from 0 to 512 [ 627.058381][T29613] new mount options do not match the existing superblock, will be ignored [ 627.067236][T29607] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 627.079614][T29613] new mount options do not match the existing superblock, will be ignored 13:10:15 executing program 2: set_mempolicy(0x1, &(0x7f0000000000)=0x7f, 0x101) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) mlock(&(0x7f00002b9000/0x3000)=nil, 0x3000) 13:10:15 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchmod(r0, 0x0) 13:10:15 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000009c0)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000a00)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000300)=ANY=[]) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000280)) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) creat(0x0, 0x0) [ 627.088707][T29607] EXT4-fs warning (device loop4): ext4_group_add:1647: Can't resize non-sparse filesystem further 13:10:15 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='comm\x00') write$P9_RLERRORu(r0, &(0x7f0000000000)={0xd}, 0xd) 13:10:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x64, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}]}, 0x64}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x64, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @private}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}]}, 0x64}}, 0x0) [ 627.207772][T29647] loop4: detected capacity change from 0 to 512 [ 627.224735][T29647] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 627.236947][T29647] EXT4-fs warning (device loop4): ext4_group_add:1647: Can't resize non-sparse filesystem further 13:10:17 executing program 5: perf_event_open(0x0, 0x0, 0xfffffffbffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x7ff, 0x400000008d}, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) setrlimit(0x6, &(0x7f0000000040)={0xffffffff, 0x4}) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_settime(r0, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) futex(&(0x7f0000000240)=0x1, 0x6, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f00000000c0)=0x1, 0x9, 0x0, &(0x7f0000001640), &(0x7f0000001680)=0x1, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000400)=ANY=[], 0x208e24b) 13:10:17 executing program 2: r0 = socket$unix(0x1, 0x800000000005, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmsg$unix(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32=r0], 0x1c}, 0x0) close(r0) sendmsg$inet(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) close(r2) 13:10:17 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r2, &(0x7f0000000080)={0x1}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f0000000100)=[{}], 0x1, 0x100, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r2, &(0x7f00000000c0)={0x9}) 13:10:17 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r1, &(0x7f0000000040)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) accept(r1, 0x0, 0x0) 13:10:17 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000009c0)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000a00)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000300)=ANY=[]) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000280)) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) creat(0x0, 0x0) 13:10:17 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x400000000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_script(0xffffffffffffffff, 0x0, 0x36) gettid() write$cgroup_int(r1, &(0x7f0000000040), 0x43) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f511, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x5) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000000)={0x2e, 0x2, '\x00', [@hao={0xc9, 0x10, @mcast2}, @pad1]}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 13:10:18 executing program 2: r0 = socket$unix(0x1, 0x800000000005, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmsg$unix(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32=r0], 0x1c}, 0x0) close(r0) sendmsg$inet(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) close(r2) 13:10:18 executing program 2: r0 = socket$unix(0x1, 0x800000000005, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmsg$unix(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32=r0], 0x1c}, 0x0) close(r0) sendmsg$inet(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) close(r2) 13:10:18 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000009c0)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000a00)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000300)=ANY=[]) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000280)) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) creat(0x0, 0x0) 13:10:18 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r1, &(0x7f0000000040)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) accept(r1, 0x0, 0x0) [ 630.086671][T29674] loop4: detected capacity change from 0 to 512 [ 630.096842][T29674] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 630.109897][T29674] EXT4-fs warning (device loop4): ext4_group_add:1647: Can't resize non-sparse filesystem further 13:10:18 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x400000000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_script(0xffffffffffffffff, 0x0, 0x36) gettid() write$cgroup_int(r1, &(0x7f0000000040), 0x43) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f511, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x5) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000000)={0x2e, 0x2, '\x00', [@hao={0xc9, 0x10, @mcast2}, @pad1]}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 13:10:18 executing program 2: r0 = socket$unix(0x1, 0x800000000005, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmsg$unix(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32=r0], 0x1c}, 0x0) close(r0) sendmsg$inet(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) close(r2) [ 630.181729][T29705] loop4: detected capacity change from 0 to 512 [ 630.217792][T29705] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 630.237109][T29705] EXT4-fs warning (device loop4): ext4_group_add:1647: Can't resize non-sparse filesystem further 13:10:18 executing program 5: perf_event_open(0x0, 0x0, 0xfffffffbffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x7ff, 0x400000008d}, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) setrlimit(0x6, &(0x7f0000000040)={0xffffffff, 0x4}) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_settime(r0, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) futex(&(0x7f0000000240)=0x1, 0x6, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f00000000c0)=0x1, 0x9, 0x0, &(0x7f0000001640), &(0x7f0000001680)=0x1, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000400)=ANY=[], 0x208e24b) 13:10:18 executing program 2: syz_mount_image$nfs4(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{'\x01\x00\x01\x00\x00\x00\x00\x00'}]}) 13:10:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000040)=""/194, 0xc2}, {&(0x7f0000000180)=""/114, 0x72}, {&(0x7f0000000200)=""/106, 0x6a}, {&(0x7f0000000380)=""/4096, 0x1000}], 0x4, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000280)) 13:10:18 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r1, &(0x7f0000000040)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) accept(r1, 0x0, 0x0) 13:10:18 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x400000000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_script(0xffffffffffffffff, 0x0, 0x36) gettid() write$cgroup_int(r1, &(0x7f0000000040), 0x43) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f511, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x5) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000000)={0x2e, 0x2, '\x00', [@hao={0xc9, 0x10, @mcast2}, @pad1]}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 13:10:18 executing program 0: r0 = syz_io_uring_setup(0x6c2e, &(0x7f0000000680), &(0x7f0000000000/0x11000)=nil, &(0x7f000036b000/0x3000)=nil, &(0x7f00000001c0), &(0x7f0000000040)) io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) r1 = syz_io_uring_setup(0x6c2e, &(0x7f0000000680), &(0x7f0000000000/0x11000)=nil, &(0x7f000036b000/0x3000)=nil, &(0x7f00000001c0), &(0x7f0000000040)) io_uring_enter(r1, 0x0, 0x45c5, 0x3, 0x0, 0x0) io_uring_enter(r1, 0x5781, 0x0, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) 13:10:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_int(r0, 0x1, 0x3d, 0x0, &(0x7f0000000080)) 13:10:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000040)=""/194, 0xc2}, {&(0x7f0000000180)=""/114, 0x72}, {&(0x7f0000000200)=""/106, 0x6a}, {&(0x7f0000000380)=""/4096, 0x1000}], 0x4, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000280)) 13:10:18 executing program 2: unshare(0x400) r0 = timerfd_create(0x8, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{}, {0x77359400}}, &(0x7f0000000040)) 13:10:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000040)=""/194, 0xc2}, {&(0x7f0000000180)=""/114, 0x72}, {&(0x7f0000000200)=""/106, 0x6a}, {&(0x7f0000000380)=""/4096, 0x1000}], 0x4, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000280)) 13:10:18 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) connect$unix(r1, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r1, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x0) connect$unix(r0, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) dup2(r1, r0) 13:10:18 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x400000000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_script(0xffffffffffffffff, 0x0, 0x36) gettid() write$cgroup_int(r1, &(0x7f0000000040), 0x43) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f511, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x5) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000000)={0x2e, 0x2, '\x00', [@hao={0xc9, 0x10, @mcast2}, @pad1]}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 13:10:19 executing program 5: perf_event_open(0x0, 0x0, 0xfffffffbffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x7ff, 0x400000008d}, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) setrlimit(0x6, &(0x7f0000000040)={0xffffffff, 0x4}) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_settime(r0, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) futex(&(0x7f0000000240)=0x1, 0x6, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f00000000c0)=0x1, 0x9, 0x0, &(0x7f0000001640), &(0x7f0000001680)=0x1, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000400)=ANY=[], 0x208e24b) 13:10:19 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000280), 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, 0xfffffffffffffffe) 13:10:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000040)=""/194, 0xc2}, {&(0x7f0000000180)=""/114, 0x72}, {&(0x7f0000000200)=""/106, 0x6a}, {&(0x7f0000000380)=""/4096, 0x1000}], 0x4, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000280)) 13:10:19 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) connect$unix(r1, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r1, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x0) connect$unix(r0, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) dup2(r1, r0) 13:10:19 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="00040600fcfeff800000003a4288443e7ff09b5ed7750700feff162d02010800000000000000776075c4171fa31b4f36366194335b71e5fe003b40040000710e13"], 0x41) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x10000000, 0x0, 0x0, "5568c3244a8420560bb625729101611fa07b56"}) 13:10:19 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r3, 0x0) preadv(r2, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) splice(r1, &(0x7f0000000000), r0, 0x0, 0x5, 0x0) 13:10:19 executing program 4: r0 = syz_io_uring_setup(0x2de1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_LINK_TIMEOUT={0xf, 0x5, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x0, 0x3938700}}, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) 13:10:19 executing program 0: r0 = syz_io_uring_setup(0x6c2e, &(0x7f0000000680), &(0x7f0000000000/0x11000)=nil, &(0x7f000036b000/0x3000)=nil, &(0x7f00000001c0), &(0x7f0000000040)) io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) r1 = syz_io_uring_setup(0x6c2e, &(0x7f0000000680), &(0x7f0000000000/0x11000)=nil, &(0x7f000036b000/0x3000)=nil, &(0x7f00000001c0), &(0x7f0000000040)) io_uring_enter(r1, 0x0, 0x45c5, 0x3, 0x0, 0x0) io_uring_enter(r1, 0x5781, 0x0, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) 13:10:19 executing program 3: syz_genetlink_get_family_id$tipc2(&(0x7f0000000400), 0xffffffffffffffff) timer_create(0x3, 0x0, &(0x7f0000000040)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) exit(0x0) timer_delete(0x0) sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, 0x0, 0x40) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f00000009c0)=ANY=[@ANYBLOB="000000008f4fed6e7922ccbe13d27414b7f101000000010000"], 0x228}, 0x1, 0x0, 0x0, 0x4000000}, 0x44041) 13:10:19 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r3, 0x0) preadv(r2, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) splice(r1, &(0x7f0000000000), r0, 0x0, 0x5, 0x0) 13:10:19 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) connect$unix(r1, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r1, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x0) connect$unix(r0, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) dup2(r1, r0) 13:10:19 executing program 4: r0 = socket(0x10, 0x2, 0x0) unshare(0x24020400) pread64(r0, 0x0, 0x0, 0x0) 13:10:20 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) connect$unix(r1, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r1, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x0) connect$unix(r0, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) dup2(r1, r0) 13:10:20 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r3, 0x0) preadv(r2, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) splice(r1, &(0x7f0000000000), r0, 0x0, 0x5, 0x0) 13:10:20 executing program 4: socket$inet6(0xa, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) socket$nl_xfrm(0x10, 0x3, 0x6) socket$nl_xfrm(0x10, 0x3, 0x6) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6(0xa, 0x2, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="1c00000007ffff", @ANYRES16=r0, @ANYRESOCT], 0x52) r3 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@noextend}]}}) 13:10:20 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00') preadv(r0, &(0x7f0000001700)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1, 0x354, 0x0) 13:10:20 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r3, 0x0) preadv(r2, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) splice(r1, &(0x7f0000000000), r0, 0x0, 0x5, 0x0) 13:10:20 executing program 0: r0 = syz_io_uring_setup(0x6c2e, &(0x7f0000000680), &(0x7f0000000000/0x11000)=nil, &(0x7f000036b000/0x3000)=nil, &(0x7f00000001c0), &(0x7f0000000040)) io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) r1 = syz_io_uring_setup(0x6c2e, &(0x7f0000000680), &(0x7f0000000000/0x11000)=nil, &(0x7f000036b000/0x3000)=nil, &(0x7f00000001c0), &(0x7f0000000040)) io_uring_enter(r1, 0x0, 0x45c5, 0x3, 0x0, 0x0) io_uring_enter(r1, 0x5781, 0x0, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) 13:10:20 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) shutdown(r1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000080)={0x6}) epoll_wait(r0, &(0x7f00000000c0)=[{}], 0x1, 0x0) [ 632.771836][ T5] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=5 comm=kworker/0:0 [ 632.796574][T29823] 9pnet: p9_errstr2errno: server reported unknown error 017777777 13:10:20 executing program 2: madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x12) clone3(&(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 632.810601][ T5] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=5 comm=kworker/0:0 [ 632.830659][T29829] 9pnet: p9_errstr2errno: server reported unknown error 017777777 13:10:20 executing program 3: socketpair$unix(0x1, 0x80005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)={0x1000000c}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) epoll_wait(r2, &(0x7f0000000080)=[{}], 0x1, 0xea) r3 = openat(0xffffffffffffffff, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) dup2(r1, r0) 13:10:20 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) r1 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x8084, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) sendto$inet(r1, &(0x7f0000000180)="cf", 0x1, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000002280)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) 13:10:20 executing program 1: r0 = fsopen(&(0x7f0000000100)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) mknodat(r1, &(0x7f0000000040)='./file0\x00', 0xffffc000, 0x0) 13:10:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000010500)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000180)={[{@nombcache}]}) setxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000040)=ANY=[], 0xc007, 0x0) 13:10:20 executing program 2: madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x12) clone3(&(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:10:20 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(&(0x7f000025c000)={0x400000001, 0x70}, r1, 0x0, r0, 0x0) 13:10:20 executing program 1: r0 = fsopen(&(0x7f0000000100)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) mknodat(r1, &(0x7f0000000040)='./file0\x00', 0xffffc000, 0x0) 13:10:20 executing program 2: madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x12) clone3(&(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:10:20 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) r1 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x8084, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) sendto$inet(r1, &(0x7f0000000180)="cf", 0x1, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000002280)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) 13:10:21 executing program 0: r0 = syz_io_uring_setup(0x6c2e, &(0x7f0000000680), &(0x7f0000000000/0x11000)=nil, &(0x7f000036b000/0x3000)=nil, &(0x7f00000001c0), &(0x7f0000000040)) io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) r1 = syz_io_uring_setup(0x6c2e, &(0x7f0000000680), &(0x7f0000000000/0x11000)=nil, &(0x7f000036b000/0x3000)=nil, &(0x7f00000001c0), &(0x7f0000000040)) io_uring_enter(r1, 0x0, 0x45c5, 0x3, 0x0, 0x0) io_uring_enter(r1, 0x5781, 0x0, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) 13:10:21 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) r1 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x8084, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) sendto$inet(r1, &(0x7f0000000180)="cf", 0x1, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000002280)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) 13:10:21 executing program 1: r0 = fsopen(&(0x7f0000000100)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) mknodat(r1, &(0x7f0000000040)='./file0\x00', 0xffffc000, 0x0) 13:10:21 executing program 2: madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x12) clone3(&(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:10:21 executing program 3: socketpair$unix(0x1, 0x80005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)={0x1000000c}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) epoll_wait(r2, &(0x7f0000000080)=[{}], 0x1, 0xea) r3 = openat(0xffffffffffffffff, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) dup2(r1, r0) 13:10:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6560ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2fc903c2b54706c05e4cb2e2875107608f9143f299d8e3f78f4bf076484885fd4089cb084607435b77c7f44cf0783279a494c8e4eba955b16e77f57966d4b79ce63a7560f2950035254b654ed339b07ebcf3b498fccba20bcae2b6f577b36b79f72f77ef0d450a8f25ea6cd09c60baabf84ab4350874b05f4635c74", 0xb3}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x36) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 13:10:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000010500)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000180)) setxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f00000000c0)=ANY=[], 0xfc8, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000280)={0x0, 0xfb, 0xe05, 0x0, 0x0, "ef0fb054426db5957d93e7c0a087fcb9", "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"}, 0xe05, 0x0) 13:10:21 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) r1 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x8084, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) sendto$inet(r1, &(0x7f0000000180)="cf", 0x1, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000002280)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) 13:10:21 executing program 1: r0 = fsopen(&(0x7f0000000100)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) mknodat(r1, &(0x7f0000000040)='./file0\x00', 0xffffc000, 0x0) 13:10:21 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000500)='fd\x00') getdents64(r0, &(0x7f00000001c0)=""/134, 0x18) getdents(r0, &(0x7f0000000000)=""/99, 0x63) 13:10:21 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') preadv(r0, &(0x7f0000000640)=[{&(0x7f0000000340)=""/99, 0x63}], 0x1, 0x80, 0x0) 13:10:21 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wg2\x00'}) getsockopt$packet_buf(r0, 0x107, 0xb, &(0x7f0000000040)=""/4096, &(0x7f0000001040)=0x1000) 13:10:22 executing program 3: socketpair$unix(0x1, 0x80005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)={0x1000000c}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) epoll_wait(r2, &(0x7f0000000080)=[{}], 0x1, 0xea) r3 = openat(0xffffffffffffffff, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) dup2(r1, r0) 13:10:22 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000ffff", 0x24}], 0x1) 13:10:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x8ec3, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$unix(r1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@rights={{0x10}}], 0x10}, 0x0) 13:10:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001580)={&(0x7f00000000c0)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4, 0x2}]}]}, 0x1c}}, 0x0) [ 634.533467][T29933] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 634.542457][T29936] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 13:10:24 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000001e00010a"], 0x14}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[], 0xfffffc7b) r2 = openat(0xffffffffffffffff, &(0x7f0000001940)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x4001}, 0x10) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 13:10:24 executing program 0: io_uring_setup(0x4202, &(0x7f00000001c0)={0x0, 0x0, 0x16}) 13:10:24 executing program 1: prctl$PR_SET_SECCOMP(0x26, 0x0, 0x0) 13:10:24 executing program 4: r0 = timerfd_create(0x9, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x0, 0x989680}, {0x77359400}}, 0x0) r1 = timerfd_create(0x9, 0x0) timerfd_settime(r1, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x77359400}}, 0x0) timerfd_settime(r1, 0x0, &(0x7f0000000000)={{0x77359400}, {0x77359400}}, 0x0) 13:10:24 executing program 3: socketpair$unix(0x1, 0x80005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)={0x1000000c}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) epoll_wait(r2, &(0x7f0000000080)=[{}], 0x1, 0xea) r3 = openat(0xffffffffffffffff, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) dup2(r1, r0) 13:10:24 executing program 2: r0 = socket$inet6(0xa, 0x2000000080803, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@mcast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xff}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in=@remote}}, 0xe8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) 13:10:24 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) setresuid(0x0, 0xee00, 0x0) ioctl$KDADDIO(r0, 0x4b72, 0x0) 13:10:24 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{}, {0x6, 0x0, 0x0, 0x7fff7ffe}]}) modify_ldt$read_default(0x2, 0x0, 0x0) 13:10:24 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x8916, &(0x7f00000000c0)={0xe0ffffff, @nfc={0x27, 0x0, 0x0, 0x2}, @vsock={0x28, 0x0, 0x0, @my=0x0}, @nfc}) 13:10:24 executing program 0: perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@dev}, 0x14) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@dev}, 0x14) r2 = socket$inet6(0xa, 0x80002, 0x0) dup2(r2, r1) 13:10:24 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{}, {0x6, 0x0, 0x0, 0x7fff7ffe}]}) modify_ldt$read_default(0x2, 0x0, 0x0) 13:10:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000340)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000080)) [ 636.844518][T29988] loop1: detected capacity change from 0 to 512 [ 636.861856][T29988] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 636.891045][T29988] loop1: detected capacity change from 0 to 512 [ 636.901242][T29988] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 13:10:25 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@nr_blocks={'nr_blocks', 0x3d, [0x50]}}]}) 13:10:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xba, &(0x7f0000002600)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689c9c6a47312334c2a97ac2b7f0fb4aabebae8dc5dffbcd48a70502173d6efa56b60f48cf0c9d0989ecbbfc220bd2b39df9ad8d6b14910f4a869863009780dd6e673a02f7ed829932929af9dffb1fa2cd7328202ac55f4f5dbb8494120f79d5f60958691a8a3fcf561c33f46ab89803f47d97e04f7bf9cafb006ae0c480408c8380cf060dd72462ccc5b7d"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 13:10:25 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{}, {0x6, 0x0, 0x0, 0x7fff7ffe}]}) modify_ldt$read_default(0x2, 0x0, 0x0) 13:10:25 executing program 0: r0 = mq_open(&(0x7f0000000280)=')\x00', 0x694b0810351a9942, 0x0, 0x0) preadv2(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/101, 0x65}], 0x1, 0x0, 0x0, 0x14) 13:10:25 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0xc2600, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(r0) 13:10:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000340)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000080)) 13:10:25 executing program 0: r0 = mq_open(&(0x7f0000000280)=')\x00', 0x694b0810351a9942, 0x0, 0x0) preadv2(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/101, 0x65}], 0x1, 0x0, 0x0, 0x14) 13:10:25 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{}, {0x6, 0x0, 0x0, 0x7fff7ffe}]}) modify_ldt$read_default(0x2, 0x0, 0x0) 13:10:25 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[]) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000380)=""/237, 0xed) 13:10:25 executing program 0: r0 = mq_open(&(0x7f0000000280)=')\x00', 0x694b0810351a9942, 0x0, 0x0) preadv2(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/101, 0x65}], 0x1, 0x0, 0x0, 0x14) [ 637.622037][T30013] loop1: detected capacity change from 0 to 512 [ 637.635416][T30013] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 13:10:25 executing program 5: set_mempolicy(0x3, &(0x7f0000000080)=0x5, 0x9) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000180)=0x5, 0x4) 13:10:25 executing program 0: r0 = mq_open(&(0x7f0000000280)=')\x00', 0x694b0810351a9942, 0x0, 0x0) preadv2(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/101, 0x65}], 0x1, 0x0, 0x0, 0x14) 13:10:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000340)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000080)) 13:10:25 executing program 2: mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4003, &(0x7f0000000100)=0xf7, 0x3, 0x0) mbind(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x4003, &(0x7f0000000040)=0x1009, 0x4, 0x0) 13:10:25 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) sendmsg(r0, &(0x7f0000000340)={&(0x7f0000000180)=@qipcrtr={0x2a, 0x2}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000200)="6ec097be2e683cfa8ff1adbab9dd79027eb8d28a9c63dfb42b957594d1b9a0ead8938de7b0374ff706bd", 0x2a}], 0x1}, 0x0) 13:10:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) wait4(0x0, 0x0, 0x0, 0x0) r1 = semget$private(0x0, 0x8, 0x0) semtimedop(0x0, 0x0, 0x0, 0x0) semop(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x3000}], 0x1) r2 = semget$private(0x0, 0x5, 0x0) semop(r2, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1) 13:10:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000380)='./file1\x00', &(0x7f0000000080)='autofs\x00', 0x0, &(0x7f0000000400)) 13:10:25 executing program 0: open(&(0x7f0000000000)='./file0\x00', 0x40340, 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x843400, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x205cc28, 0x0) 13:10:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000340)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000080)) [ 637.727133][T30036] loop1: detected capacity change from 0 to 512 [ 637.741323][T30036] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock 13:10:25 executing program 2: syz_mount_image$vfat(&(0x7f0000008480), &(0x7f00000084c0)='./file0\x00', 0x0, 0x2, &(0x7f0000008980)=[{&(0x7f0000008500)="2290e64379ab9d22242953d6b2", 0xd, 0x4}, {0x0, 0x0, 0xcafc}], 0x8303, &(0x7f0000008a40)) 13:10:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800001, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x6, 0x2172, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000002480)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r2]) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) 13:10:25 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "0000070000000000fae636fc000000cc1000"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSTI(r1, 0x80045440, &(0x7f0000000280)) [ 637.831776][T30054] loop1: detected capacity change from 0 to 512 [ 637.840818][T30055] EXT4-fs (sda1): re-mounted. Opts: (null). Quota mode: none. 13:10:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x18, r2, 0xb15, 0x0, 0x0, {0x15}, [@HEADER={0x4}]}, 0x18}}, 0x0) 13:10:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffb, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:10:25 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x300, 0x6, 0x0, "2bbb19e5631df896ba98674d0b4703551f0d03e2ed186049da15bffbdd1a3e02c2dda1e04e6fcd5ce9801d897649292487be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49"}) 13:10:25 executing program 2: clone(0x4000900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x14a, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 13:10:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000980), &(0x7f00000009c0)='./file0\x00', 0x0, 0x0, 0x0, 0x320030, &(0x7f0000000bc0)) 13:10:25 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40b, 0x10000}}) [ 637.875089][T30054] EXT4-fs warning (device loop1): ext4_multi_mount_protect:286: Invalid MMP block in superblock [ 637.890494][T30062] EXT4-fs (sda1): re-mounted. Opts: (null). Quota mode: none. [ 637.896098][T30061] autofs4:pid:30061:autofs_fill_super: called with bogus options 13:10:25 executing program 5: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x14}, &(0x7f00000002c0)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = msgget$private(0x0, 0x0) msgrcv(r2, &(0x7f0000019300)={0x0, ""/4096}, 0x1008, 0x0, 0x3000) msgsnd(r2, &(0x7f0000000000)=ANY=[], 0x2000, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000140)={{0x2, 0x0, 0xee00, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}) 13:10:25 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) rename(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000080)='./bus\x00') rename(&(0x7f00000003c0)='./file0/file1\x00', &(0x7f0000000400)='./file0\x00') 13:10:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f00000000c0)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000010500)="ffff000000000000fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffeffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000300)=ANY=[]) chdir(&(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 13:10:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800001, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x6, 0x2172, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000002480)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r2]) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) 13:10:25 executing program 2: clone(0x4000900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x14a, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) [ 638.048123][T30106] loop1: detected capacity change from 0 to 512 [ 638.071126][T30106] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 13:10:25 executing program 2: clone(0x4000900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x14a, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 13:10:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800001, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x6, 0x2172, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000002480)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r2]) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) [ 638.093307][T30106] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 13:10:26 executing program 2: clone(0x4000900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x14a, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 13:10:26 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800001, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x6, 0x2172, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000002480)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r2]) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) 13:10:26 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/rt6_stats\x00') read$char_usb(r0, &(0x7f0000000040)=""/168, 0xa8) 13:10:26 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001ec0)=[{{&(0x7f00000015c0)={0xa, 0x4e24, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000001640)=[@flowinfo={{0x14, 0x29, 0xb, 0x800}}, @flowinfo={{0x14}}], 0x30}}, {{&(0x7f0000001780)={0xa, 0x4e21, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@dstopts_2292={{0x18}}, @dstopts_2292={{0x18}}], 0x30}}], 0x2, 0x0) 13:10:26 executing program 2: r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000580)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(r1, &(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x2) 13:10:26 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x2000006e) 13:10:26 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@rand_addr=' \x01\x00'}, {@in6=@mcast2, 0x0, 0x32}, @in6=@rand_addr=' \x01\x00', {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in=@multicast1}}]}, 0x154}}, 0x0) 13:10:26 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 13:10:26 executing program 3: socketpair(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) unshare(0x400) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) select(0x40, &(0x7f0000000100), 0x0, &(0x7f0000000240)={0x21}, &(0x7f0000000280)={0x0, 0x2710}) 13:10:26 executing program 4: unshare(0x40000000) set_mempolicy(0x1, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 13:10:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f00000001c0)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) futex(&(0x7f0000000200)=0x40000001, 0x86, 0x0, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x9) 13:10:26 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x34, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x6d, 0x40}, [{}]}, 0x78) 13:10:26 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@rand_addr=' \x01\x00'}, {@in6=@mcast2, 0x0, 0x32}, @in6=@rand_addr=' \x01\x00', {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in=@multicast1}}]}, 0x154}}, 0x0) [ 638.391326][T30172] device lo entered promiscuous mode 13:10:26 executing program 5: set_mempolicy(0x1, &(0x7f0000000040)=0x1405, 0x4) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000002c0)='!pu\t\t&6|\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x04\x00\x00\x00\x00\x00\x00\x00\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') 13:10:26 executing program 4: unshare(0x40000000) set_mempolicy(0x1, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 13:10:26 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@rand_addr=' \x01\x00'}, {@in6=@mcast2, 0x0, 0x32}, @in6=@rand_addr=' \x01\x00', {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in=@multicast1}}]}, 0x154}}, 0x0) 13:10:26 executing program 3: set_mempolicy(0x1, 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0x5, 0x9) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 13:10:26 executing program 5: set_mempolicy(0x1, &(0x7f0000000040)=0x1405, 0x4) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000002c0)='!pu\t\t&6|\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x04\x00\x00\x00\x00\x00\x00\x00\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') 13:10:26 executing program 4: unshare(0x40000000) set_mempolicy(0x1, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') [ 638.512695][T30200] device lo entered promiscuous mode [ 638.583659][T30217] device lo entered promiscuous mode 13:10:27 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 13:10:27 executing program 5: set_mempolicy(0x1, &(0x7f0000000040)=0x1405, 0x4) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000002c0)='!pu\t\t&6|\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x04\x00\x00\x00\x00\x00\x00\x00\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') 13:10:27 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@rand_addr=' \x01\x00'}, {@in6=@mcast2, 0x0, 0x32}, @in6=@rand_addr=' \x01\x00', {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in=@multicast1}}]}, 0x154}}, 0x0) 13:10:27 executing program 3: set_mempolicy(0x1, 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0x5, 0x9) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 13:10:27 executing program 4: unshare(0x40000000) set_mempolicy(0x1, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 13:10:27 executing program 0: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1003, 0x0) open$dir(&(0x7f00000000c0)='./file1\x00', 0x60043, 0x0) [ 639.196274][ T25] kauditd_printk_skb: 120 callbacks suppressed [ 639.196285][ T25] audit: type=1326 audit(1619961027.061:1128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30166 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 13:10:27 executing program 5: set_mempolicy(0x1, &(0x7f0000000040)=0x1405, 0x4) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000002c0)='!pu\t\t&6|\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x04\x00\x00\x00\x00\x00\x00\x00\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') 13:10:27 executing program 1: r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = epoll_create1(0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) r5 = dup3(r1, r2, 0x0) setns(r5, 0x40000000) 13:10:27 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) r1 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r3}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r2, 0xa, 0x13) dup2(r2, r3) fcntl$setown(r2, 0x8, r1) tkill(r1, 0x16) 13:10:27 executing program 4: r0 = fsopen(&(0x7f0000000100)='configfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000000)='mqueue\x00', &(0x7f0000000140)='mqueue\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000240)='ppp1[\x00', &(0x7f00000004c0)='\x15\xcc\x10\xddu\xfe\x7f\xcb\f\xc6\xc1^N\xec\x95\xa5\x9a~\x8f\xba[\xaeC(\xbf\xf31\xee\x00\xfc\xd4\xc2\x7f\xb9\x8f\x94k\x85n\x9f\x1e\xf7\xee\xb7\x00\x8bg$?OM+\x9d\x1f\x05\xf4\x8d%\xf6\xb5l\x8f\xaf<\xef\"V\x9f\xde\xf5\xa6\xe8\xa0\x99R}\xa9\x83\xd9\xe2\xfa}\xaf\xf3\xc0\xd0\x81to\xe9k4U1\xea\xa3\xa2F\x01\xf2$\xd8\xea\xe0 I\xa8\xd4\nYp\x9c-P\x90\xea?o\xc4\x17]cW\xd5\xa9Y\x8d\xffp\x9a\n;\xb8\xf1)e\x7f\xc8G\x8dv\xfb\xe3\x03\x10WV\xfa\xed\xb7\xee\x1eW\xc7\xbc\xe3S\x97\x00'/171, 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000300)='.vboxnet0^keyring,%\x00', &(0x7f0000000480)='selinuxwlan0eth1+md5sum\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000340)='&em0wlan1-\x00', &(0x7f0000000380)='bdevtrusted\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f00000001c0)='/dev/audio\x00', &(0x7f0000000200)='/dev/audio\x00', 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000400)='\xc8:,#\x00', &(0x7f00000005c0)='./file0\x00', 0xffffffffffffff9c) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000180)='!-]F^\x00', &(0x7f0000000280)='i-\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000040)='ppp1[\x00', &(0x7f0000000080)='/dev/audio\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x4, &(0x7f00000000c0)='\x00', &(0x7f0000000600), 0x0) [ 639.261616][T30245] device lo entered promiscuous mode 13:10:27 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58}, [{}]}, 0x78) 13:10:27 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='binfmt_misc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2040124, 0x0) 13:10:27 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 13:10:27 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x2, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001100)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x1}, 0x90) 13:10:27 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58}, [{}]}, 0x78) 13:10:27 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66f126b0d81a193f030800000000fe7c6055e1069f09c691b8f953040000000000000040f45c6237e8d0cd8ba443a00000000000000000000000000000002e92f520242028d08f0d42b60124e95dd8de9f40161e0849e499ab44dba171ad0b071de781545b1b6b100fbe0cf182f252f3eea2548f7670da842a86d5664c1640cc44a25530b9c164daea955fc727c5272ad5ac31804b0ae20e5d7c55c59f50ec9da9677578", 0xa4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 13:10:27 executing program 3: set_mempolicy(0x1, 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0x5, 0x9) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 13:10:27 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) r1 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r3}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r2, 0xa, 0x13) dup2(r2, r3) fcntl$setown(r2, 0x8, r1) tkill(r1, 0x16) 13:10:28 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8a, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) timer_create(0x0, &(0x7f0000000440)={0x0, 0x12}, &(0x7f0000000040)) r1 = syz_open_dev$usbmon(&(0x7f0000000380), 0x0, 0x0) ioctl$MON_IOCX_GETX(r1, 0x4018920a, &(0x7f00000000c0)={0x0, 0x0}) ioctl$MON_IOCX_MFETCH(r1, 0x9208, 0x0) r2 = getpid() timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) ioctl$MON_IOCX_GETX(r1, 0x4018920a, &(0x7f0000000080)={0x0, 0x0}) tkill(r2, 0x800000015) [ 640.051722][ T25] audit: type=1326 audit(1619961027.930:1129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30242 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 13:10:28 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58}, [{}]}, 0x78) 13:10:28 executing program 3: set_mempolicy(0x1, 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0x5, 0x9) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 13:10:28 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58}, [{}]}, 0x78) 13:10:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) r1 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r3}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r2, 0xa, 0x13) dup2(r2, r3) fcntl$setown(r2, 0x8, r1) tkill(r1, 0x16) 13:10:28 executing program 1: creat(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f00000007c0)={'trans=tcp,', {}, 0x2c, {[], [{@rootcontext={'rootcontext', 0x3d, 'system_u'}, 0x22}]}}) [ 640.204711][T30322] 9pnet: p9_fd_create_tcp (30322): problem connecting socket to 127.0.0.1 [ 640.210463][T30324] 9pnet: p9_fd_create_tcp (30324): problem connecting socket to 127.0.0.1 13:10:28 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 13:10:28 executing program 5: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f0000000000)={[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}]}) 13:10:28 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)) fcntl$notify(r0, 0x402, 0xb1c661d318500c51) r1 = syz_open_procfs(0x0, &(0x7f0000000040)) fcntl$notify(r1, 0x402, 0xb1c661d318500c51) r2 = syz_open_procfs(0x0, &(0x7f0000000040)) fcntl$notify(r2, 0x402, 0xb1c661d318500c51) r3 = syz_open_procfs(0x0, &(0x7f0000000040)) fcntl$notify(r3, 0x402, 0xb1c661d318500c51) fcntl$notify(r1, 0x402, 0x0) 13:10:28 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000040)={0xc0000009}) epoll_pwait(r1, &(0x7f0000001580)=[{}], 0x1, 0x0, 0x0, 0x0) 13:10:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) r1 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r3}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r2, 0xa, 0x13) dup2(r2, r3) fcntl$setown(r2, 0x8, r1) tkill(r1, 0x16) 13:10:28 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x2289, &(0x7f0000000000)) [ 640.909263][ T25] audit: type=1326 audit(1619961028.816:1130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30287 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 13:10:28 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000000), r0) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x50, r1, 0x82d4f8471bee9465, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @private0}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @mcast2}, @NLBL_MGMT_A_DOMAIN={0x9, 0x1, '&)!&\x00'}]}, 0x50}}, 0x0) 13:10:28 executing program 4: pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = socket$nl_sock_diag(0x10, 0x3, 0x4) mount$9p_fd(0x0, &(0x7f00000001c0)='.\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) write$P9_RVERSION(r1, &(0x7f0000000000)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.L'}, 0x15) 13:10:28 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000000580)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="c80a1392", 0x4}], 0x1}}], 0x1, 0x40008000) sendmsg$inet6(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f00000013c0)='z}', 0x2}], 0x1}, 0x10) 13:10:28 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000004c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x50, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5}, {0x5}, {0x5}, {0x5, 0x3, 0x5}]}]}, 0x50}}, 0x0) [ 640.975027][T30345] SELinux: duplicate or incompatible mount options [ 640.996382][ T42] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=65380 sclass=netlink_tcpdiag_socket pid=42 comm=kworker/1:1 [ 641.012177][T30350] SELinux: duplicate or incompatible mount options 13:10:28 executing program 5: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = creat(0x0, 0x0) msgctl$IPC_STAT(0x0, 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x69, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r2, 0x107, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x2a) r3 = socket$inet6(0xa, 0x400000000001, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x4000010, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000000c0)="bd515f722aaa3914c71a856efa7e21bab82b6ab854e5ee3738911045d6860268", 0x20, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) dup(r3) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) 13:10:29 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) ftruncate(r0, 0x200) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) [ 641.073158][T20961] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=65380 sclass=netlink_tcpdiag_socket pid=20961 comm=kworker/0:1 13:10:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000180)='./file1\x00', 0x0) move_mount(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x56) 13:10:29 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000080)=0x1, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) ppoll(&(0x7f0000000180)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x1c9c380}, 0x0, 0x0) 13:10:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x32, 0x0, "def152ef6ea77efc9b51480189cf0d9511a1bb2939d56c3f2b79c6d836ec2c73addbc8871cec6505eb4bd2496811112463817baa8d20d4bd9031d3c9bcb4fe51b3105695aa33ca0e85f26fd76326edd4"}, 0xd8) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x2, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000380)={@in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}, 0x0, 0x0, 0x2d, 0x0, "48206374629615ad419c4f11bdfee1ca69bb72b252fcfd650fea5733781f0abf47bb6db13272b0bd83cba429cbb0df467b526ee62bb85a6a7e6509cc06317d87b8748a8fab8a862c14d7419128bb6b59"}, 0xd8) write(r0, 0x0, 0x0) 13:10:29 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, 0x0, 0x0) 13:10:29 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000004c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x50, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5}, {0x5}, {0x5}, {0x5, 0x3, 0x5}]}]}, 0x50}}, 0x0) 13:10:29 executing program 4: set_mempolicy(0x3, &(0x7f0000000080)=0x5, 0x2) r0 = syz_open_dev$vcsa(&(0x7f00000000c0), 0x1b2b, 0x0) ppoll(&(0x7f0000001640)=[{r0}], 0x1, &(0x7f00000016c0)={0x0, 0x989680}, 0x0, 0x0) [ 641.800367][ T25] audit: type=1326 audit(1619961029.710:1131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30343 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 13:10:29 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000004c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x50, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5}, {0x5}, {0x5}, {0x5, 0x3, 0x5}]}]}, 0x50}}, 0x0) 13:10:29 executing program 2: syz_mount_image$nfs4(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)={[{'noacl'}]}) 13:10:29 executing program 5: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000000)='./file0\x00', 0x0) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='system.posix_acl_access\x00') 13:10:29 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x0, r1}) 13:10:29 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='autofs\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) close(0xffffffffffffffff) tkill(r0, 0x2c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 13:10:29 executing program 4: set_mempolicy(0x1, &(0x7f0000000040)=0x3, 0x40) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000001080)={@rand_addr, @remote}, 0x10) 13:10:29 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r0, 0x80083313, &(0x7f0000000000)) 13:10:29 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000080)=0x1, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) ppoll(&(0x7f0000000180)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x1c9c380}, 0x0, 0x0) 13:10:29 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000004c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x50, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5}, {0x5}, {0x5}, {0x5, 0x3, 0x5}]}]}, 0x50}}, 0x0) 13:10:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000005d40)={0x0, 0x0, &(0x7f0000005b00)=[{&(0x7f0000002140)={0x18, 0x30, 0x33d, 0x0, 0x0, "", [@nested={0x8, 0x0, 0x0, 0x1, [@typed={0x4, 0x1, 0x0, 0x0, @binary}]}]}, 0x18}], 0x1}, 0x0) 13:10:29 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='autofs\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) close(0xffffffffffffffff) tkill(r0, 0x2c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 13:10:29 executing program 5: r0 = socket$inet(0x10, 0x80002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="240000001a0007041dfffd946f6105000a0000e8fe020801000108000800030012000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 13:10:29 executing program 4: socket$nl_route(0x10, 0x3, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000000)={'IDLETIMER\x00'}, &(0x7f00000000c0)=0x1e) [ 641.964077][T30415] autofs4:pid:30415:autofs_fill_super: called with bogus options [ 641.985371][T30417] autofs4:pid:30417:autofs_fill_super: called with bogus options 13:10:29 executing program 4: socket$nl_route(0x10, 0x3, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000000)={'IDLETIMER\x00'}, &(0x7f00000000c0)=0x1e) 13:10:30 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x10, &(0x7f0000000540)={{{@in6=@private2, @in6=@rand_addr=' \x01\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@private1}, 0x0, @in=@empty}}, 0xe8) 13:10:30 executing program 4: socket$nl_route(0x10, 0x3, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000000)={'IDLETIMER\x00'}, &(0x7f00000000c0)=0x1e) 13:10:30 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setown(r0, 0x8, 0xffffffffffffffff) ioctl$int_in(r0, 0x5452, &(0x7f0000000200)=0x3) [ 642.073724][T30438] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 642.084096][T30443] autofs4:pid:30443:autofs_fill_super: called with bogus options 13:10:30 executing program 5: r0 = socket$inet(0x10, 0x80002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="240000001a0007041dfffd946f6105000a0000e8fe020801000108000800030012000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 13:10:30 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='autofs\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) close(0xffffffffffffffff) tkill(r0, 0x2c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 13:10:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000080)=0x1, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) ppoll(&(0x7f0000000180)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x1c9c380}, 0x0, 0x0) 13:10:30 executing program 4: socket$nl_route(0x10, 0x3, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000000)={'IDLETIMER\x00'}, &(0x7f00000000c0)=0x1e) 13:10:30 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000440)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x40) 13:10:30 executing program 2: syz_io_uring_submit(0x0, 0x0, &(0x7f00000000c0)=@IORING_OP_SEND={0x1a, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x200172, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000009) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 13:10:30 executing program 5: r0 = socket$inet(0x10, 0x80002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="240000001a0007041dfffd946f6105000a0000e8fe020801000108000800030012000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 642.176007][T30469] autofs4:pid:30469:autofs_fill_super: called with bogus options [ 642.177229][T30471] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 13:10:30 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f00000006c0)={0x14, r1, 0x1, 0x0, 0x0, {0xe}}, 0x14}}, 0x0) 13:10:30 executing program 2: set_mempolicy(0x6001, &(0x7f0000000040)=0xf09, 0x9) 13:10:30 executing program 0: io_setup(0x5, &(0x7f00000002c0)=0x0) r1 = socket$unix(0x1, 0x5, 0x0) io_submit(r0, 0x1, &(0x7f0000000a40)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x8, 0x0, r1, 0x0}]) 13:10:30 executing program 5: r0 = socket$inet(0x10, 0x80002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="240000001a0007041dfffd946f6105000a0000e8fe020801000108000800030012000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 642.235095][T30483] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 13:10:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x11, &(0x7f0000000040)={'filter\x00', 0x7, 0x4, 0xa, 0x110, 0x200, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x4, 0x0, {[{{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'wlan0\x00', 'wg2\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@dev, @multicast1, @remote}}}, {{@uncond, 0xc0, 0xf0}, @unspec=@CONNMARK={0x30}}, {{@uncond, 0xc0, 0xe8}, @unspec=@MARK={0x28}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x420) 13:10:30 executing program 2: clone(0x200b64065fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='projid_map\x00') ppoll(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe9c) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$binfmt_elf64(r0, 0x0, 0x0) [ 642.336972][T30503] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 13:10:33 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='autofs\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) close(0xffffffffffffffff) tkill(r0, 0x2c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 13:10:33 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x2) ioctl$SCSI_IOCTL_SYNC(r0, 0x4) 13:10:33 executing program 5: futex(0x0, 0x9, 0x0, &(0x7f0000000240), 0x0, 0x0) 13:10:33 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000080)=0x1, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) ppoll(&(0x7f0000000180)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x1c9c380}, 0x0, 0x0) 13:10:33 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x1, 0x0, 0x0) 13:10:33 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7a}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x0) pkey_alloc(0x0, 0x0) 13:10:33 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x1, 0x0, 0x0) 13:10:33 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) 13:10:33 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x1, 0x0, 0x0) 13:10:33 executing program 4: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) link(0x0, 0x0) [ 645.166988][T30528] program syz-executor.4 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 645.182189][T30530] autofs4:pid:30530:autofs_fill_super: called with bogus options 13:10:33 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7a}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x0) pkey_alloc(0x0, 0x0) 13:10:33 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000340)=ANY=[]) lchown(&(0x7f0000000080)='./file0\x00', 0x0, 0xee01) 13:10:36 executing program 3: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40}, 0x0) read$rfkill(0xffffffffffffffff, 0x0, 0x0) clock_nanosleep(0x2, 0x0, &(0x7f00000000c0)={0x0, 0x989680}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000001c0)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000c00), r0) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000ec0), r0) sendmsg$DEVLINK_CMD_TRAP_GET(r2, &(0x7f0000001040)={0x0, 0x0, &(0x7f0000001000)={&(0x7f0000000f00)={0x8c, r3, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}]}, 0x8c}}, 0x0) 13:10:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@usrjquota}]}) 13:10:36 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7a}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x0) pkey_alloc(0x0, 0x0) 13:10:36 executing program 4: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) link(0x0, 0x0) 13:10:36 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x1, 0x0, 0x0) 13:10:36 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000200)=0x1, 0x4) sendmsg$inet6(r0, &(0x7f0000000300)={&(0x7f0000000080)={0xa, 0x4e22, 0x1000000080000, @dev}, 0x1c, 0x0}, 0x0) 13:10:36 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r1, 0x29, 0x4c, 0x0, &(0x7f0000000040)) 13:10:36 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7a}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x0) pkey_alloc(0x0, 0x0) 13:10:36 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000002dc0)='./bus\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[], 0xfffffd28) lseek(r0, 0x0, 0x3) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) dup2(r2, r0) flock(r1, 0x1) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) 13:10:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x20012, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mlock(&(0x7f0000005000/0x1000)=nil, 0x1000) mlock(&(0x7f0000003000/0x3000)=nil, 0x3002) read(r0, &(0x7f0000000040)=""/2, 0x2) 13:10:36 executing program 4: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) link(0x0, 0x0) 13:10:36 executing program 5: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) [ 648.355011][T30597] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 648.363188][T30597] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 13:10:37 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000001880)={0x0, 0x0, &(0x7f0000001840)={&(0x7f0000000400)={0xec0, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_WOL_HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}]}, @ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_WOL_MODES={0x74, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x68, 0x3, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '-,:]}\x00'}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '&#\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '{\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}, @ETHTOOL_A_WOL_SOPASS={0x5, 0x3, 'F'}, @ETHTOOL_A_WOL_MODES={0xdb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xc5, 0x4, "7ccf42e59506aced2e9143dd34775a54ddfaf672214a756effa95e372d68fd462e0a3adbc231250cd9b12d36a52edb4a48ef240e497fe9e56608aa44da39f20b98a9e4717e72fdebc266ec9391abb971f26056a50bd03b81e0fe433ab594870481377ccafca08d0fa5e50d6b05b66a729f8c91fbc99b928430a90d892a670b655114233558b2b9af273d42825c5650bebd85030ed927219235ee159daa52497be1733f4e67aed2faa6ade827e14479195ddb2efbac1466e504781e9d3026bf978f"}, @ETHTOOL_A_BITSET_VALUE={0x9, 0x4, "fd4f10b49c"}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_MASK={0xcd5, 0x5, "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"}]}]}, 0xec4}}, 0x0) 13:10:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="66530700ae897094e71b0fb1f147a8378f364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb298802d8f6c1f3b18d6d352507f7018b31a53bad1ec3533c791a753a1fef2c560015000000000000fb8005128e7e4d939955f8ac396203784000400f573fbf000000000000000761f35e959f130dec95128ce7ec033dc0a380543bfc99320be1c1bb99bb063fb66f2d696569eada31b09fbd15f0332701d9d14a3f3109d666578cc0266bce7860eaaf305a0ee2af0f82dfefd5e00d421b", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 13:10:37 executing program 4: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) link(0x0, 0x0) 13:10:37 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) fdatasync(r0) readv(0xffffffffffffffff, &(0x7f0000001700)=[{0x0}], 0x1) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) io_setup(0x80, &(0x7f0000001640)) 13:10:37 executing program 5: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 13:10:37 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x40, &(0x7f0000017c00)=0xba, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000140)=0x8, 0x4) [ 649.097558][T30603] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 649.105698][T30603] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 13:10:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0xa, 0x2400000001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000034000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @remote}}, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0x108) getsockopt$inet6_buf(r1, 0x29, 0x10000000000030, &(0x7f0000034000)=""/144, &(0x7f0000e5f000)=0x90) 13:10:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) link(&(0x7f0000000200)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') unlink(&(0x7f0000000280)='./bus/file0\x00') 13:10:37 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000001500), 0x4) 13:10:37 executing program 5: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 13:10:37 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = fsopen(&(0x7f0000000040)='pipefs\x00', 0x0) r1 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x18) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f0000000080)='rootcontext', &(0x7f0000000100)='./file0\x00', r1) 13:10:37 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@private1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x2}, {{@in6=@empty}, 0x0, @in=@local}}, 0xa8) [ 649.254451][T30636] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=30636 comm=syz-executor.3 13:10:37 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) link(&(0x7f0000000200)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') unlink(&(0x7f0000000280)='./bus/file0\x00') 13:10:37 executing program 5: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 13:10:37 executing program 4: unshare(0x40400) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x40) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x6, 0xb, 0x0, &(0x7f0000000340)) 13:10:37 executing program 2: r0 = socket$inet(0x2, 0x3, 0x42) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x89e1, 0x0) 13:10:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) link(&(0x7f0000000200)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') unlink(&(0x7f0000000280)='./bus/file0\x00') 13:10:37 executing program 0: clone(0x29ab43db5b8099d4, 0x0, &(0x7f0000000600), 0x0, 0x0) clone(0x40104000, &(0x7f0000000080)="e3f8ef88199adcad4f7ae39c5dd01fd2609d2ac19a0765a4863438556c23c1192882ba7554", &(0x7f0000000000), &(0x7f0000000100), 0x0) clone(0x40044000, &(0x7f0000000980)="7371613774a778905fb98879f7e892b8d0caf886fdbbfbc2bf41da000000a26316dec5e25f999f5a4a3f30f6f97a6dd5027ccbd255adfd6618fa3add4f08205daf1db50cf66cb36c1f5ff4bbbca18722385d63e01d777bd152dd6f016eb3f629c49edd1d675619376a733887d1313354e5f5d273ce64c80d177ce63c24534b7c151ba58626cb16c9c6c76d7663745a7b7b89c42931cc562b78d4ff9e38a13392a5af9cf7be48d30aa87d1d887917ed590946d8fc9b829844415409a55ed184f1329f0c083d798a00f2", &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="47f0d9ad6b46bdd458152be5497c6b223ed6a8b12f9218bd45fb5e8dd2fcc08b051d1fad0cb9ced62ec782b8a2cef649001ac8361c9788cf06bfadc79da6abe5bedd375f9e745631ee406a548cc069e0ed5642cbf1c9526fd35b") 13:10:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x8028, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') umount2(&(0x7f00000001c0)='../file0\x00', 0x2) link(&(0x7f0000000480)='./file0/file0\x00', &(0x7f00000004c0)='./file1\x00') 13:10:37 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000001240)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f00000002c0)="183d395334a51be205c6f2191afdf9289ad0678888f59a48d9fd5c7390336b89d82b0c106bff901c866b4760fdae45c0e24b748fcbc25be5358ff9bd2637d2352dae0e90cd318e1621eef1855189265d88634d2d859a2d41a5bb950c8988dcd82d9e0301760b22e5aca06bdd13aecf", 0x6f}], 0x1, 0x0, 0x2a0}}], 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="00090000000000000730000000000a00000800f7ff00000000000000000000000000000000001001000001000000000000000000000000000000040100010400000000c910fe880000000000000000000000000001"], 0x58) 13:10:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) link(&(0x7f0000000200)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') unlink(&(0x7f0000000280)='./bus/file0\x00') 13:10:37 executing program 2: perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10202}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r0, 0x8208200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14117e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000480)={'syztnl2\x00', &(0x7f0000000440)={'syztnl1\x00', 0x0, 0x8, 0x7, 0x3, 0x2d, {{0x7, 0x4, 0x0, 0xb, 0x1c, 0x64, 0x0, 0x1, 0x2f, 0x0, @local, @private=0xa010101, {[@timestamp={0x44, 0x8, 0x64, 0x0, 0x6, [0xa4]}]}}}}}) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8040000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x54, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xde00}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x4}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x800}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}]}, 0x54}, 0x1, 0x0, 0x0, 0x20040805}, 0x0) r3 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, r3, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r4, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r5 = syz_open_pts(r4, 0x0) ioctl$TCSETS(r5, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 'JZ-\x00'}) r6 = dup3(r5, r4, 0x0) vmsplice(r6, &(0x7f00000003c0)=[{&(0x7f0000000000)="cc8c1158a49f85acf60b62842ba9c480a6ed9f26c54f82451d9e4d35fda25e7bebd49afc38b388ca860f205bb16d270c52cb562716ab104681a3c3c9abbd88a84c75ba09d7ed4e669899d430363f161e3ffa5667f3744be896c2f8ea3537700d6520d87abbe15d5eafd152b9f544536c7a39b4d4f06fe6bf95b7d8410c8d92ba593d1652084e4fba88f7791331602c4e74df506bde75a1310a2459c8b8", 0x9d}, {&(0x7f00000000c0)="d78d705105ee3e95c41034e7daf83c649389cf2e79262dc09fbe82eba663d36c80f245534a7d85e287317377ba17ec9edc789be286acfbf1fbdd1f012931174091661d3d7191797f6f76c3358bdb", 0x4e}, {&(0x7f0000000140)="2472e4b220e770314f299d24", 0xc}, {&(0x7f0000000180)="e07f798c9ae3b234d1c87d7b64ea2446854654536179aa686dc367827d01ecef2d49886b080da8b0cd7dee4963ad03ef4591355f011c8c033c71561f563d8a5284a3ec7ed03702e4eed31bdd4f7b74382b485be35a3ba9346c037564678b71825bab5902b2b7418c64d99a14926c54c38de0e457057c", 0x76}, {&(0x7f0000000200)="3c30319c9c33b4dcbd3edf75ab8d8c862487c0480619ca887428dd1bf0eb3fef8b89c899f7dde5e6a77191a0072f2001d42a364911709626406e83a66365c21b73590c98eb9abd4eb4a59f9503e293ab", 0x50}], 0x5, 0x1) mmap(&(0x7f0000000000/0x600000)=nil, 0x600e00, 0x7ffffe, 0x4002011, 0xffffffffffffffff, 0x0) 13:10:37 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/key-users\x00', 0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x1a1) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) write$P9_RGETLOCK(r0, 0x0, 0x20) syz_mount_image$nfs(&(0x7f0000000380), 0x0, 0x0, 0x0, 0x0, 0x240000, 0x0) close_range(0xffffffffffffffff, r2, 0x2) r3 = getpgid(0x0) migrate_pages(r3, 0x2, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280), r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000000c0)="8081", 0x2, 0x1600}], 0x81, &(0x7f0000000180)={[{@grpquota}]}) 13:10:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) link(&(0x7f0000000200)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') unlink(&(0x7f0000000280)='./bus/file0\x00') [ 649.495095][T30683] loop4: detected capacity change from 0 to 1051 [ 649.506641][T30683] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:10:37 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) link(&(0x7f0000000200)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') unlink(&(0x7f0000000280)='./bus/file0\x00') [ 649.553888][T30683] EXT4-fs (loop4): orphan cleanup on readonly fs [ 649.599465][T30683] Quota error (device loop4): v2_read_header: Failed header read: expected=8 got=0 13:10:37 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) link(&(0x7f0000000200)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') unlink(&(0x7f0000000280)='./bus/file0\x00') 13:10:37 executing program 5: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f00000002c0)={0x1}, 0x8, 0x0) msgrcv(r0, &(0x7f0000000200)={0x0, ""/183}, 0xbf, 0x1, 0x0) 13:10:37 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000080)=""/124, 0x7c}], 0x1, 0x0, 0x0) [ 649.643184][T30683] EXT4-fs error (device loop4): ext4_free_inode:282: comm syz-executor.4: reserved or nonexistent inode 3 [ 649.654596][T30683] EXT4-fs warning (device loop4): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 649.668535][T30683] EXT4-fs (loop4): Cannot turn on quotas: error -22 [ 649.675195][T30683] EXT4-fs (loop4): mounted filesystem without journal. Opts: grpquota,,errors=continue. Quota mode: writeback. 13:10:37 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) 13:10:38 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 13:10:38 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) close(r0) 13:10:38 executing program 5: unshare(0x2a000400) r0 = fork() fork() rt_sigqueueinfo(r0, 0x9, &(0x7f0000000140)={0x0, 0x0, 0x80000001}) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) 13:10:38 executing program 1: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000080)) mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001140)={0x100090, 0x73, 0x0, {r0}}, 0x20) 13:10:38 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/key-users\x00', 0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x1a1) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) write$P9_RGETLOCK(r0, 0x0, 0x20) syz_mount_image$nfs(&(0x7f0000000380), 0x0, 0x0, 0x0, 0x0, 0x240000, 0x0) close_range(0xffffffffffffffff, r2, 0x2) r3 = getpgid(0x0) migrate_pages(r3, 0x2, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280), r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000000c0)="8081", 0x2, 0x1600}], 0x81, &(0x7f0000000180)={[{@grpquota}]}) 13:10:38 executing program 2: perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10202}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r0, 0x8208200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14117e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000480)={'syztnl2\x00', &(0x7f0000000440)={'syztnl1\x00', 0x0, 0x8, 0x7, 0x3, 0x2d, {{0x7, 0x4, 0x0, 0xb, 0x1c, 0x64, 0x0, 0x1, 0x2f, 0x0, @local, @private=0xa010101, {[@timestamp={0x44, 0x8, 0x64, 0x0, 0x6, [0xa4]}]}}}}}) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8040000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x54, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xde00}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x4}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x800}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}]}, 0x54}, 0x1, 0x0, 0x0, 0x20040805}, 0x0) r3 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, r3, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r4, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r5 = syz_open_pts(r4, 0x0) ioctl$TCSETS(r5, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 'JZ-\x00'}) r6 = dup3(r5, r4, 0x0) vmsplice(r6, &(0x7f00000003c0)=[{&(0x7f0000000000)="cc8c1158a49f85acf60b62842ba9c480a6ed9f26c54f82451d9e4d35fda25e7bebd49afc38b388ca860f205bb16d270c52cb562716ab104681a3c3c9abbd88a84c75ba09d7ed4e669899d430363f161e3ffa5667f3744be896c2f8ea3537700d6520d87abbe15d5eafd152b9f544536c7a39b4d4f06fe6bf95b7d8410c8d92ba593d1652084e4fba88f7791331602c4e74df506bde75a1310a2459c8b8", 0x9d}, {&(0x7f00000000c0)="d78d705105ee3e95c41034e7daf83c649389cf2e79262dc09fbe82eba663d36c80f245534a7d85e287317377ba17ec9edc789be286acfbf1fbdd1f012931174091661d3d7191797f6f76c3358bdb", 0x4e}, {&(0x7f0000000140)="2472e4b220e770314f299d24", 0xc}, {&(0x7f0000000180)="e07f798c9ae3b234d1c87d7b64ea2446854654536179aa686dc367827d01ecef2d49886b080da8b0cd7dee4963ad03ef4591355f011c8c033c71561f563d8a5284a3ec7ed03702e4eed31bdd4f7b74382b485be35a3ba9346c037564678b71825bab5902b2b7418c64d99a14926c54c38de0e457057c", 0x76}, {&(0x7f0000000200)="3c30319c9c33b4dcbd3edf75ab8d8c862487c0480619ca887428dd1bf0eb3fef8b89c899f7dde5e6a77191a0072f2001d42a364911709626406e83a66365c21b73590c98eb9abd4eb4a59f9503e293ab", 0x50}], 0x5, 0x1) mmap(&(0x7f0000000000/0x600000)=nil, 0x600e00, 0x7ffffe, 0x4002011, 0xffffffffffffffff, 0x0) 13:10:38 executing program 1: r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000002c0)=0x10) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x28000}) 13:10:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_io_uring_setup(0x7463, &(0x7f0000000180), &(0x7f00003b2000/0x800000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000000)=0x0) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, r0, 0x0, 0x0}, 0x722c) syz_io_uring_submit(r2, r3, &(0x7f0000000100)=@IORING_OP_FILES_UPDATE={0x14, 0x2, 0x0, 0x0, 0x0, &(0x7f0000000080)=[0xffffffffffffffff], 0x1}, 0x0) syz_io_uring_setup(0x15b4, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000040)=0x0) syz_io_uring_submit(r2, r4, &(0x7f0000000140)=@IORING_OP_SYNC_FILE_RANGE, 0x7fffffff) io_uring_enter(r1, 0x4ab0, 0x0, 0x0, 0x0, 0x0) [ 650.368767][T30758] loop4: detected capacity change from 0 to 1051 13:10:38 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, &(0x7f0000000280)='smaps\x00') sendmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002640)=ANY=[@ANYBLOB="28000000000000000100000001"], 0x48}, 0x0) sendmmsg$unix(r0, &(0x7f0000000300)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000000c0)="b7", 0x1}], 0x1}], 0x49249249249250e, 0x0) 13:10:38 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000a80)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x106e, 0x40}, [{}]}, 0x78) 13:10:38 executing program 1: quotactl(0x40000080000102, 0x0, 0x0, 0x0) [ 650.425866][T30758] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:10:38 executing program 0: prctl$PR_SET_MM_MAP(0x23, 0x2, &(0x7f0000000140)={&(0x7f0000d48000/0x1000)=nil, &(0x7f0000fcf000/0x8000)=nil, &(0x7f0000ca6000/0x1000)=nil, &(0x7f0000fac000/0x2000)=nil, &(0x7f0000e33000/0x4000)=nil, &(0x7f0000f7a000/0x1000)=nil, &(0x7f0000d43000/0x3000)=nil, &(0x7f0000e96000/0x4000)=nil, &(0x7f0000cdd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0}, 0x68) 13:10:38 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x5b, 0x7, 0x3b, 0x0, 0x0, 0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x106d, 0x40}}, 0x40) [ 650.521431][T30758] EXT4-fs (loop4): orphan cleanup on readonly fs [ 650.531175][T30758] Quota error (device loop4): v2_read_header: Failed header read: expected=8 got=0 13:10:38 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000a80)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x106e, 0x40}, [{}]}, 0x78) 13:10:38 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300), 0x41, 0x0) write$vga_arbiter(r0, &(0x7f0000000080)=@target={'target ', {'PCI:', '0', ':', '0', ':', '5', '.', '10'}}, 0x14) 13:10:38 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000a80)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x106e, 0x40}, [{}]}, 0x78) [ 650.567420][T30758] EXT4-fs error (device loop4): ext4_free_inode:282: comm syz-executor.4: reserved or nonexistent inode 3 [ 650.578793][T30758] EXT4-fs warning (device loop4): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 650.592772][T30758] EXT4-fs (loop4): Cannot turn on quotas: error -22 [ 650.599519][T30758] EXT4-fs (loop4): mounted filesystem without journal. Opts: grpquota,,errors=continue. Quota mode: writeback. 13:10:38 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/key-users\x00', 0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x1a1) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) write$P9_RGETLOCK(r0, 0x0, 0x20) syz_mount_image$nfs(&(0x7f0000000380), 0x0, 0x0, 0x0, 0x0, 0x240000, 0x0) close_range(0xffffffffffffffff, r2, 0x2) r3 = getpgid(0x0) migrate_pages(r3, 0x2, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280), r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000000c0)="8081", 0x2, 0x1600}], 0x81, &(0x7f0000000180)={[{@grpquota}]}) 13:10:38 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r0, 0x29, 0x4e, 0x0, 0x0) 13:10:38 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) r2 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), 0x0) setregid(0x0, 0x0) r3 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000240)={{}, {}, [{}, {0x2, 0x0, 0xffffffffffffffff}], {}, [{}, {0x8, 0x0, 0xee00}, {}]}, 0x4c, 0x2) fcntl$setstatus(r0, 0x4, 0x4800) sendfile(r0, r1, 0x0, 0x8400fffffffa) 13:10:38 executing program 2: perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10202}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r0, 0x8208200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14117e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000480)={'syztnl2\x00', &(0x7f0000000440)={'syztnl1\x00', 0x0, 0x8, 0x7, 0x3, 0x2d, {{0x7, 0x4, 0x0, 0xb, 0x1c, 0x64, 0x0, 0x1, 0x2f, 0x0, @local, @private=0xa010101, {[@timestamp={0x44, 0x8, 0x64, 0x0, 0x6, [0xa4]}]}}}}}) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8040000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x54, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xde00}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x4}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x800}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}]}, 0x54}, 0x1, 0x0, 0x0, 0x20040805}, 0x0) r3 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, r3, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r4, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r5 = syz_open_pts(r4, 0x0) ioctl$TCSETS(r5, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 'JZ-\x00'}) r6 = dup3(r5, r4, 0x0) vmsplice(r6, &(0x7f00000003c0)=[{&(0x7f0000000000)="cc8c1158a49f85acf60b62842ba9c480a6ed9f26c54f82451d9e4d35fda25e7bebd49afc38b388ca860f205bb16d270c52cb562716ab104681a3c3c9abbd88a84c75ba09d7ed4e669899d430363f161e3ffa5667f3744be896c2f8ea3537700d6520d87abbe15d5eafd152b9f544536c7a39b4d4f06fe6bf95b7d8410c8d92ba593d1652084e4fba88f7791331602c4e74df506bde75a1310a2459c8b8", 0x9d}, {&(0x7f00000000c0)="d78d705105ee3e95c41034e7daf83c649389cf2e79262dc09fbe82eba663d36c80f245534a7d85e287317377ba17ec9edc789be286acfbf1fbdd1f012931174091661d3d7191797f6f76c3358bdb", 0x4e}, {&(0x7f0000000140)="2472e4b220e770314f299d24", 0xc}, {&(0x7f0000000180)="e07f798c9ae3b234d1c87d7b64ea2446854654536179aa686dc367827d01ecef2d49886b080da8b0cd7dee4963ad03ef4591355f011c8c033c71561f563d8a5284a3ec7ed03702e4eed31bdd4f7b74382b485be35a3ba9346c037564678b71825bab5902b2b7418c64d99a14926c54c38de0e457057c", 0x76}, {&(0x7f0000000200)="3c30319c9c33b4dcbd3edf75ab8d8c862487c0480619ca887428dd1bf0eb3fef8b89c899f7dde5e6a77191a0072f2001d42a364911709626406e83a66365c21b73590c98eb9abd4eb4a59f9503e293ab", 0x50}], 0x5, 0x1) mmap(&(0x7f0000000000/0x600000)=nil, 0x600e00, 0x7ffffe, 0x4002011, 0xffffffffffffffff, 0x0) 13:10:38 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000a80)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x106e, 0x40}, [{}]}, 0x78) 13:10:38 executing program 1: quotactl(0x40000080000102, 0x0, 0x0, 0x0) 13:10:38 executing program 5: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = epoll_create1(0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = epoll_create1(0x0) epoll_pwait(r4, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f0000000300)) 13:10:38 executing program 1: quotactl(0x40000080000102, 0x0, 0x0, 0x0) 13:10:38 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x12, 0x0, 0x0, 0x0, 0x0, "035b0000000000000000000000000000001000"}) [ 650.777710][T30824] loop4: detected capacity change from 0 to 1051 [ 650.793600][T30824] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 650.845772][T30824] EXT4-fs (loop4): orphan cleanup on readonly fs [ 650.857065][T30824] Quota error (device loop4): v2_read_header: Failed header read: expected=8 got=0 [ 650.867173][T30824] EXT4-fs error (device loop4): ext4_free_inode:282: comm syz-executor.4: reserved or nonexistent inode 3 [ 650.878548][T30824] EXT4-fs warning (device loop4): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 13:10:38 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x12, 0x0, 0x0, 0x0, 0x0, "035b0000000000000000000000000000001000"}) 13:10:38 executing program 1: quotactl(0x40000080000102, 0x0, 0x0, 0x0) [ 650.892624][T30824] EXT4-fs (loop4): Cannot turn on quotas: error -22 [ 650.899237][T30824] EXT4-fs (loop4): mounted filesystem without journal. Opts: grpquota,,errors=continue. Quota mode: writeback. 13:10:38 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/key-users\x00', 0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x1a1) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) write$P9_RGETLOCK(r0, 0x0, 0x20) syz_mount_image$nfs(&(0x7f0000000380), 0x0, 0x0, 0x0, 0x0, 0x240000, 0x0) close_range(0xffffffffffffffff, r2, 0x2) r3 = getpgid(0x0) migrate_pages(r3, 0x2, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280), r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000000c0)="8081", 0x2, 0x1600}], 0x81, &(0x7f0000000180)={[{@grpquota}]}) 13:10:38 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x3) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)={0xffffffffffffffff, r1, 0xfff}) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="87", 0x1}], 0x100000000000030c) 13:10:38 executing program 2: perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10202}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r0, 0x8208200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14117e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000480)={'syztnl2\x00', &(0x7f0000000440)={'syztnl1\x00', 0x0, 0x8, 0x7, 0x3, 0x2d, {{0x7, 0x4, 0x0, 0xb, 0x1c, 0x64, 0x0, 0x1, 0x2f, 0x0, @local, @private=0xa010101, {[@timestamp={0x44, 0x8, 0x64, 0x0, 0x6, [0xa4]}]}}}}}) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8040000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x54, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xde00}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x4}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x800}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}]}, 0x54}, 0x1, 0x0, 0x0, 0x20040805}, 0x0) r3 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, r3, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r4, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r5 = syz_open_pts(r4, 0x0) ioctl$TCSETS(r5, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 'JZ-\x00'}) r6 = dup3(r5, r4, 0x0) vmsplice(r6, &(0x7f00000003c0)=[{&(0x7f0000000000)="cc8c1158a49f85acf60b62842ba9c480a6ed9f26c54f82451d9e4d35fda25e7bebd49afc38b388ca860f205bb16d270c52cb562716ab104681a3c3c9abbd88a84c75ba09d7ed4e669899d430363f161e3ffa5667f3744be896c2f8ea3537700d6520d87abbe15d5eafd152b9f544536c7a39b4d4f06fe6bf95b7d8410c8d92ba593d1652084e4fba88f7791331602c4e74df506bde75a1310a2459c8b8", 0x9d}, {&(0x7f00000000c0)="d78d705105ee3e95c41034e7daf83c649389cf2e79262dc09fbe82eba663d36c80f245534a7d85e287317377ba17ec9edc789be286acfbf1fbdd1f012931174091661d3d7191797f6f76c3358bdb", 0x4e}, {&(0x7f0000000140)="2472e4b220e770314f299d24", 0xc}, {&(0x7f0000000180)="e07f798c9ae3b234d1c87d7b64ea2446854654536179aa686dc367827d01ecef2d49886b080da8b0cd7dee4963ad03ef4591355f011c8c033c71561f563d8a5284a3ec7ed03702e4eed31bdd4f7b74382b485be35a3ba9346c037564678b71825bab5902b2b7418c64d99a14926c54c38de0e457057c", 0x76}, {&(0x7f0000000200)="3c30319c9c33b4dcbd3edf75ab8d8c862487c0480619ca887428dd1bf0eb3fef8b89c899f7dde5e6a77191a0072f2001d42a364911709626406e83a66365c21b73590c98eb9abd4eb4a59f9503e293ab", 0x50}], 0x5, 0x1) mmap(&(0x7f0000000000/0x600000)=nil, 0x600e00, 0x7ffffe, 0x4002011, 0xffffffffffffffff, 0x0) 13:10:38 executing program 1: io_setup(0x1f, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000000000)={0x0, 0x7530}, 0x10) io_submit(r0, 0x1, &(0x7f0000000340)=[&(0x7f00000001c0)={0x0, 0x4, 0x0, 0x0, 0x0, r1, &(0x7f0000000100)='&', 0x1}]) [ 651.035780][T30865] loop4: detected capacity change from 0 to 1051 [ 651.051518][T30865] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 651.080727][T30865] EXT4-fs (loop4): orphan cleanup on readonly fs [ 651.087246][T30865] Quota error (device loop4): v2_read_header: Failed header read: expected=8 got=0 [ 651.097168][T30865] EXT4-fs error (device loop4): ext4_free_inode:282: comm syz-executor.4: reserved or nonexistent inode 3 [ 651.108607][T30865] EXT4-fs warning (device loop4): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 651.123068][T30865] EXT4-fs (loop4): Cannot turn on quotas: error -22 [ 651.129683][T30865] EXT4-fs (loop4): mounted filesystem without journal. Opts: grpquota,,errors=continue. Quota mode: writeback. 13:10:39 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x12, 0x0, 0x0, 0x0, 0x0, "035b0000000000000000000000000000001000"}) 13:10:39 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x12a, &(0x7f00000005c0)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd", 0x44}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 13:10:39 executing program 4: r0 = timerfd_create(0x0, 0x0) io_setup(0x2, &(0x7f0000000180)=0x0) eventfd2(0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 13:10:39 executing program 1: sendmsg$NL80211_CMD_SET_WOWLAN(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)={0xc04, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0x8}, @val={0xc}}}, [@NL80211_ATTR_WOWLAN_TRIGGERS={0x7c, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_RFKILL_RELEASE={0x4}, @NL80211_WOWLAN_TRIG_RFKILL_RELEASE={0x4}, @NL80211_WOWLAN_TRIG_TCP_CONNECTION={0x68, 0xe, 0x0, 0x1, [@NL80211_WOWLAN_TCP_WAKE_MASK={0x61, 0xb, "50b5cf17922037f80482277034dbd4241bca90e6f49a12ecadda50ee66745c11a49827d7f9287aefc853ab815b3d2880476d0332f540ddca50b84e06395fbc83948df985382bea65ae16d53a987bc1d57cf18599c8f694bf05d73b2a9d"}]}, @NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_DISCONNECT={0x4}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0xb60, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_MAGIC_PKT={0x4}, @NL80211_WOWLAN_TRIG_MAGIC_PKT={0x4}, @NL80211_WOWLAN_TRIG_RFKILL_RELEASE={0x4}, @NL80211_WOWLAN_TRIG_MAGIC_PKT={0x4}, @NL80211_WOWLAN_TRIG_EAP_IDENT_REQUEST={0x4}, @NL80211_WOWLAN_TRIG_PKT_PATTERN={0x244, 0x4, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8}]}, {0x228, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0x55, 0x1, "4e470cadb484d7c27f23d8480d5ac693d2b819c2643bfbbcdc5f546bf9158c48a9088b98c7938de438c4abbc1bddb5011492263b84e4194430948348c1fd9b1b1befd7202b36da2c7452cd7e33f9060238"}, @NL80211_PKTPAT_PATTERN={0x59, 0x2, "61d32e7ce94995a9c6b139b2a39921cdea48e21c8a7f80e324c41ad7969a42222fa1a62e7ccc7b79ceb43a2e85cbaf42961b55d50fee08de33d24787492102f72fcda039ce3cc098e92987f29210feee1957949e15"}, @NL80211_PKTPAT_PATTERN={0x79, 0x2, "98ceab3bc56aab43d2aadce0190b93039e7d0be74dd76748755e50fdc2af2c84cda02f0e0cbd643e6fe990d56a48ebfde7886fc24700bb110c84202d5c22ccffb47cbb276c05fd0468e38d8eea8d042640bae85a60a0657290bc63e69dfae4672013e6604226ba39efcf755103d24674b306b702a4"}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_PATTERN={0xb5, 0x2, "c4c5055aba62272dcc2660704d8e6a162e23eb5a8a5911de6b77b9414dabaa897de86af8ccb50d8b4198db3e0f6e65c63f5e72005f558ecef09aad598f7bce0d3174a2a595215702e939d52653e4e058e29eb09e0fc518e32f7420b3125e67421be369309f8bb689de884e66622e8c756800bba72a8b1581168a8c707239889438a3b012abba5916165911b72ebb807940e38c2b186cd33bf858c2859ede986ac6e121c4ab6a80c65ac49d9d2c6d246263"}, @NL80211_PKTPAT_PATTERN={0x21, 0x2, "d91d3b538dce599d1ee2bb94f6493bc0ffa82f9a6d5fa07e9066df1290"}, @NL80211_PKTPAT_OFFSET={0x8}]}, {0xc, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8}]}]}, @NL80211_WOWLAN_TRIG_PKT_PATTERN={0x904, 0x4, 0x0, 0x1, [{0x8c, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_PATTERN={0x49, 0x2, "caa23b6f656c232c77fbbcf049dc67b833a4cb31398e6f7ff392a7a6aa7232d47d0e1fcabc647630990e0e30d45e8e50014fa7713d5b35022d5c07b1ca68a0ed473824fbad"}, @NL80211_PKTPAT_MASK={0x9, 0x1, "b44669746d"}, @NL80211_PKTPAT_MASK={0x2d, 0x1, "7a3b9c337ebc1ee85080fc74d176d1ca46a0455781419ee70b65697a15f6b5f867e1175d0c0438b0f8"}]}, {0x35c, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0x101, 0x1, "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"}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_PATTERN={0xd1, 0x2, "19489a76513692be004e21fbf9106805f0c7c28de3db73640217eddd1921d70fabdede77014030dbe8d8afa73e08f69c374038e261609b66626e0e4693eb414f51f1c2bd224ca2822c3afc8b6c001dfb9b1785bca23101cab9fa6db09597fc6fae9ad0c834cfce4c87a02e131f1b8c027ab1632920e47cd552c8a7f372e387e0e848b4267cab2688ef7a4dc76222e4f321d025e14e2f3d3fc41c9f50463a8d7c8b6d02a048e3a77eba9468231f3c8e6295969fb4b7981a0785f76e962334ec5d778ac154761b5c916b330897b4"}, @NL80211_PKTPAT_PATTERN={0x71, 0x2, "d72e0aad64131ab0fde6fb193a9711fd2a7710cb2550f93b0f5aaf83990d121237bbcff11855126acb1cd05bc29d818338a3c32e609ca56906984320fde0e0c6a3c38e2212bcd8238aa4a124467fabcc2bf36076e963aee3677755035f2015e84c964462eea65c3770d8b4954d"}, @NL80211_PKTPAT_MASK={0x11, 0x1, "c2a6d4369a4f1aea69d4123fbf"}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_PATTERN={0xdd, 0x2, "05e8ff9aa8768a18c5ae977e05c9eeb30eab6195f9d083e3deb468a9acb3631719fa8f90764328e2cad3a22a05a7e61fcbbc2727986ff7c9e8861de0e2ad2ef4911c3390fc0081caacefd845a2f0e401201957c468887fe055418030e64317d64a7a9e2161ecf4239da0e140e7a224c3cfed39e437a38ded4762144cf59c042c0afdfe27f1f2e73cb198bc9479aa60b23e1a172c89b4e3ff53c1015ef7ca780edc073bbfa389ff882e6be5dc82a8369ad363c8ecdd97c2b822483012197431ab64b8358a581f93a280d61663d9bf8c82121422b05f7ae27897"}]}, {0x210, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0x99, 0x1, "51c227178b6b23b2d55aa550e3e9913c9f67d1400e508187883c1fdfc247e0b6e7bd8add4e06c58f9f989c0a8ab87ce940cb835e63c76ceca075a1002eebf10dc1315f32f1f2254753eafb0455d9d71cdb32f87063de5640a3470142fda4875e58286329f136981cb4dd525bc9c55a51035e498821f9c00ff3d2a46a9664493a3b413ddb478848b363b8c62b5f8b71f64a48e9db6e"}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_MASK={0xad, 0x1, "4fda7228722fab46e1ce6fac7ca4d5b7f822db3ff751f3d2b0479039da6de9e5364a544203cf307d571b34f43391c61f65d7503142031bd938c30ca1701d3663e00fff6f4be5fbca33b4cf305fc7d0d05172346f0f1c1f2635e71a49d391ec5a6736e50dbebd024f1c8965ea45eb08c81cdbf3e870e1c97102432a5f62200c5aaa13e0c00309c78c8313b1eb54386a74730710f10ee9d992d28d61c8c1526ec923104d55967c290c1e"}, @NL80211_PKTPAT_PATTERN={0xb5, 0x2, "cb1c89854a1e4043ab2f1bf227f6f156295a92438695d0b1d284335f7d1067b55aa913892b61b1c4f5f979e9614dd0903e14bcc1577941c5df330cc421b9fcf0f15f161cde44591a016d8e71cba642148f08aa0bfa90b110d9d4d818404f31aa788bfd0867b98e623b43e2503a596c7d1b59e807dd6011a9b73a38c6718f1bee1acb79612b8c7d6e52de44105892d372060708fb14012f3d0011db51fae9d33283587d142b7949e422bc259c0ce2f78364"}]}, {0x14, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_OFFSET={0x8}]}, {0x2f4, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0x2ed, 0x1, "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"}]}]}]}]}, 0xc04}}, 0x0) syz_io_uring_setup(0x3602, &(0x7f0000000000), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 13:10:39 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) r2 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), 0x0) setregid(0x0, 0x0) r3 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000240)={{}, {}, [{}, {0x2, 0x0, 0xffffffffffffffff}], {}, [{}, {0x8, 0x0, 0xee00}, {}]}, 0x4c, 0x2) fcntl$setstatus(r0, 0x4, 0x4800) sendfile(r0, r1, 0x0, 0x8400fffffffa) 13:10:39 executing program 2: r0 = socket$inet(0x2, 0x3, 0x100) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @local}, 0xc) 13:10:39 executing program 2: syz_io_uring_setup(0x15b4, &(0x7f0000000340), &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f00000002c0)=0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xe, 0x200000000011, r2, 0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index}, 0x0) 13:10:39 executing program 1: sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000600)={0x14, 0x0, 0x0, 0x0, 0x25dfdbfb}, 0x14}}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0xfeb1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000000c0)="80810000007f", 0xfc3b, 0x1600}], 0x81, &(0x7f0000000180)={[{@errors_remount}]}) 13:10:39 executing program 5: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$inet_int(r0, 0x0, 0x19, &(0x7f0000000000)=0x85f, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000002540)={0x0, 0x0, 0x0}, 0x0) 13:10:39 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x66, 0xd9f, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) fdatasync(r0) readv(0xffffffffffffffff, &(0x7f0000001700)=[{0x0}], 0x1) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) io_setup(0x0, &(0x7f0000001640)) 13:10:39 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x12, 0x0, 0x0, 0x0, 0x0, "035b0000000000000000000000000000001000"}) 13:10:39 executing program 4: clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='syscall\x00') exit(0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) preadv(r0, &(0x7f00000002c0)=[{&(0x7f0000000300)=""/70, 0x46}], 0x1, 0x0, 0x0) 13:10:39 executing program 5: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) lsetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='security.selinux\x00', &(0x7f0000000180)='\x00\x00\x00\x00\x00\x00\x00\xbd', 0x8, 0x0) creat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) [ 651.625885][T30912] loop1: detected capacity change from 0 to 1051 [ 651.639570][T30912] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 651.685151][T30912] EXT4-fs (loop1): orphan cleanup on readonly fs [ 651.700266][T30912] EXT4-fs error (device loop1): ext4_quota_enable:6430: inode #3: comm syz-executor.1: iget: bad extra_isize 1536 (inode size 256) 13:10:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="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", 0x14b}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 651.715361][ T25] audit: type=1400 audit(1619961039.674:1132): avc: denied { dac_read_search } for pid=30927 comm="syz-executor.4" capability=2 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 651.741697][T30932] SELinux: Context is not valid (left unmapped). [ 651.760915][T30912] EXT4-fs (loop1): Remounting filesystem read-only [ 651.767566][T30912] EXT4-fs error (device loop1): ext4_quota_enable:6432: comm syz-executor.1: Bad quota inode # 3 13:10:39 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000340)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @private=0xa010100}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x108) getsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000000340)=""/225, &(0x7f0000000140)=0xe1) 13:10:39 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @private2}, 0x1c) [ 651.779324][T30912] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 651.793472][T30912] EXT4-fs (loop1): Cannot turn on quotas: error -117 [ 651.800159][T30912] EXT4-fs (loop1): mounted filesystem without journal. Opts: errors=remount-ro,. Quota mode: writeback. 13:10:40 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) r2 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), 0x0) setregid(0x0, 0x0) r3 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000240)={{}, {}, [{}, {0x2, 0x0, 0xffffffffffffffff}], {}, [{}, {0x8, 0x0, 0xee00}, {}]}, 0x4c, 0x2) fcntl$setstatus(r0, 0x4, 0x4800) sendfile(r0, r1, 0x0, 0x8400fffffffa) 13:10:40 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7a}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4b, &(0x7f0000000180)="c4c691019919da078a0098d1e0a593b040f710e7d5b925c099710cb6422ec536070ff7ae78886cb6508e094cf05f7512668917458e9f9694c0585fe8411e858d5f2eb3b53dd3d8f71b1cdf"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 13:10:40 executing program 5: pipe(&(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff}) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, 0x0, 0x0, 0xffffffffffffffff) 13:10:40 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)={[], [{@obj_role={'obj_role', 0x3d, '\x00a\x8b\x82Q\x9f\rk\xf0d\xf1\xa68dW\x12x\xaa\x1e\xf2\xc3h}^k\x05\xa1%G\x18hg\xce\xef+o\x9fa\xc1|T\xbd9\x9a?M\xf6K\xba\\\x19Y\x02\xf7\x17\xc0\x9e\x84\xee\xc0\xc8\xbb\xc6?\xedOl8j,\x8dl\xb9+\x87\x03r=xxo%\xa9po\x15\xba\x17\r\xd6!\r\x99\xb0\x198\xba2.\xad(\x15\xc3X\xe8o\xfd\x99\xe8\xcd\x12\xd7L\\\n\xabw)U\xfa\xec\xd2\xe8\xd3\x95\xdc\xc5\xba\x86\xf9\xb1\xcf\xbc\xe1\xdb\x96d{\x1d\x9b\xd8\x98\x9e\xfcR\x9f\x8f\x15\xa9\xb4\xa3g\x8a\xabLQ$\x9d\xaa\x9f\x91l\xe1\x9bOf\xb5\xf1\xb6;\x82/\xe2Zi\xbc\xd2u\x19(Z\x04\x9f\xde\x1f\xd0\xdf\x12\x93\xf9\x80\x9b\xe5 \xd71\xc4\xc5\x9ca\xd2\x9a\x18{\x84j\xc4'}}]}) 13:10:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_aout(r1, &(0x7f0000000980)={{}, "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"}, 0xc20) 13:10:40 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x24, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 13:10:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) unlink(&(0x7f0000000180)='./file0/file1\x00') rmdir(&(0x7f00000000c0)='./file0\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, 0x0, 0x0) 13:10:40 executing program 5: r0 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="240000001e0007021dfffd946f610500020003e8fe02080100010300040009000400ff7e", 0x24}], 0x1}, 0x0) 13:10:40 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000002, 0x3, 0x2) r1 = socket(0x40000000002, 0x3, 0x80000000002) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000140)='veth1_virt_wifi\x00', 0x10) setsockopt$inet_int(r1, 0x0, 0x4, &(0x7f0000000080), 0x4) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f0000000040)=0x9, 0x4) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0xfffffffffffffea7, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10000) 13:10:40 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) recvmmsg(r0, &(0x7f00000024c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 13:10:40 executing program 5: fspick(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0) [ 652.464124][T30965] tmpfs: Unknown parameter 'obj_role' [ 652.480054][T30965] tmpfs: Unknown parameter 'obj_role' [ 652.487318][T30981] netlink: 'syz-executor.5': attribute type 9 has an invalid length. 13:10:40 executing program 3: timer_create(0x0, &(0x7f0000000440)={0x0, 0x12}, &(0x7f0000000040)) r0 = syz_open_dev$usbmon(&(0x7f0000000380), 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x4018920a, &(0x7f0000000180)={0x0, 0x0}) r1 = getpid() timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000000)) tkill(r1, 0x800000015) 13:10:41 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) r2 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), 0x0) setregid(0x0, 0x0) r3 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000240)={{}, {}, [{}, {0x2, 0x0, 0xffffffffffffffff}], {}, [{}, {0x8, 0x0, 0xee00}, {}]}, 0x4c, 0x2) fcntl$setstatus(r0, 0x4, 0x4800) sendfile(r0, r1, 0x0, 0x8400fffffffa) 13:10:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x1eb142, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ftruncate(r3, 0x2008001) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x9) 13:10:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r1, 0x0, r3, 0x0, 0x8000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="5500000018007f7d00fe01b2a4a280930a600000fca84302910000003900090020000c0003", 0x25}], 0x1}, 0x0) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0x31731add) 13:10:41 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141842, 0x0) sendfile(r2, r2, 0x0, 0x0) 13:10:41 executing program 1: pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000180)="ccb86bfd74707827f0a7e131600a1695cd33121189c2f66c8c6f", 0x1a}], 0x3, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x120, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 13:10:41 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141842, 0x0) sendfile(r2, r2, 0x0, 0x0) 13:10:41 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmmsg$inet6(r0, &(0x7f00000042c0)=[{{&(0x7f0000000300)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}}, {{&(0x7f0000000ac0)={0xa, 0x4e21, 0x0, @remote, 0x9}, 0x1c, 0x0, 0x0, &(0x7f0000004500)=[@pktinfo={{0x24, 0x29, 0x32, {@private1, r2}}}], 0x28}}], 0x2, 0x0) 13:10:41 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000000)=@dstopts, 0x8) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, 0x0, 0x0) 13:10:41 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f0000000040)=ANY=[], 0x8) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4052, r0, 0x0) mlock2(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0) munlock(&(0x7f0000003000/0x2000)=nil, 0x2000) 13:10:41 executing program 4: pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) vmsplice(r0, &(0x7f0000001440)=[{0x0}, {&(0x7f00000011c0)="fd", 0x200011c1}], 0x2, 0x0) 13:10:41 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141842, 0x0) sendfile(r2, r2, 0x0, 0x0) 13:10:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x40841, 0x9, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) mkdir(&(0x7f0000000480)='./file0\x00', 0x12b) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc0185879, &(0x7f0000000080)) r2 = socket$inet_udp(0x2, 0x2, 0x0) ppoll(&(0x7f0000000380)=[{}, {r0, 0x2000}, {0xffffffffffffffff, 0x4}, {r2, 0x4244}], 0x4, &(0x7f00000003c0), &(0x7f0000000400)={[0x100000001]}, 0x8) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x8100, 0x0) setxattr$incfs_metadata(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000100), &(0x7f0000000240)="667e7e1fa0c3dc83ad56672aa943bb5ba172483a449c19b7909b0eeaff4cd1fcb30346274710a91fd9d63a1b78534eefc216d4356d5cf9fec20b1ddc2f049749e2b274609515a437069b80186a392d6fa7d0bf97d052974eb53d5473bd2691521a33456444ddc5c30a5a666e4fea448668ba263873cb23c4aed701cc8a5514685a4e31d6a60affd5bff1da8a066d9b328cbafef484ed8aafec54df136317cca280b87722800581e8440a4cf51f4cf4e32bb595a6b32023ec0faa53a6d39d423e809eeb14f281564a87481c661d08143563b4fbd24d533d71e3aeb2b7bb493f07f4db6f9d14beb04967c651f54995c10a", 0xf0, 0x3) ioctl$LOOP_SET_DIRECT_IO(r3, 0x4c08, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x8800, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x26, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r4 = memfd_create(&(0x7f0000000600)='secur\x8dty.se|\xfcH\x9c\'}\x00\xcbu\x00\x00q\x10B\x90\xda\x882\x14\xd6\x9a\x8eic\xd4N\t\xea\r0\x963\x8aR\xd1\xb6J\xbb\a\x8d\x1b\x90\x90\x13,\x93wc\x11k\x17\x9c\xad>\x05\xcf\xb5\xe1X\xbbH\x91f\xa6T\x00\x00\x00\x00\xbdr\xe2\xbbT\x15F$\xc0?\x89\xb6\xecP\xba\xac\xca=\xea\xa0\xbb\xf1\xd7\x05\xc1\xec$E#\xc6\x8cI5\x13\xca\x1dg\x95\xb3I\xed\xaam\x92\x96q\x05\x00\xe4\x95\x1d0\xd8\xa3\xe0\xe8XD\xa5\xc1\x8c\xa2\xe0HM\xa5\xd2AH&\x12\x1f\x10\xe9\n\xae\x0e7Y\xc6^\xe0l\x06A\xd2\xc4\xe5c\xea\"#\xca\xbdBQ\x90\x99E\x10)N\xddKd\xe31\x99`\xbf*\x10\xee\x80\x04\xc0I\x81\xc1\x0e\xfe\xc5i\xa5\xbb\x18\xa2\x93\x191V\xbd,\xbb\xb5\xea\xfeZ\x1e\xc9\x94\xe5\xc8fnz\xe5\xa0F\x8a\xe6\x87\xaa\x9d\xd4\xe4\xad\xbe\x8a;\xe2\xba\xff\x1c\\\x9fU\xdf\xa4\x93\xb25\x9e\xdf\xb4\xee\xab)\x7f\xdd\x00\xef\x83$\xe6\xeb49=\x00\x00\xd1\xc0\xf0\xce\x91P;\xa2$\x93\x13\xdef\xdd\x8d\xf3\x14+{\xf6\x9e\xb0\xf1\xf2sf\xaf\x95\x8b\xe5\xf0\xdc\xdf7\xad\xb9#mz\xebW\x10[\xb0Bq\xa8\xfa^\xe7\xc9\x14q\xf7\a\xe1\xb0z.K\xa15\x84\xcd', 0x0) pwrite64(r4, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r4, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') umount2(&(0x7f00000005c0)='./file0/../file0\x00', 0x0) 13:10:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x40841, 0x9, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) mkdir(&(0x7f0000000480)='./file0\x00', 0x12b) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc0185879, &(0x7f0000000080)) r2 = socket$inet_udp(0x2, 0x2, 0x0) ppoll(&(0x7f0000000380)=[{}, {r0, 0x2000}, {0xffffffffffffffff, 0x4}, {r2, 0x4244}], 0x4, &(0x7f00000003c0), &(0x7f0000000400)={[0x100000001]}, 0x8) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x8100, 0x0) setxattr$incfs_metadata(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000100), &(0x7f0000000240)="667e7e1fa0c3dc83ad56672aa943bb5ba172483a449c19b7909b0eeaff4cd1fcb30346274710a91fd9d63a1b78534eefc216d4356d5cf9fec20b1ddc2f049749e2b274609515a437069b80186a392d6fa7d0bf97d052974eb53d5473bd2691521a33456444ddc5c30a5a666e4fea448668ba263873cb23c4aed701cc8a5514685a4e31d6a60affd5bff1da8a066d9b328cbafef484ed8aafec54df136317cca280b87722800581e8440a4cf51f4cf4e32bb595a6b32023ec0faa53a6d39d423e809eeb14f281564a87481c661d08143563b4fbd24d533d71e3aeb2b7bb493f07f4db6f9d14beb04967c651f54995c10a", 0xf0, 0x3) ioctl$LOOP_SET_DIRECT_IO(r3, 0x4c08, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x8800, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x26, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r4 = memfd_create(&(0x7f0000000600)='secur\x8dty.se|\xfcH\x9c\'}\x00\xcbu\x00\x00q\x10B\x90\xda\x882\x14\xd6\x9a\x8eic\xd4N\t\xea\r0\x963\x8aR\xd1\xb6J\xbb\a\x8d\x1b\x90\x90\x13,\x93wc\x11k\x17\x9c\xad>\x05\xcf\xb5\xe1X\xbbH\x91f\xa6T\x00\x00\x00\x00\xbdr\xe2\xbbT\x15F$\xc0?\x89\xb6\xecP\xba\xac\xca=\xea\xa0\xbb\xf1\xd7\x05\xc1\xec$E#\xc6\x8cI5\x13\xca\x1dg\x95\xb3I\xed\xaam\x92\x96q\x05\x00\xe4\x95\x1d0\xd8\xa3\xe0\xe8XD\xa5\xc1\x8c\xa2\xe0HM\xa5\xd2AH&\x12\x1f\x10\xe9\n\xae\x0e7Y\xc6^\xe0l\x06A\xd2\xc4\xe5c\xea\"#\xca\xbdBQ\x90\x99E\x10)N\xddKd\xe31\x99`\xbf*\x10\xee\x80\x04\xc0I\x81\xc1\x0e\xfe\xc5i\xa5\xbb\x18\xa2\x93\x191V\xbd,\xbb\xb5\xea\xfeZ\x1e\xc9\x94\xe5\xc8fnz\xe5\xa0F\x8a\xe6\x87\xaa\x9d\xd4\xe4\xad\xbe\x8a;\xe2\xba\xff\x1c\\\x9fU\xdf\xa4\x93\xb25\x9e\xdf\xb4\xee\xab)\x7f\xdd\x00\xef\x83$\xe6\xeb49=\x00\x00\xd1\xc0\xf0\xce\x91P;\xa2$\x93\x13\xdef\xdd\x8d\xf3\x14+{\xf6\x9e\xb0\xf1\xf2sf\xaf\x95\x8b\xe5\xf0\xdc\xdf7\xad\xb9#mz\xebW\x10[\xb0Bq\xa8\xfa^\xe7\xc9\x14q\xf7\a\xe1\xb0z.K\xa15\x84\xcd', 0x0) pwrite64(r4, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r4, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') umount2(&(0x7f00000005c0)='./file0/../file0\x00', 0x0) 13:10:42 executing program 4: r0 = fsopen(&(0x7f0000000000)='debugfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, 0x0, 0x0, 0x0) 13:10:42 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141842, 0x0) sendfile(r2, r2, 0x0, 0x0) 13:10:42 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_buf(r0, 0x29, 0x11, 0x0, &(0x7f0000000500)) 13:10:42 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSBRK(r1, 0x5418, 0x4af000) 13:10:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)={0x1c, 0x12, 0x60d, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x1d, 0x0, 0x0, @pid}]}]}, 0x1c}], 0x1}, 0x0) 13:10:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x40841, 0x9, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) mkdir(&(0x7f0000000480)='./file0\x00', 0x12b) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc0185879, &(0x7f0000000080)) r2 = socket$inet_udp(0x2, 0x2, 0x0) ppoll(&(0x7f0000000380)=[{}, {r0, 0x2000}, {0xffffffffffffffff, 0x4}, {r2, 0x4244}], 0x4, &(0x7f00000003c0), &(0x7f0000000400)={[0x100000001]}, 0x8) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x8100, 0x0) setxattr$incfs_metadata(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000100), &(0x7f0000000240)="667e7e1fa0c3dc83ad56672aa943bb5ba172483a449c19b7909b0eeaff4cd1fcb30346274710a91fd9d63a1b78534eefc216d4356d5cf9fec20b1ddc2f049749e2b274609515a437069b80186a392d6fa7d0bf97d052974eb53d5473bd2691521a33456444ddc5c30a5a666e4fea448668ba263873cb23c4aed701cc8a5514685a4e31d6a60affd5bff1da8a066d9b328cbafef484ed8aafec54df136317cca280b87722800581e8440a4cf51f4cf4e32bb595a6b32023ec0faa53a6d39d423e809eeb14f281564a87481c661d08143563b4fbd24d533d71e3aeb2b7bb493f07f4db6f9d14beb04967c651f54995c10a", 0xf0, 0x3) ioctl$LOOP_SET_DIRECT_IO(r3, 0x4c08, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x8800, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x26, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r4 = memfd_create(&(0x7f0000000600)='secur\x8dty.se|\xfcH\x9c\'}\x00\xcbu\x00\x00q\x10B\x90\xda\x882\x14\xd6\x9a\x8eic\xd4N\t\xea\r0\x963\x8aR\xd1\xb6J\xbb\a\x8d\x1b\x90\x90\x13,\x93wc\x11k\x17\x9c\xad>\x05\xcf\xb5\xe1X\xbbH\x91f\xa6T\x00\x00\x00\x00\xbdr\xe2\xbbT\x15F$\xc0?\x89\xb6\xecP\xba\xac\xca=\xea\xa0\xbb\xf1\xd7\x05\xc1\xec$E#\xc6\x8cI5\x13\xca\x1dg\x95\xb3I\xed\xaam\x92\x96q\x05\x00\xe4\x95\x1d0\xd8\xa3\xe0\xe8XD\xa5\xc1\x8c\xa2\xe0HM\xa5\xd2AH&\x12\x1f\x10\xe9\n\xae\x0e7Y\xc6^\xe0l\x06A\xd2\xc4\xe5c\xea\"#\xca\xbdBQ\x90\x99E\x10)N\xddKd\xe31\x99`\xbf*\x10\xee\x80\x04\xc0I\x81\xc1\x0e\xfe\xc5i\xa5\xbb\x18\xa2\x93\x191V\xbd,\xbb\xb5\xea\xfeZ\x1e\xc9\x94\xe5\xc8fnz\xe5\xa0F\x8a\xe6\x87\xaa\x9d\xd4\xe4\xad\xbe\x8a;\xe2\xba\xff\x1c\\\x9fU\xdf\xa4\x93\xb25\x9e\xdf\xb4\xee\xab)\x7f\xdd\x00\xef\x83$\xe6\xeb49=\x00\x00\xd1\xc0\xf0\xce\x91P;\xa2$\x93\x13\xdef\xdd\x8d\xf3\x14+{\xf6\x9e\xb0\xf1\xf2sf\xaf\x95\x8b\xe5\xf0\xdc\xdf7\xad\xb9#mz\xebW\x10[\xb0Bq\xa8\xfa^\xe7\xc9\x14q\xf7\a\xe1\xb0z.K\xa15\x84\xcd', 0x0) pwrite64(r4, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r4, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') umount2(&(0x7f00000005c0)='./file0/../file0\x00', 0x0) 13:10:42 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE(r0, 0x5000940e, 0x0) 13:10:42 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSBRK(r1, 0x5418, 0x4af000) 13:10:42 executing program 0: unshare(0x6c060000) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000018c0)="1c0000001200050f0ca6760000ee53c6ce0ffb299d49b23e9b200a00089f36b878220724e59b4786e36bbe65d7b96e4161b0a242563fefdc437c632071d191cfe58d6875069935cbb3bf3dda5e55d1b6", 0x50, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000400)=""/4096, 0x7e, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x2, 0x0) sendto$inet6(r1, &(0x7f00000000c0)="1ba0000010001d0200fdc5cbdd041d8e828003000000000001a7960fab0fc8da78031c6660b08f00003f71aced466b4644434a88fed7d75725e1069e42dc4b3844e5fb82bb02fec770967c740c00000000d02830b5a4c01a92317320f0c0a5adb7b5b8bf255f1a8dffa8", 0xfe0b, 0x40800, 0x0, 0xffffffffffffff95) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r3, &(0x7f0000000000)=""/35, 0xffffffffffffff13, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r4 = accept4(r2, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) sendto$inet6(r3, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x808b0000, 0x0, 0x600000000000004) 13:10:42 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$nl_sock_diag(0x10, 0x3, 0x4) bind$netlink(r2, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x4899f0c5f1feceb6}, 0xc) close(r1) 13:10:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/meminfo\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="1e0000005e00", 0x6) write$binfmt_misc(r2, &(0x7f0000000180)=ANY=[], 0xfffffc7b) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 13:10:42 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSBRK(r1, 0x5418, 0x4af000) 13:10:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x40841, 0x9, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) mkdir(&(0x7f0000000480)='./file0\x00', 0x12b) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc0185879, &(0x7f0000000080)) r2 = socket$inet_udp(0x2, 0x2, 0x0) ppoll(&(0x7f0000000380)=[{}, {r0, 0x2000}, {0xffffffffffffffff, 0x4}, {r2, 0x4244}], 0x4, &(0x7f00000003c0), &(0x7f0000000400)={[0x100000001]}, 0x8) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x8100, 0x0) setxattr$incfs_metadata(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000100), &(0x7f0000000240)="667e7e1fa0c3dc83ad56672aa943bb5ba172483a449c19b7909b0eeaff4cd1fcb30346274710a91fd9d63a1b78534eefc216d4356d5cf9fec20b1ddc2f049749e2b274609515a437069b80186a392d6fa7d0bf97d052974eb53d5473bd2691521a33456444ddc5c30a5a666e4fea448668ba263873cb23c4aed701cc8a5514685a4e31d6a60affd5bff1da8a066d9b328cbafef484ed8aafec54df136317cca280b87722800581e8440a4cf51f4cf4e32bb595a6b32023ec0faa53a6d39d423e809eeb14f281564a87481c661d08143563b4fbd24d533d71e3aeb2b7bb493f07f4db6f9d14beb04967c651f54995c10a", 0xf0, 0x3) ioctl$LOOP_SET_DIRECT_IO(r3, 0x4c08, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x8800, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x26, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r4 = memfd_create(&(0x7f0000000600)='secur\x8dty.se|\xfcH\x9c\'}\x00\xcbu\x00\x00q\x10B\x90\xda\x882\x14\xd6\x9a\x8eic\xd4N\t\xea\r0\x963\x8aR\xd1\xb6J\xbb\a\x8d\x1b\x90\x90\x13,\x93wc\x11k\x17\x9c\xad>\x05\xcf\xb5\xe1X\xbbH\x91f\xa6T\x00\x00\x00\x00\xbdr\xe2\xbbT\x15F$\xc0?\x89\xb6\xecP\xba\xac\xca=\xea\xa0\xbb\xf1\xd7\x05\xc1\xec$E#\xc6\x8cI5\x13\xca\x1dg\x95\xb3I\xed\xaam\x92\x96q\x05\x00\xe4\x95\x1d0\xd8\xa3\xe0\xe8XD\xa5\xc1\x8c\xa2\xe0HM\xa5\xd2AH&\x12\x1f\x10\xe9\n\xae\x0e7Y\xc6^\xe0l\x06A\xd2\xc4\xe5c\xea\"#\xca\xbdBQ\x90\x99E\x10)N\xddKd\xe31\x99`\xbf*\x10\xee\x80\x04\xc0I\x81\xc1\x0e\xfe\xc5i\xa5\xbb\x18\xa2\x93\x191V\xbd,\xbb\xb5\xea\xfeZ\x1e\xc9\x94\xe5\xc8fnz\xe5\xa0F\x8a\xe6\x87\xaa\x9d\xd4\xe4\xad\xbe\x8a;\xe2\xba\xff\x1c\\\x9fU\xdf\xa4\x93\xb25\x9e\xdf\xb4\xee\xab)\x7f\xdd\x00\xef\x83$\xe6\xeb49=\x00\x00\xd1\xc0\xf0\xce\x91P;\xa2$\x93\x13\xdef\xdd\x8d\xf3\x14+{\xf6\x9e\xb0\xf1\xf2sf\xaf\x95\x8b\xe5\xf0\xdc\xdf7\xad\xb9#mz\xebW\x10[\xb0Bq\xa8\xfa^\xe7\xc9\x14q\xf7\a\xe1\xb0z.K\xa15\x84\xcd', 0x0) pwrite64(r4, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r4, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') umount2(&(0x7f00000005c0)='./file0/../file0\x00', 0x0) 13:10:42 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req={0x8000, 0x7fffffff, 0x3400, 0xfffffffe}, 0x10) 13:10:42 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSBRK(r1, 0x5418, 0x4af000) [ 654.334402][T31096] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 654.361830][T31096] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 13:10:42 executing program 2: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsopen(0x0, 0x0) gettid() ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:10:42 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x7ffffffff007, 0x3, &(0x7f0000ffc000/0x2000)=nil) 13:10:42 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000100)="5500000018007fd500fe01b2a4a280930a06000000a843089100fe803900070008000c000f0000002d0010009b2c136ef75afb83de448daa72540d8102d2c55327c43ab82286ef1fdd20652383656d4d24", 0x51}, {&(0x7f0000000080)="02044911", 0x4}], 0x2}, 0x0) [ 654.383248][T31096] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 654.401291][T31096] netlink: 40027 bytes leftover after parsing attributes in process `syz-executor.0'. [ 654.411871][T31096] device lo entered promiscuous mode 13:10:42 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000b00)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@empty, @in, 0x0, 0x0, 0x0, 0x0, 0x2}, {@in6=@ipv4={'\x00', '\xff\xff', @broadcast}, 0x0, 0x33}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'digest_null\x00'}}}]}, 0x138}}, 0x0) 13:10:42 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x42, &(0x7f00000a2000)={0x0, 0x0}, 0x10) [ 654.438979][T31096] device sit0 entered promiscuous mode [ 654.449680][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 654.474189][T31137] sock: sock_set_timeout: `syz-executor.1' (pid 31137) tries to set negative timeout [ 655.147083][T31143] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 655.156375][T31143] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 655.166276][T31096] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 655.177242][T31096] netlink: 40027 bytes leftover after parsing attributes in process `syz-executor.0'. [ 655.187522][T31096] device lo entered promiscuous mode [ 655.193678][T31096] device sit0 entered promiscuous mode 13:10:43 executing program 0: setitimer(0x2, &(0x7f0000000040)={{0x77359400}, {0x77359400}}, 0x0) setitimer(0x2, &(0x7f0000000080)={{}, {0x77359400}}, 0x0) 13:10:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) nanosleep(&(0x7f0000000140)={0x0, r2+60000000}, 0x0) tkill(r1, 0x1000000000016) ioctl$BTRFS_IOC_RM_DEV(0xffffffffffffffff, 0x5000940b, 0x0) 13:10:43 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)={0x0, "9878b2521f9ca780b603255ac6244e6da2d9073a5232a013fe5f1a8d441a559917666fbd0f3c1c5c478afd88c10315aa69ead89b0f0384986d266360764b52f0"}, 0x48, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) 13:10:43 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) sendto(r0, &(0x7f00000043c0)="f6c266e236e494f4507a2b5888ca", 0x1000e, 0x0, &(0x7f0000003fc0)=@nfc_llcp={0x27, 0x1, 0x0, 0x0, 0x0, 0x0, "0d5cc678d5a03e2e1ea58691f2c9812ab97b5ea9bf106bda6b3e78b13cb31485f7dbc87541c83e369d94cc2fcb40e1b31b89b66b37730a7039742828329cda"}, 0x80) 13:10:43 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x7ffffffff007, 0x3, &(0x7f0000ffc000/0x2000)=nil) 13:10:43 executing program 4: r0 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000580)="ff", 0x1, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$user(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x2}, &(0x7f00000001c0)="e3", 0x1, r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000140)='asymmetric\x00', &(0x7f0000000200)=@chain) keyctl$link(0x8, r0, r1) 13:10:43 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = timerfd_create(0x0, 0x0) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18}, 0x0) 13:10:43 executing program 1: r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = epoll_create1(0x0) r3 = dup3(r1, r2, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setns(r3, 0x40000000) 13:10:43 executing program 4: r0 = socket(0x2, 0x3, 0x8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'lo\x00', &(0x7f0000000000)=ANY=[@ANYBLOB='K\x00\x00\x00/']}) 13:10:43 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x7ffffffff007, 0x3, &(0x7f0000ffc000/0x2000)=nil) 13:10:43 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000180)="9000000019001f2fb9409b52ffff65580200be04020c060560000b02430005000900000000c8388827a685a168d0bf47d32345653602648dcaaf6c26c291214549935ade4a460c20b6ec0cff3959547f500f58ba86c902000f1d012e02000280160012000a000000000000000000000000080000000eceb6b362bb944cf2e70100aba4183b003e5fa424ac4d31c4f7a1", 0x90, 0x0, 0x0, 0x0) 13:10:43 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000100)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000000040)=""/141, 0x8d}], 0x2, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r4, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff7f, 0x0, 0x0, 0x0) recvfrom$inet6(r4, &(0x7f0000000000)=""/60, 0x3c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000000)="480500001400", 0x6}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r3, 0x0, 0x200000000e228, 0x0) 13:10:43 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x7ffffffff007, 0x3, &(0x7f0000ffc000/0x2000)=nil) [ 655.364610][T31186] netlink: 'syz-executor.4': attribute type 5 has an invalid length. [ 655.372817][T31186] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 655.414815][T31193] netlink: 1276 bytes leftover after parsing attributes in process `syz-executor.0'. 13:10:43 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r0, &(0x7f0000003cc0)=[{{&(0x7f0000000000)=@nfc_llcp={0x27, 0x1, 0x0, 0x0, 0x0, 0x0, "f24449bcdd3091f9f47c4508ff69769d82b98e8a5724328e868a476fb2c561824f10e921d8f44bb219f0a6863f6134e2d3e0bae534b6794827a3e7dc294690"}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000180)="9b1101a97985471496bfa05cec54", 0xe}], 0x1}}, {{&(0x7f0000000280)=@nfc_llcp={0x27, 0x1, 0x0, 0x0, 0x0, 0x0, "7fa719745ce702ea3e48293d25a4bf9df223497c83bf755175e9fda54241ac0561c4ed4ecfa59b93485993899e9b77d1b9a2cc6eed20b02f3a4d0dea2a2668"}, 0x80, 0x0, 0x0, &(0x7f0000001c80)=[@mark={{0x14}}, @timestamping={{0x14, 0x1, 0x25, 0xb50}}], 0x30}}], 0x2, 0x0) 13:10:43 executing program 3: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file2\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e5", 0x1, 0x600}], 0x0, &(0x7f0000001bc0)=ANY=[]) 13:10:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000013c0)={0x1ec4, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x208, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0xf8, 0x3, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ':\x00'}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '[#%\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '-+[+-\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '*&\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xe1b}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffe1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2119}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '+\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '$\xdf\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x800}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_VALUE={0x103, 0x4, "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"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c28, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x9}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x62, 0x4, "647ebc33dfd5facd1d83f8e1c9330ca1b4041c79da83e4edf92f7cf8341c59d42dc213ada0b1a0e00b1923982c4ab7cb2bbb5585642e76e0c1ec697d66d664777676c561eb07d1b7d7d490d5a70dabe72af8970d03837947a174878c97f9"}, @ETHTOOL_A_BITSET_MASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x2d, 0x5, "652bde45c9487c119f5cf13c4aef8c6ea4c7e614842b0e3661abe655de82da6567ba2de55d9855a0ea"}, @ETHTOOL_A_BITSET_VALUE={0x1004, 0x4, "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"}, @ETHTOOL_A_BITSET_VALUE={0xb79, 0x4, "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"}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x4}]}, 0x1ec4}, 0x1, 0x0, 0x0, 0x4000}, 0x80) 13:10:43 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000001c0)=@updsa={0x184, 0x1a, 0x1, 0x0, 0x0, {{@in6=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in=@broadcast, 0x0, 0x6c}, @in, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_comp={0x48, 0x3, {{'lzs\x00'}}}, @algo_aead={0x4c, 0x12, {{'rfc7539esp(ecb(camellia),blake2s-256)\x00'}}}]}, 0x184}}, 0x0) 13:10:43 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') preadv(r1, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000240)=""/248, 0xf8}], 0x4, 0x0, 0x0) 13:10:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06000000010000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) close(r1) 13:10:43 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/keys\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 13:10:43 executing program 4: r0 = gettid() capset(&(0x7f0000000300)={0x19980330, r0}, &(0x7f0000000340)) 13:10:43 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) creat(&(0x7f0000df1000)='./file0/bus\x00', 0xbc9dc8fbd81cb4a0) creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) 13:10:43 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xb, 0x0, 0x0) [ 655.686451][T31209] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 655.705648][T31209] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 655.727454][T31217] loop3: detected capacity change from 0 to 6 [ 655.747128][T31209] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 655.768434][T31227] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 655.800902][T31217] FAT-fs (loop3): Directory bread(block 6) failed 13:10:44 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000100)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000000040)=""/141, 0x8d}], 0x2, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r4, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff7f, 0x0, 0x0, 0x0) recvfrom$inet6(r4, &(0x7f0000000000)=""/60, 0x3c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000000)="480500001400", 0x6}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r3, 0x0, 0x200000000e228, 0x0) 13:10:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$inet6(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000000)="480500001500", 0x6}], 0x1) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x200000000622c, 0x0) 13:10:44 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000080)='./file0\x00') fchdir(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 13:10:44 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) sendmsg(r0, &(0x7f0000000340)={&(0x7f0000000180)=@qipcrtr={0x2a, 0x2}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="6ec097be2e682bfa918dcec9b9dd7902000000009c00000020027fffffffd4f66fc479d2a736fca1", 0x28}], 0x1}, 0x0) 13:10:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06000000010000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) close(r1) 13:10:44 executing program 3: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file2\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e5", 0x1, 0x600}], 0x0, &(0x7f0000001bc0)=ANY=[]) 13:10:44 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) sendmsg(r0, &(0x7f0000000340)={&(0x7f0000000180)=@qipcrtr={0x2a, 0x2}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="6ec097be2e682bfa918dcec9b9dd7902000000009c00000020027fffffffd4f66fc479d2a736fca1", 0x28}], 0x1}, 0x0) 13:10:44 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fgetxattr(r1, &(0x7f0000000080)=@known='system.sockprotoname\x00', &(0x7f0000001b00)=""/4096, 0x1000) 13:10:44 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) sendmsg(r0, &(0x7f0000000340)={&(0x7f0000000180)=@qipcrtr={0x2a, 0x2}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="6ec097be2e682bfa918dcec9b9dd7902000000009c00000020027fffffffd4f66fc479d2a736fca1", 0x28}], 0x1}, 0x0) [ 656.234882][T31248] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 656.269552][T31248] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 656.274282][T31253] loop3: detected capacity change from 0 to 6 13:10:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06000000010000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) close(r1) 13:10:44 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fgetxattr(r1, &(0x7f0000000080)=@known='system.sockprotoname\x00', &(0x7f0000001b00)=""/4096, 0x1000) 13:10:44 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) sendmsg(r0, &(0x7f0000000340)={&(0x7f0000000180)=@qipcrtr={0x2a, 0x2}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="6ec097be2e682bfa918dcec9b9dd7902000000009c00000020027fffffffd4f66fc479d2a736fca1", 0x28}], 0x1}, 0x0) [ 656.298275][T31253] FAT-fs (loop3): Directory bread(block 6) failed [ 656.327813][T31269] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 656.337301][T31269] netlink: 'syz-executor.5': attribute type 4 has an invalid length. 13:10:45 executing program 3: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file2\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e5", 0x1, 0x600}], 0x0, &(0x7f0000001bc0)=ANY=[]) 13:10:45 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000100)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000000040)=""/141, 0x8d}], 0x2, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r4, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff7f, 0x0, 0x0, 0x0) recvfrom$inet6(r4, &(0x7f0000000000)=""/60, 0x3c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000000)="480500001400", 0x6}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r3, 0x0, 0x200000000e228, 0x0) 13:10:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06000000010000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) close(r1) 13:10:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fgetxattr(r1, &(0x7f0000000080)=@known='system.sockprotoname\x00', &(0x7f0000001b00)=""/4096, 0x1000) 13:10:45 executing program 2: set_mempolicy(0x1, &(0x7f0000000180)=0xc5f, 0xa) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x64, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}]}, 0x64}}, 0x0) 13:10:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$inet6(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000000)="480500001500", 0x6}], 0x1) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x200000000622c, 0x0) 13:10:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fgetxattr(r1, &(0x7f0000000080)=@known='system.sockprotoname\x00', &(0x7f0000001b00)=""/4096, 0x1000) 13:10:45 executing program 2: r0 = eventfd2(0xffffffff, 0x0) write$eventfd(r0, &(0x7f0000000040)=0xfffffffffffffffa, 0x8) write$eventfd(r0, &(0x7f00000002c0)=0xfffffffffffffff9, 0x8) read$eventfd(r0, &(0x7f0000000000), 0x8) [ 657.128416][T31289] loop3: detected capacity change from 0 to 6 [ 657.135526][T31293] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 657.139693][T31289] FAT-fs (loop3): Directory bread(block 6) failed 13:10:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1808, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:10:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) r1 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000040), 0x440, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) 13:10:45 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000005c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) clock_getres(0x0, 0x0) 13:10:45 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8955, &(0x7f0000000040)={{0x2, 0x0, @loopback}, {0x304, @dev}, 0x0, {0x2, 0x0, @multicast1}}) [ 657.231159][ T25] audit: type=1326 audit(1619961045.175:1133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=31311 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 13:10:45 executing program 3: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file2\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000180)="e5", 0x1, 0x600}], 0x0, &(0x7f0000001bc0)=ANY=[]) [ 657.271515][ T25] audit: type=1326 audit(1619961045.175:1134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=31311 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=229 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 657.295873][ T25] audit: type=1326 audit(1619961045.175:1135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=31311 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 657.320443][ T25] audit: type=1326 audit(1619961045.175:1136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=31311 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=157 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 657.344872][ T25] audit: type=1326 audit(1619961045.195:1137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=31311 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 657.391229][T31328] loop3: detected capacity change from 0 to 6 [ 657.403200][T31328] FAT-fs (loop3): Directory bread(block 6) failed 13:10:45 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000100)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000000040)=""/141, 0x8d}], 0x2, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r4, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff7f, 0x0, 0x0, 0x0) recvfrom$inet6(r4, &(0x7f0000000000)=""/60, 0x3c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000000)="480500001400", 0x6}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r3, 0x0, 0x200000000e228, 0x0) 13:10:45 executing program 5: setrlimit(0x7, &(0x7f0000000000)={0x0, 0x80000001}) 13:10:45 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) tee(r1, r0, 0x3, 0x0) close(r0) close(r2) 13:10:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) r1 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000040), 0x440, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) 13:10:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$inet6(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000000)="480500001500", 0x6}], 0x1) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x200000000622c, 0x0) 13:10:45 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xd}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005780)=[{{0x0, 0x0, 0x0}, 0x1de5}, {{0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f0000000140)=""/159, 0x9f}, {&(0x7f00000002c0)=""/98, 0x62}, {&(0x7f0000000340)=""/126, 0x7e}, {&(0x7f00000000c0)=""/23, 0x17}, {&(0x7f00000003c0)=""/121, 0x79}, {&(0x7f0000000440)=""/87, 0x57}, {&(0x7f00000004c0)=""/4096, 0x1000}], 0x7, &(0x7f0000001540)=""/75, 0x4b}, 0x3}, {{&(0x7f00000015c0)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f0000002780)=[{&(0x7f0000005940)=""/158, 0x9e}, {&(0x7f0000001700)=""/86, 0x56}, {&(0x7f0000001780)=""/4096, 0x1000}, {&(0x7f0000000200)=""/16, 0x10}], 0x4}, 0x7}, {{&(0x7f00000027c0)=@ipx, 0x80, &(0x7f0000002a80)=[{&(0x7f0000002840)=""/1, 0x1}, {&(0x7f0000002880)=""/224, 0xe0}, {&(0x7f0000002980)=""/228, 0xe4}], 0x3}, 0x1ff}, {{&(0x7f0000002ac0)=@caif=@rfm, 0x80, &(0x7f0000003040)=[{&(0x7f0000002c00)=""/154, 0x9a}, {&(0x7f0000002b40)=""/113, 0x71}, {&(0x7f0000002cc0)=""/130, 0x82}, {0x0}, {&(0x7f0000002dc0)=""/168, 0xa8}, {&(0x7f0000002e80)=""/70, 0x46}, {&(0x7f0000002f00)=""/141, 0x8d}, {&(0x7f0000002fc0)=""/89, 0x59}], 0x8, &(0x7f00000030c0)=""/4096, 0x1000}, 0x5}, {{&(0x7f00000040c0)=@l2={0x1f, 0x0, @none}, 0x80, &(0x7f0000005400)=[{&(0x7f0000004140)=""/11, 0xb}, {&(0x7f0000004180)=""/4096, 0x1000}, {&(0x7f0000005180)=""/149, 0x95}, {&(0x7f0000005240)=""/253, 0xfd}, {&(0x7f0000005340)=""/155, 0x9b}], 0x5}, 0x1}, {{&(0x7f0000005480)=@caif, 0x80, &(0x7f0000005640)=[{&(0x7f0000005500)=""/188, 0xbc}, {&(0x7f0000005600)=""/38, 0x26}], 0x2, &(0x7f0000005680)=""/253, 0xfd}, 0x9}], 0x7, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6(0xa, 0x3, 0x3) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x1}, 0x1c) fcntl$setpipe(r2, 0x407, 0x6) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x6}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='net/vlan/config\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 13:10:46 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) 13:10:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) r1 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000040), 0x440, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) 13:10:46 executing program 3: set_mempolicy(0x1, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 13:10:46 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0xffffffffffffffff, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001440)="66530700ae897094e7b126b097eaa769bc", 0x11}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 13:10:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) r1 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000040), 0x440, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) 13:10:46 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r2 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@mcast2, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x32}, 0x0, @in=@private, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffd}}, 0xe8) sendmmsg(r2, &(0x7f0000000480), 0x2e9, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 13:10:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="66530700010000800000000097eaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134f", 0x4d}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 13:10:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$inet6(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000000)="480500001500", 0x6}], 0x1) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x200000000622c, 0x0) 13:10:46 executing program 0: r0 = timerfd_create(0x0, 0x0) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1) timerfd_settime(r0, 0x0, &(0x7f00000000c0)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x387b1d0849078267, 0x8031, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000000)=0xc, 0x5, 0x0) mremap(&(0x7f0000369000/0x1000)=nil, 0x1000, 0x1000, 0x0, &(0x7f00000cb000/0x1000)=nil) 13:10:46 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) fstat(r1, &(0x7f00000024c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, r2) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000440)={0x1, 0x0, 0x8, 0x13, 0x128, 0x0}) 13:10:46 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x124, &(0x7f0000000440)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 13:10:46 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000000)='./file0/file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) unlink(&(0x7f00000000c0)='./file0/file0\x00') r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(r1, &(0x7f00000004c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r2 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) 13:10:46 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) 13:10:47 executing program 0: r0 = timerfd_create(0x0, 0x0) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1) timerfd_settime(r0, 0x0, &(0x7f00000000c0)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x387b1d0849078267, 0x8031, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000000)=0xc, 0x5, 0x0) mremap(&(0x7f0000369000/0x1000)=nil, 0x1000, 0x1000, 0x0, &(0x7f00000cb000/0x1000)=nil) 13:10:47 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), r1) sendmsg$NLBL_MGMT_C_REMOVE(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x98, r2, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_IPV4MASK={0x8}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @dev}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, '@$:\x00'}, @NLBL_MGMT_A_IPV6MASK={0xfffffffffffffce5, 0x6, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast2}, @NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @private2}, @NLBL_MGMT_A_IPV4MASK={0x0, 0x8, @private}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @local}]}, 0x98}}, 0x0) [ 659.374029][T31422] __nla_validate_parse: 7 callbacks suppressed [ 659.374040][T31422] netlink: 96 bytes leftover after parsing attributes in process `syz-executor.5'. [ 659.401103][T31423] netlink: 96 bytes leftover after parsing attributes in process `syz-executor.5'. 13:10:49 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x0, 0x0, 0x1, 0x9, 0x6, 0x401}, 0x20) 13:10:49 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), r1) sendmsg$NLBL_MGMT_C_REMOVE(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x98, r2, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_IPV4MASK={0x8}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @dev}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, '@$:\x00'}, @NLBL_MGMT_A_IPV6MASK={0xfffffffffffffce5, 0x6, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast2}, @NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @private2}, @NLBL_MGMT_A_IPV4MASK={0x0, 0x8, @private}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @local}]}, 0x98}}, 0x0) 13:10:49 executing program 0: r0 = timerfd_create(0x0, 0x0) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1) timerfd_settime(r0, 0x0, &(0x7f00000000c0)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x387b1d0849078267, 0x8031, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000000)=0xc, 0x5, 0x0) mremap(&(0x7f0000369000/0x1000)=nil, 0x1000, 0x1000, 0x0, &(0x7f00000cb000/0x1000)=nil) [ 661.219430][T31428] netlink: 96 bytes leftover after parsing attributes in process `syz-executor.5'. 13:10:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="66530700010000800000000097eaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134f", 0x4d}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 13:10:49 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendto$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x11, 0x8848, r3, 0x1, 0x0, 0x6, @dev}, 0x14) 13:10:49 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) 13:10:49 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x0, 0x0, 0x1, 0x9, 0x6, 0x401}, 0x20) 13:10:49 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), r1) sendmsg$NLBL_MGMT_C_REMOVE(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x98, r2, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_IPV4MASK={0x8}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @dev}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, '@$:\x00'}, @NLBL_MGMT_A_IPV6MASK={0xfffffffffffffce5, 0x6, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast2}, @NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @private2}, @NLBL_MGMT_A_IPV4MASK={0x0, 0x8, @private}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @local}]}, 0x98}}, 0x0) 13:10:49 executing program 0: r0 = timerfd_create(0x0, 0x0) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1) timerfd_settime(r0, 0x0, &(0x7f00000000c0)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x387b1d0849078267, 0x8031, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000000)=0xc, 0x5, 0x0) mremap(&(0x7f0000369000/0x1000)=nil, 0x1000, 0x1000, 0x0, &(0x7f00000cb000/0x1000)=nil) 13:10:49 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), r1) sendmsg$NLBL_MGMT_C_REMOVE(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x98, r2, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_IPV4MASK={0x8}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @dev}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, '@$:\x00'}, @NLBL_MGMT_A_IPV6MASK={0xfffffffffffffce5, 0x6, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast2}, @NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @private2}, @NLBL_MGMT_A_IPV4MASK={0x0, 0x8, @private}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @local}]}, 0x98}}, 0x0) 13:10:49 executing program 4: pselect6(0x98, &(0x7f0000000180), &(0x7f00000001c0)={0x2}, 0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) [ 661.924386][T31440] netlink: 96 bytes leftover after parsing attributes in process `syz-executor.5'. 13:10:49 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x0, 0x0, 0x1, 0x9, 0x6, 0x401}, 0x20) 13:10:49 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x80000000}], 0x0) 13:10:49 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00') write$cgroup_int(r0, &(0x7f00000000c0)=0x81, 0x12) [ 661.969332][T31447] netlink: 96 bytes leftover after parsing attributes in process `syz-executor.5'. 13:10:49 executing program 4: syz_open_procfs(0x0, &(0x7f0000000200)='uid_map\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) fchdir(r0) r2 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = memfd_create(&(0x7f0000000340)='\x00\xc2\xea\x99\xbb\x1c\xf8jw\x97\x05\xa3\xa2\'\xdd\xe4q\xbf\t\x8c\xe0\x19\xe5\xbcJ6\xfc\xa8\xcdj\xc1F\x02\x93\xca`\x8e\x00\x00\x00\x00\x00\x00\x00\x00\x00\b \xff\x13\x96\xe3?\xdfH\x8c\xe4V\xe2\xfe\v8\x04\xa5\xb9\xc4:\xf3\xf6y_w\xd8\xcf\x90k\x05\x00\xf9\x1e\xe8m\xec\x12\xa015\xc2\xb3u|K\x111\xd4\f8\xeb\x18\xad\xbb!1\x85\x96P\x1b\xa1\x9a\x81\xf8\xb1\xecB)\xe5\xaa7\xfe\xdd,_D\xe5|\xb1j^\xaec}\x1a\xb4\x17\xafP\x85I\xd5\xa0I\xb0\xaf\xb5\x8b\\\x05\xd7g\xcbV\x8e\xd0\xac\x87I7\xbd\xc6\x9bI\x92\xb2\x87.\xb3\x1fs\xe7%\xdd+\r\xb4\x117\xa7ei~\xb8\x16\xd1P\xf2\x84\x89K\x16\xd0F|\xa3\x89\xc9~9\x00\x00\x00\x00\x00\x00\x00', 0x0) write(r3, &(0x7f00000000c0)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r3, 0x0) r4 = inotify_init1(0x0) inotify_add_watch(r4, &(0x7f0000000040)='./file0\x00', 0xc40001e1) creat(&(0x7f0000000040)='./file0\x00', 0x0) 13:10:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="66530700010000800000000097eaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134f", 0x4d}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 13:10:52 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)={0x44, 0x1, 0x1, 0x401, 0x0, 0x0, {0xa}, [@CTA_TUPLE_REPLY={0x30, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @private0}}}]}]}, 0x44}}, 0x0) 13:10:52 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x3, 0x2) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000002040000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x0, &(0x7f0000013b00)) 13:10:52 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x0, 0x0, 0x1, 0x9, 0x6, 0x401}, 0x20) 13:10:52 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) 13:10:52 executing program 5: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) unshare(0x8000400) r0 = mq_open(&(0x7f0000000080)='m$\x00\xdc\xb7\xb8\xd0>,\xb0\x13\x8b3z>K\x84\x05\x00\x00\x00\x9c\x81\xed\xc2\x00', 0x6e93ebbbcc0884ee, 0x0, 0x0) unshare(0x8020000) fork() perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) r2 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000240)={@empty, @ipv4={'\x00', '\xff\xff', @remote}, @private0, 0x0, 0x6, 0x0, 0x0, 0x100, 0x20c200a2, r5}) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20, 0x8, @private2, 0x80000000}, 0x1c) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000440)={{{@in=@initdev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f00000000c0)=0xe8) ioctl$sock_inet6_SIOCDELRT(r6, 0x890c, &(0x7f00000002c0)={@private1={0xfc, 0x1, '\x00', 0x1}, @loopback, @private2={0xfc, 0x2, '\x00', 0x1}, 0x5, 0x5, 0x1, 0x400, 0x4, 0x40000010, r7}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/59, 0x3b}, {&(0x7f0000000380)=""/152, 0x98}, {&(0x7f0000000140)=""/62, 0x3e}], 0x3, 0x1, 0x8) 13:10:52 executing program 0: unshare(0x20020600) r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c03, 0x0) 13:10:52 executing program 4: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x2081fc) r1 = open(&(0x7f0000000200)='./bus\x00', 0x10103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x2201) 13:10:52 executing program 5: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) unshare(0x8000400) r0 = mq_open(&(0x7f0000000080)='m$\x00\xdc\xb7\xb8\xd0>,\xb0\x13\x8b3z>K\x84\x05\x00\x00\x00\x9c\x81\xed\xc2\x00', 0x6e93ebbbcc0884ee, 0x0, 0x0) unshare(0x8020000) fork() perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) r2 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000240)={@empty, @ipv4={'\x00', '\xff\xff', @remote}, @private0, 0x0, 0x6, 0x0, 0x0, 0x100, 0x20c200a2, r5}) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20, 0x8, @private2, 0x80000000}, 0x1c) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000440)={{{@in=@initdev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f00000000c0)=0xe8) ioctl$sock_inet6_SIOCDELRT(r6, 0x890c, &(0x7f00000002c0)={@private1={0xfc, 0x1, '\x00', 0x1}, @loopback, @private2={0xfc, 0x2, '\x00', 0x1}, 0x5, 0x5, 0x1, 0x400, 0x4, 0x40000010, r7}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/59, 0x3b}, {&(0x7f0000000380)=""/152, 0x98}, {&(0x7f0000000140)=""/62, 0x3e}], 0x3, 0x1, 0x8) 13:10:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}, {&(0x7f0000000100)=""/25, 0x19}, {&(0x7f0000000180)}], 0x3, 0x9, 0x8000) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x800}) r3 = syz_open_pts(r2, 0x2) sendfile(r3, r1, 0x0, 0x6f0a77bd) 13:10:52 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@loopback, 0x0, 0x0, 0x2000000000903, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x1}, 0x20) 13:10:52 executing program 0: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000000), 0x8) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000040)="ff0204000000000100000000000000000000000000000205", 0x18) 13:10:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="66530700010000800000000097eaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134f", 0x4d}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 13:10:55 executing program 5: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) unshare(0x8000400) r0 = mq_open(&(0x7f0000000080)='m$\x00\xdc\xb7\xb8\xd0>,\xb0\x13\x8b3z>K\x84\x05\x00\x00\x00\x9c\x81\xed\xc2\x00', 0x6e93ebbbcc0884ee, 0x0, 0x0) unshare(0x8020000) fork() perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) r2 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000240)={@empty, @ipv4={'\x00', '\xff\xff', @remote}, @private0, 0x0, 0x6, 0x0, 0x0, 0x100, 0x20c200a2, r5}) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20, 0x8, @private2, 0x80000000}, 0x1c) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000440)={{{@in=@initdev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f00000000c0)=0xe8) ioctl$sock_inet6_SIOCDELRT(r6, 0x890c, &(0x7f00000002c0)={@private1={0xfc, 0x1, '\x00', 0x1}, @loopback, @private2={0xfc, 0x2, '\x00', 0x1}, 0x5, 0x5, 0x1, 0x400, 0x4, 0x40000010, r7}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/59, 0x3b}, {&(0x7f0000000380)=""/152, 0x98}, {&(0x7f0000000140)=""/62, 0x3e}], 0x3, 0x1, 0x8) 13:10:55 executing program 4: r0 = gettid() fork() waitid(0x0, 0x0, &(0x7f00000001c0), 0x2, 0x0) rt_sigqueueinfo(r0, 0x7, &(0x7f0000000000)={0x0, 0x0, 0xffffffff}) 13:10:55 executing program 0: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000000), 0x8) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000040)="ff0204000000000100000000000000000000000000000205", 0x18) 13:10:55 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "05ab32eb4999b6f842521b6c8b3cdac82632ba"}) 13:10:55 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = fsopen(&(0x7f0000001e00)='cgroup\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x4, &(0x7f0000000000)='none\x00', &(0x7f0000000040)='}}@{%\\F[){/@)*\')\x00', 0x0) 13:10:55 executing program 0: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000000), 0x8) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000040)="ff0204000000000100000000000000000000000000000205", 0x18) 13:10:55 executing program 5: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) unshare(0x8000400) r0 = mq_open(&(0x7f0000000080)='m$\x00\xdc\xb7\xb8\xd0>,\xb0\x13\x8b3z>K\x84\x05\x00\x00\x00\x9c\x81\xed\xc2\x00', 0x6e93ebbbcc0884ee, 0x0, 0x0) unshare(0x8020000) fork() perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) r2 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000240)={@empty, @ipv4={'\x00', '\xff\xff', @remote}, @private0, 0x0, 0x6, 0x0, 0x0, 0x100, 0x20c200a2, r5}) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20, 0x8, @private2, 0x80000000}, 0x1c) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000440)={{{@in=@initdev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f00000000c0)=0xe8) ioctl$sock_inet6_SIOCDELRT(r6, 0x890c, &(0x7f00000002c0)={@private1={0xfc, 0x1, '\x00', 0x1}, @loopback, @private2={0xfc, 0x2, '\x00', 0x1}, 0x5, 0x5, 0x1, 0x400, 0x4, 0x40000010, r7}) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/59, 0x3b}, {&(0x7f0000000380)=""/152, 0x98}, {&(0x7f0000000140)=""/62, 0x3e}], 0x3, 0x1, 0x8) 13:10:55 executing program 3: set_mempolicy(0x1, 0x0, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000300)={{0x0, 0x2}}) 13:10:55 executing program 2: r0 = syz_io_uring_setup(0x15b4, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000040)=0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffff9c, 0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, {0x0, r3}}, 0x0) setuid(0x0) io_uring_enter(r0, 0x77af, 0x0, 0x0, 0x0, 0x0) 13:10:55 executing program 0: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000000), 0x8) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000040)="ff0204000000000100000000000000000000000000000205", 0x18) 13:10:55 executing program 2: r0 = syz_io_uring_setup(0x15b4, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000040)=0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffff9c, 0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, {0x0, r3}}, 0x0) setuid(0x0) io_uring_enter(r0, 0x77af, 0x0, 0x0, 0x0, 0x0) 13:10:58 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7a}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x49, &(0x7f0000000180)="c4c691019919da078a0098d1e0a593b040f710e7d5b925c099710cb6422ec536070ff7ae78886cb6508e094cf05f7512668917458e9f9694c0585fe8411e858d5f2eb3b53dd3d8f71b"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 13:10:58 executing program 5: io_setup(0x80, &(0x7f0000000080)=0x0) pipe(&(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff}) io_submit(r0, 0x2, &(0x7f0000000140)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}, 0x0]) 13:10:58 executing program 3: set_mempolicy(0x1, 0x0, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000300)={{0x0, 0x2}}) 13:10:58 executing program 2: r0 = syz_io_uring_setup(0x15b4, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000040)=0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffff9c, 0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, {0x0, r3}}, 0x0) setuid(0x0) io_uring_enter(r0, 0x77af, 0x0, 0x0, 0x0, 0x0) 13:10:58 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000300)={{0x0, 0x2}}) 13:10:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@dev}, 0x14) 13:10:58 executing program 2: r0 = syz_io_uring_setup(0x15b4, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000040)=0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffff9c, 0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, {0x0, r3}}, 0x0) setuid(0x0) io_uring_enter(r0, 0x77af, 0x0, 0x0, 0x0, 0x0) 13:10:58 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000300)={{0x0, 0x2}}) 13:10:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800003, 0x12, r0, 0x2000) mlock(&(0x7f0000009000/0x3000)=nil, 0x3000) mlock(&(0x7f0000008000/0x3000)=nil, 0x3000) 13:10:58 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'lo\x00', &(0x7f0000000100)=@ethtool_cmd={0x4c}}) 13:10:58 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) unshare(0x40000400) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x10012, r0, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, 0x0, &(0x7f0000000080)) 13:10:58 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000300)={{0x0, 0x2}}) 13:10:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)={0x20, r1, 0x1, 0x0, 0x0, {0x1c}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x20}}, 0x0) 13:10:59 executing program 1: mknod(&(0x7f0000000300)='./file0\x00', 0x1040, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) perf_event_open(0x0, r0, 0xe, 0xffffffffffffffff, 0x2) timer_create(0x0, &(0x7f0000000280)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) creat(&(0x7f0000000240)='./file0\x00', 0x0) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) unlink(&(0x7f0000000140)='./file0\x00') acct(&(0x7f0000000100)='./file0\x00') r1 = gettid() tkill(r1, 0x1000000000016) 13:10:59 executing program 3: set_mempolicy(0x1, 0x0, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000300)={{0x0, 0x2}}) 13:10:59 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x1000367, 0x8501) fallocate(r0, 0x11, 0x0, 0x100007e00) 13:10:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)={0x20, r1, 0x1, 0x0, 0x0, {0x1c}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x20}}, 0x0) 13:10:59 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_getevents(r0, 0x3, 0x3, &(0x7f0000001780)=[{}, {}, {}], 0x0) io_destroy(r0) 13:10:59 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0) 13:10:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)={0x20, r1, 0x1, 0x0, 0x0, {0x1c}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x20}}, 0x0) 13:10:59 executing program 2: syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@fat=@tz_utc}, {@shortname_lower}, {@uni_xlateno}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@pcr}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@fsmagic}, {@uid_gt={'uid>', 0xee01}}, {@appraise_type}, {@fowner_gt}, {@fscontext={'fscontext', 0x22, 'staff_u'}}]}) 13:10:59 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x1d, &(0x7f0000000180)={'filter\x00', 0x2, [{}, {}]}, 0x48) 13:10:59 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040), 0x102, 0x0) write$vga_arbiter(r0, &(0x7f0000000080)=@target={'target ', {'PCI:', '0', ':', 'f', ':', 'a', '.', '16'}}, 0x14) 13:10:59 executing program 3: set_mempolicy(0x1, 0x0, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000300)={{0x0, 0x2}}) 13:10:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)={0x20, r1, 0x1, 0x0, 0x0, {0x1c}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x20}}, 0x0) 13:10:59 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x40, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 13:10:59 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/181, 0xb5}], 0x1) write$binfmt_aout(r1, &(0x7f0000000540)=ANY=[], 0x120) 13:10:59 executing program 2: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x6000, 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@filename='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='ext2\x00', 0x0, 0x0) 13:10:59 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x1080830, &(0x7f0000000780)={[{@gid={'gid', 0x3d, 0xee00}}]}) 13:10:59 executing program 4: setregid(0xffffffffffffffff, 0xffffffffffffffff) 13:10:59 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=@updsa={0x138, 0x1a, 0x1, 0x0, 0x0, {{@in=@private, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, {@in6=@local, 0x0, 0x6c}, @in, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 13:10:59 executing program 2: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x6000, 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@filename='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='ext2\x00', 0x0, 0x0) [ 671.341047][ T969] blk_update_request: I/O error, dev loop5, sector 2 op 0x0:(READ) flags 0x1000 phys_seg 1 prio class 0 [ 671.352345][T31612] EXT4-fs (loop5): unable to read superblock [ 671.369546][ T969] blk_update_request: I/O error, dev loop5, sector 2 op 0x0:(READ) flags 0x1000 phys_seg 1 prio class 0 [ 671.380940][T31611] EXT4-fs (loop5): unable to read superblock 13:10:59 executing program 1: r0 = io_uring_setup(0x1f, &(0x7f0000000000)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 13:10:59 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) sendmmsg(r2, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x0) writev(r2, &(0x7f0000000580)=[{&(0x7f0000000340)="ac", 0x1}], 0x1) recvfrom(r1, 0x0, 0xf0ff7f, 0x0, 0x0, 0x0) 13:10:59 executing program 2: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x6000, 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@filename='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='ext2\x00', 0x0, 0x0) [ 671.411901][ T969] blk_update_request: I/O error, dev loop5, sector 2 op 0x0:(READ) flags 0x1000 phys_seg 1 prio class 0 [ 671.428379][T31630] EXT4-fs (loop5): unable to read superblock 13:10:59 executing program 1: set_mempolicy(0x6002, &(0x7f0000000040)=0x1, 0x200) r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc) 13:10:59 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket(0x20000000000000a, 0x2, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) getsockopt$sock_buf(r0, 0x1, 0x19, &(0x7f0000e530e9)=""/16, &(0x7f0000000000)=0x170) 13:10:59 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00N\xca\t\xc3\xf2\xee\f\xd8l\x0e\xbe%\xa8W\xd9\x04L\x99<\xf9\xf1\x96\x84\x8a\x1aU!\xdf\n\xe9\xdav\x85\xa2\xef\xaf\x8e\xe6\xd8\\\x0f\xfcrO\x93\x14\xd8\x8b\x06\xc1\xcaH\xcfGI\xeb;\xfb\x06\x00\x00\x00\x00\x00\x00\x00\xd9\b\x00\x00\x00\x00\x00\x003\xffR\xa6\x9c\x9a\xb5JX\x9e\xe2\xe5u_\xa5\x8c\x11\xdfP\xd1H8\n\xbah\x94R+\xa9\xa6\xf0\x9e?!0\x1a\x84', 0x0) write(r0, &(0x7f00000004c0)='1', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) r1 = socket(0x2, 0x2, 0x0) getsockopt$sock_timeval(r1, 0x1, 0x1, 0x0, &(0x7f0000000300)) 13:10:59 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) ioctl$TCSBRKP(r0, 0x5409, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) write$binfmt_elf32(r0, &(0x7f0000002480)=ANY=[@ANYBLOB="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"], 0xa93) 13:10:59 executing program 2: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x6000, 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@filename='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='ext2\x00', 0x0, 0x0) 13:10:59 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0x10, 0x3, 0x0) read(r3, &(0x7f0000000300)=""/256, 0x100) sendto$inet6(r3, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff3b, 0x0, 0x0, 0x0) recvfrom$inet6(r3, &(0x7f0000000000)=""/36, 0x24, 0x0, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000000)="48050000150019", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x200000000622c, 0x0) 13:10:59 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsu(0x0, 0x0, 0x0) mmap(&(0x7f000044f000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0xff09b000) dup3(r2, r2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x200000, 0x8) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000300)="00032000", 0x4, 0xfffffffffffffffb) [ 671.493913][ T969] blk_update_request: I/O error, dev loop5, sector 2 op 0x0:(READ) flags 0x1000 phys_seg 1 prio class 0 [ 671.505318][T31641] EXT4-fs (loop5): unable to read superblock 13:10:59 executing program 5: io_setup(0x80, &(0x7f0000000080)=0x0) pipe(&(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff}) io_submit(r0, 0x1, &(0x7f0000000500)=[&(0x7f0000000100)={0x0, 0x0, 0x2, 0x3, 0x0, r1, 0x0}]) 13:10:59 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001140)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001840)={0x0, 0x0, 0x0, 0x40000}, 0x0) 13:10:59 executing program 1: perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000200)='/dev/autkfs\x00R!8c\xfa\x1d\xf5\\\xd1\xb3\t\xaaB\t\xdc\xd2\xd6\x9c\xea\xf0!C\xc9h\x95w', 0x10000005) [ 671.574934][ T969] blk_update_request: I/O error, dev loop5, sector 2 op 0x0:(READ) flags 0x1000 phys_seg 1 prio class 0 [ 671.579295][T31661] dns_resolver: Unsupported content type (3) [ 671.586285][T31654] EXT4-fs (loop5): unable to read superblock [ 671.678736][T31669] netlink: 1308 bytes leftover after parsing attributes in process `syz-executor.4'. 13:11:00 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) ioctl$TCSBRKP(r0, 0x5409, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) write$binfmt_elf32(r0, &(0x7f0000002480)=ANY=[@ANYBLOB="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"], 0xa93) 13:11:00 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000000000)=0x4, 0x4) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) r1 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) recvmmsg(r0, &(0x7f0000002280)=[{{0x0, 0x0, 0x0}}], 0x300, 0x43, 0x0) 13:11:00 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETMODE(r0, 0x4b4b, 0xfffffffffffffffd) 13:11:00 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0xa7ec756d31d4fd44) 13:11:00 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) ioctl$TCSBRKP(r0, 0x5409, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) write$binfmt_elf32(r0, &(0x7f0000002480)=ANY=[@ANYBLOB="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"], 0xa93) 13:11:00 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) ioctl$TCXONC(r0, 0x540a, 0x2) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010000000001000"}) r2 = syz_open_dev$vcsa(0x0, 0x200, 0x41) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r3, 0xc0709411, 0x0) clone(0x22086605, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) munmap(&(0x7f0000bda000/0x3000)=nil, 0x3000) fork() wait4(0x0, 0x0, 0x0, 0x0) clone(0x0, &(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="42d50066603bfdf23f620d6f470670ef37741d580528d9d1bfb66a8a5eced6f87570d1ae88258de461b4292ebaefa1496647de9b5cdd3d1805813b996e14d7a639448b811bb8ce941c69032a6d5c19a46043474fe686d8c5960a070d5113f45ff4f0fd30322db82c0613b116f36efab3e5aafe4b4963920e48949dd349813ebc5e805c38197415e3c18d93d0d094169e7cb3123f76d30fdf9e90b25ee071d4238e5e1c19a86d6f590b549d6ff544d25f24b298aee7b9bdeef6b4ba") ftruncate(r2, 0x1a5) sendfile(r1, r2, &(0x7f0000000000)=0x8, 0x4) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000040)={0x4, 0xfde, 0xff05, 0x7f, 0x3, "85e36af0cbd5e68c"}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0xca, 0x80000001, 0x0, 0x868, 0x0, "c767bb7dcb113f50e7a7bcc13cbb6142c6beb4"}) 13:11:00 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x101}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000100), 0x0) 13:11:00 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0x10, 0x3, 0x0) read(r3, &(0x7f0000000300)=""/256, 0x100) sendto$inet6(r3, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff3b, 0x0, 0x0, 0x0) recvfrom$inet6(r3, &(0x7f0000000000)=""/36, 0x24, 0x0, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000000)="48050000150019", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x200000000622c, 0x0) 13:11:00 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) ioctl$TCSBRKP(r0, 0x5409, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) write$binfmt_elf32(r0, &(0x7f0000002480)=ANY=[@ANYBLOB="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"], 0xa93) 13:11:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000040)='./file1\x00', 0x0, 0x319f011, 0x0) mount(0x0, &(0x7f0000000280)='./file1\x00', 0x0, 0x3400a4, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 13:11:00 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) ioctl$TCXONC(r0, 0x540a, 0x2) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010000000001000"}) r2 = syz_open_dev$vcsa(0x0, 0x200, 0x41) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r3, 0xc0709411, 0x0) clone(0x22086605, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) munmap(&(0x7f0000bda000/0x3000)=nil, 0x3000) fork() wait4(0x0, 0x0, 0x0, 0x0) clone(0x0, &(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="42d50066603bfdf23f620d6f470670ef37741d580528d9d1bfb66a8a5eced6f87570d1ae88258de461b4292ebaefa1496647de9b5cdd3d1805813b996e14d7a639448b811bb8ce941c69032a6d5c19a46043474fe686d8c5960a070d5113f45ff4f0fd30322db82c0613b116f36efab3e5aafe4b4963920e48949dd349813ebc5e805c38197415e3c18d93d0d094169e7cb3123f76d30fdf9e90b25ee071d4238e5e1c19a86d6f590b549d6ff544d25f24b298aee7b9bdeef6b4ba") ftruncate(r2, 0x1a5) sendfile(r1, r2, &(0x7f0000000000)=0x8, 0x4) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000040)={0x4, 0xfde, 0xff05, 0x7f, 0x3, "85e36af0cbd5e68c"}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0xca, 0x80000001, 0x0, 0x868, 0x0, "c767bb7dcb113f50e7a7bcc13cbb6142c6beb4"}) 13:11:00 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) sendmmsg$inet6(r0, &(0x7f0000000300)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c, 0x0, 0x0, &(0x7f0000002340)=[@dontfrag={{0x14}}, @rthdrdstopts={{0x10, 0x29, 0x4}}, @dontfrag={{0x14}}], 0x48}}], 0x2, 0x0) 13:11:00 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) ioctl$TCSBRKP(r0, 0x5409, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) write$binfmt_elf32(r0, &(0x7f0000002480)=ANY=[@ANYBLOB="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"], 0xa93) 13:11:00 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) ioctl$TCXONC(r0, 0x540a, 0x2) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010000000001000"}) r2 = syz_open_dev$vcsa(0x0, 0x200, 0x41) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r3, 0xc0709411, 0x0) clone(0x22086605, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) munmap(&(0x7f0000bda000/0x3000)=nil, 0x3000) fork() wait4(0x0, 0x0, 0x0, 0x0) clone(0x0, &(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="42d50066603bfdf23f620d6f470670ef37741d580528d9d1bfb66a8a5eced6f87570d1ae88258de461b4292ebaefa1496647de9b5cdd3d1805813b996e14d7a639448b811bb8ce941c69032a6d5c19a46043474fe686d8c5960a070d5113f45ff4f0fd30322db82c0613b116f36efab3e5aafe4b4963920e48949dd349813ebc5e805c38197415e3c18d93d0d094169e7cb3123f76d30fdf9e90b25ee071d4238e5e1c19a86d6f590b549d6ff544d25f24b298aee7b9bdeef6b4ba") ftruncate(r2, 0x1a5) sendfile(r1, r2, &(0x7f0000000000)=0x8, 0x4) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000040)={0x4, 0xfde, 0xff05, 0x7f, 0x3, "85e36af0cbd5e68c"}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0xca, 0x80000001, 0x0, 0x868, 0x0, "c767bb7dcb113f50e7a7bcc13cbb6142c6beb4"}) 13:11:00 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0201a6ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa60000000900000087771f72003007000500000000000000008000ca55aa", 0x40, 0x1c0}]) 13:11:00 executing program 0: perf_event_open(&(0x7f0000000080)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 672.553574][T31722] netlink: 1308 bytes leftover after parsing attributes in process `syz-executor.4'. 13:11:00 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) ioctl$TCSBRKP(r0, 0x5409, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) write$binfmt_elf32(r0, &(0x7f0000002480)=ANY=[@ANYBLOB="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"], 0xa93) 13:11:00 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) ioctl$TCXONC(r0, 0x540a, 0x2) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010000000001000"}) r2 = syz_open_dev$vcsa(0x0, 0x200, 0x41) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r3, 0xc0709411, 0x0) clone(0x22086605, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) munmap(&(0x7f0000bda000/0x3000)=nil, 0x3000) fork() wait4(0x0, 0x0, 0x0, 0x0) clone(0x0, &(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="42d50066603bfdf23f620d6f470670ef37741d580528d9d1bfb66a8a5eced6f87570d1ae88258de461b4292ebaefa1496647de9b5cdd3d1805813b996e14d7a639448b811bb8ce941c69032a6d5c19a46043474fe686d8c5960a070d5113f45ff4f0fd30322db82c0613b116f36efab3e5aafe4b4963920e48949dd349813ebc5e805c38197415e3c18d93d0d094169e7cb3123f76d30fdf9e90b25ee071d4238e5e1c19a86d6f590b549d6ff544d25f24b298aee7b9bdeef6b4ba") ftruncate(r2, 0x1a5) sendfile(r1, r2, &(0x7f0000000000)=0x8, 0x4) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000040)={0x4, 0xfde, 0xff05, 0x7f, 0x3, "85e36af0cbd5e68c"}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0xca, 0x80000001, 0x0, 0x868, 0x0, "c767bb7dcb113f50e7a7bcc13cbb6142c6beb4"}) 13:11:01 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000340)="5500000018007f5f14fe01b2a49b909302060402000a1301041614053900090035000c07010000001900054000600055060022dc131a014883139b84134ef75adb83de4411000b00", 0x48}, {&(0x7f0000000040)="000000100000000026501a1784", 0xd}], 0x2, 0x0, 0x0, 0xf000000}, 0x0) 13:11:01 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCFLSH(r0, 0x5416, 0x970000000000) 13:11:01 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0x10, 0x3, 0x0) read(r3, &(0x7f0000000300)=""/256, 0x100) sendto$inet6(r3, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff3b, 0x0, 0x0, 0x0) recvfrom$inet6(r3, &(0x7f0000000000)=""/36, 0x24, 0x0, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000000)="48050000150019", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x200000000622c, 0x0) 13:11:01 executing program 1: r0 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="240000001a0007041dfffd946f610500020200e8fe020801003d080008000d000400ff7e", 0x24}], 0x1}, 0x0) 13:11:01 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) getpid() clone(0x0, &(0x7f0000000200), 0x0, 0x0, 0x0) 13:11:01 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) ioctl$TCSBRKP(r0, 0x5409, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) write$binfmt_elf32(r0, &(0x7f0000002480)=ANY=[@ANYBLOB="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"], 0xa93) 13:11:01 executing program 5: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, 0x0, 0x0) writev(r0, &(0x7f0000001680)=[{&(0x7f00000001c0)='\n', 0x1}], 0x1) 13:11:01 executing program 2: clock_adjtime(0x9f71dcf3, &(0x7f0000000000)) 13:11:01 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000080), 0x4) 13:11:01 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x131, &(0x7f0000000900)="c4c69101a219da3643bf168384924fe41e52ffffff7fc5d61abc6cd1b3dd80000098d3e0a5fc79c0fe7282987364e69e6fe42ff9373a5efaa8b507c946a8cc45edef31ede99a1af0f0824f0b47f42bf98adf49a9f092b0dfc95e6bdf88ce57f97c69df8c00000000d109a542b558356b3dafa9f8657bbfc245c5ed4446bcd6c8146f85d9f04ec60802b102424c7bad28ffb4e7904942cc575ba851c65cb6def4ad4fc7ff71e86915ad4b9374c6f11f19c4a018af00838f8dd196fddad6e63b0093034ec558cd17d1e85e298abdaf98b19126b1812411389f692b2875438ba4008537a3337d52c5e56a7ec6a954e0ce599fe9c0fb280cf17aeb5154882cad8309b78e0d77e57ad014b22ba9e833ed5b3f6438b37a4b40e08272faa214b567d3403bce77b4e479dfefdf6f6ed169b8333769"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x17) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x40) 13:11:01 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x57, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000040)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x4142, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) getxattr(0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0x82) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r3, r2, 0x0, 0xa198) sendfile(r1, r0, 0x0, 0xa198) 13:11:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x12c, &(0x7f0000000440)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 13:11:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x12c, &(0x7f0000000440)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689c9c6a47312334c2a97ac2b7f0fb4aabebae8dc5dffbcd48a70502173d6efa56b60f48cf0c9d0989ecbbfc220bd2b39df9ad8d6b14910f4a869863009780dd6e673a02f7ed829932929af9dffb1fa2cd7328202ac55f4f5dbb8494120f79d5f60958691a8a3fcf561c33f46ab89803f47d97e04f7bf9cafb006ae29480408c8380cf060dd72462ccc5b7d195a113bc539df6591cd574a02d4d9b9f3ebce31bd7582018ded8ceb71e75417dabc45f9fa0503befdcd0874ae979bc9581d6a854d4dfb7ffaed09bfcf330c365988c05e12ed069a42c964f79e16ad22f95ffaf5a1d4200b030d0b7b170051b850b78b196b00f0ffff72ac058a66ea2614ba"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) [ 673.448740][T31757] netlink: 1312 bytes leftover after parsing attributes in process `syz-executor.4'. 13:11:02 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0x10, 0x3, 0x0) read(r3, &(0x7f0000000300)=""/256, 0x100) sendto$inet6(r3, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff3b, 0x0, 0x0, 0x0) recvfrom$inet6(r3, &(0x7f0000000000)=""/36, 0x24, 0x0, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000000)="48050000150019", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x200000000622c, 0x0) 13:11:02 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000001c40)=[{{&(0x7f0000000680)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x2c}}}, 0x1c, 0x0}}], 0x1, 0x0) 13:11:02 executing program 0: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x404, 0x0, 0x0, 0x0, 0x206}}], 0x1, 0x0, 0x0) epoll_create1(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f00000017c0), 0x2e1, 0x0, 0x0) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000240)=[{&(0x7f0000000000)="4c0000001200ff09ff3a150099a283ff07b8008000f0ffff000000060040150024001d001fc411a0b598bc593ab6821148a730cc33a49868c62b2ca654a6613b6aab", 0x42}, {&(0x7f0000000440)="0baba02e95c8c0408265", 0xa}], 0x2}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000080)=@add_del={0x2, &(0x7f0000000040)='nr0\x00'}) 13:11:02 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x12c, &(0x7f0000000440)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689c9c6a47312334c2a97ac2b7f0fb4aabebae8dc5dffbcd48a70502173d6efa56b60f48cf0c9d0989ecbbfc220bd2b39df9ad8d6b14910f4a869863009780dd6e673a02f7ed829932929af9dffb1fa2cd7328202ac55f4f5dbb8494120f79d5f60958691a8a3fcf561c33f46ab89803f47d97e04f7bf9cafb006ae29480408c8380cf060dd72462ccc5b7d195a113bc539df6591cd574a02d4d9b9f3ebce31bd7582018ded8ceb71e75417dabc45f9fa0503befdcd0874ae979bc9581d6a854d4dfb7ffaed09bfcf330c365988c05e12ed069a42c964f79e16ad22f95ffaf5a1d4200b030d0b7b170051b850b78b196b00f0ffff72ac058a66ea2614ba"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 13:11:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x2, &(0x7f0000000200)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x8, &(0x7f0000000080), 0xe) getsockopt$inet6_buf(r1, 0x29, 0x6, 0x0, &(0x7f0000000140)) 13:11:02 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xa) clock_adjtime(0x0, &(0x7f0000000000)={0x102, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) 13:11:02 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xa) clock_adjtime(0x0, &(0x7f0000000000)={0x102, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) [ 674.172294][T31799] validate_nla: 1 callbacks suppressed [ 674.172309][T31799] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 674.186165][T31799] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 13:11:02 executing program 1: timer_create(0x0, &(0x7f0000000440)={0x0, 0x12}, &(0x7f0000000040)) r0 = syz_open_dev$usbmon(&(0x7f0000000380), 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x4018920a, &(0x7f0000000100)={0x0, 0x0}) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x100000001) r2 = dup(r0) ioctl$MON_IOCX_GETX(r2, 0x4018920a, &(0x7f0000000200)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x800000015) 13:11:02 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x12c, &(0x7f0000000440)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 13:11:02 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xa) clock_adjtime(0x0, &(0x7f0000000000)={0x102, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) 13:11:02 executing program 5: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r3, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff7f, 0x0, 0x0, 0x0) recvfrom$inet6(r3, &(0x7f0000000000)=""/60, 0x3c, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) writev(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000000)="480500001400", 0x6}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x200000000e228, 0x0) 13:11:02 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x5606, 0x0) [ 674.280737][T31799] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 674.289185][T31799] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 674.316507][T31813] netlink: 1308 bytes leftover after parsing attributes in process `syz-executor.4'. [ 674.385861][T31830] netlink: 1276 bytes leftover after parsing attributes in process `syz-executor.5'. 13:11:03 executing program 1: timer_create(0x0, &(0x7f0000000440)={0x0, 0x12}, &(0x7f0000000040)) r0 = syz_open_dev$usbmon(&(0x7f0000000380), 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x4018920a, &(0x7f0000000100)={0x0, 0x0}) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x100000001) r2 = dup(r0) ioctl$MON_IOCX_GETX(r2, 0x4018920a, &(0x7f0000000200)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x800000015) 13:11:03 executing program 0: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x404, 0x0, 0x0, 0x0, 0x206}}], 0x1, 0x0, 0x0) epoll_create1(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f00000017c0), 0x2e1, 0x0, 0x0) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000240)=[{&(0x7f0000000000)="4c0000001200ff09ff3a150099a283ff07b8008000f0ffff000000060040150024001d001fc411a0b598bc593ab6821148a730cc33a49868c62b2ca654a6613b6aab", 0x42}, {&(0x7f0000000440)="0baba02e95c8c0408265", 0xa}], 0x2}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000080)=@add_del={0x2, &(0x7f0000000040)='nr0\x00'}) 13:11:03 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xa) clock_adjtime(0x0, &(0x7f0000000000)={0x102, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) 13:11:03 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r0, 0x29, 0x1e, 0x0, 0x0) 13:11:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8918, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t6\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00\x00\x00\xd5\x9c&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00:\x1b\xcc\xe80\x9b\xf9Z\xf7`\x06\xd5T\xb2\xaa\xe4\x1a\x9eF\x1ent\x005\x02)\x9d\xb0\xe4\xb2\xb4;\xfaq\xcb\xd1\xa0`-\x1f\x96L\x92\x1b\xd0\'\x87(\xac\x82 mA\x87I0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r3, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff7f, 0x0, 0x0, 0x0) recvfrom$inet6(r3, &(0x7f0000000000)=""/60, 0x3c, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) writev(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000000)="480500001400", 0x6}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x200000000e228, 0x0) 13:11:03 executing program 4: r0 = socket$inet(0x2, 0x2000000000003, 0x2) setsockopt$inet_int(r0, 0x1f00000000000000, 0xd3, &(0x7f0000000000), 0x3c) [ 675.166120][T31848] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 675.174459][T31848] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 13:11:03 executing program 1: timer_create(0x0, &(0x7f0000000440)={0x0, 0x12}, &(0x7f0000000040)) r0 = syz_open_dev$usbmon(&(0x7f0000000380), 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x4018920a, &(0x7f0000000100)={0x0, 0x0}) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x100000001) r2 = dup(r0) ioctl$MON_IOCX_GETX(r2, 0x4018920a, &(0x7f0000000200)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x800000015) 13:11:03 executing program 4: r0 = open(&(0x7f0000000000)='./file0\x00', 0x1050c2, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@ocfs2={0xc, 0x1, {0x20000}}, 0x0) 13:11:03 executing program 0: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x404, 0x0, 0x0, 0x0, 0x206}}], 0x1, 0x0, 0x0) epoll_create1(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f00000017c0), 0x2e1, 0x0, 0x0) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000240)=[{&(0x7f0000000000)="4c0000001200ff09ff3a150099a283ff07b8008000f0ffff000000060040150024001d001fc411a0b598bc593ab6821148a730cc33a49868c62b2ca654a6613b6aab", 0x42}, {&(0x7f0000000440)="0baba02e95c8c0408265", 0xa}], 0x2}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000080)=@add_del={0x2, &(0x7f0000000040)='nr0\x00'}) [ 675.223389][T31848] netlink: 'syz-executor.0': attribute type 29 has an invalid length. 13:11:03 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x39000, 0x0) readv(r2, &(0x7f0000000140)=[{&(0x7f0000000200)=""/212, 0xd4}], 0x1) write(r3, &(0x7f0000000100)="b1", 0x19000) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 13:11:03 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@rand_addr=' \x01\x00', 0x0, 0x0, 0x3, 0x3, 0x1}, 0x20) sendmsg$inet6(r0, &(0x7f0000000100)={&(0x7f0000000040)={0xa, 0x4e25, 0x0, @remote}, 0x1c, 0x0}, 0x0) open$dir(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x0, 0x2, 0x1, 0x1f, 0x0, 0x400000000}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') preadv(r2, &(0x7f0000000c00)=[{&(0x7f0000000500)=""/152, 0x98}, {&(0x7f0000000380)=""/41, 0x29}, {&(0x7f00000005c0)=""/162, 0xa2}, {&(0x7f0000000880)=""/221, 0xdd}, {&(0x7f0000000680)=""/149, 0x95}, {0x0}, {0x0}, {0x0}], 0x8, 0xb000000, 0x1) [ 675.268081][T31869] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 675.277015][T31869] netlink: 'syz-executor.0': attribute type 29 has an invalid length. 13:11:03 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="66530700ae897094e7b13db097eaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b5877341e0e1dcc2025aa18c9228103b66e1d49d31e122dbecfa63da445b8bef5bd9125939f50bd2d4ed9674eb04a348a666bf58b23ac4edcce412245dead7fc997275b3b805989643f4cf16754ffacef4cb2ebc4701e27449b618aa5fcef85138a02905c33934d8d6a1d9551269eb8a05206e83ffae96c152714e589dfa5dbd99252efcdd229f8f2e07b23367a7493ed90a477026e7f5e60cec21ee006ab661d72b", 0x108}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 13:11:03 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@rand_addr=' \x01\x00', 0x0, 0x0, 0x3, 0x3, 0x1}, 0x20) sendmsg$inet6(r0, &(0x7f0000000100)={&(0x7f0000000040)={0xa, 0x4e25, 0x0, @remote}, 0x1c, 0x0}, 0x0) open$dir(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x0, 0x2, 0x1, 0x1f, 0x0, 0x400000000}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') preadv(r2, &(0x7f0000000c00)=[{&(0x7f0000000500)=""/152, 0x98}, {&(0x7f0000000380)=""/41, 0x29}, {&(0x7f00000005c0)=""/162, 0xa2}, {&(0x7f0000000880)=""/221, 0xdd}, {&(0x7f0000000680)=""/149, 0x95}, {0x0}, {0x0}, {0x0}], 0x8, 0xb000000, 0x1) 13:11:03 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x108}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 13:11:03 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@rand_addr=' \x01\x00', 0x0, 0x0, 0x3, 0x3, 0x1}, 0x20) sendmsg$inet6(r0, &(0x7f0000000100)={&(0x7f0000000040)={0xa, 0x4e25, 0x0, @remote}, 0x1c, 0x0}, 0x0) open$dir(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x0, 0x2, 0x1, 0x1f, 0x0, 0x400000000}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') preadv(r2, &(0x7f0000000c00)=[{&(0x7f0000000500)=""/152, 0x98}, {&(0x7f0000000380)=""/41, 0x29}, {&(0x7f00000005c0)=""/162, 0xa2}, {&(0x7f0000000880)=""/221, 0xdd}, {&(0x7f0000000680)=""/149, 0x95}, {0x0}, {0x0}, {0x0}], 0x8, 0xb000000, 0x1) 13:11:03 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000000)={0x0, 0x4000}) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000040)) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5", 0x241) r3 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f00000001c0)=""/197) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)=@allocspi={0xf8, 0x12, 0xe03, 0x0, 0x0, {{{@in=@broadcast, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@loopback}, @in=@multicast2}}}, 0xf8}}, 0x0) sendfile(r3, r4, 0x0, 0x29) pipe(&(0x7f0000000180)) sendfile(r1, r2, 0x0, 0x1c50f) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x20) 13:11:04 executing program 5: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r3, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff7f, 0x0, 0x0, 0x0) recvfrom$inet6(r3, &(0x7f0000000000)=""/60, 0x3c, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) writev(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000000)="480500001400", 0x6}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x200000000e228, 0x0) 13:11:04 executing program 1: timer_create(0x0, &(0x7f0000000440)={0x0, 0x12}, &(0x7f0000000040)) r0 = syz_open_dev$usbmon(&(0x7f0000000380), 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x4018920a, &(0x7f0000000100)={0x0, 0x0}) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x100000001) r2 = dup(r0) ioctl$MON_IOCX_GETX(r2, 0x4018920a, &(0x7f0000000200)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x800000015) 13:11:04 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@rand_addr=' \x01\x00', 0x0, 0x0, 0x3, 0x3, 0x1}, 0x20) sendmsg$inet6(r0, &(0x7f0000000100)={&(0x7f0000000040)={0xa, 0x4e25, 0x0, @remote}, 0x1c, 0x0}, 0x0) open$dir(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x0, 0x2, 0x1, 0x1f, 0x0, 0x400000000}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') preadv(r2, &(0x7f0000000c00)=[{&(0x7f0000000500)=""/152, 0x98}, {&(0x7f0000000380)=""/41, 0x29}, {&(0x7f00000005c0)=""/162, 0xa2}, {&(0x7f0000000880)=""/221, 0xdd}, {&(0x7f0000000680)=""/149, 0x95}, {0x0}, {0x0}, {0x0}], 0x8, 0xb000000, 0x1) 13:11:04 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000000)={0x0, 0x4000}) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000040)) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000001400)="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", 0x241) r3 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f00000001c0)=""/197) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)=@allocspi={0xf8, 0x12, 0xe03, 0x0, 0x0, {{{@in=@broadcast, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@loopback}, @in=@multicast2}}}, 0xf8}}, 0x0) sendfile(r3, r4, 0x0, 0x29) pipe(&(0x7f0000000180)) sendfile(r1, r2, 0x0, 0x1c50f) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x20) 13:11:04 executing program 4: set_mempolicy(0x3, &(0x7f0000000000)=0x46d3c281, 0xd3) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)='c||&stat\x00') 13:11:04 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x39000, 0x0) readv(r2, &(0x7f0000000140)=[{&(0x7f0000000200)=""/212, 0xd4}], 0x1) write(r3, &(0x7f0000000100)="b1", 0x19000) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 13:11:04 executing program 4: set_mempolicy(0x3, &(0x7f0000000000)=0x46d3c281, 0xd3) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)='c||&stat\x00') 13:11:04 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000280)={0x0, 0x0, 0x0, 0xfffffdb7, 0x0, "c1b4320cc53381ae67275e014486b751406054"}) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000000300)=""/200, 0xc8) 13:11:04 executing program 4: set_mempolicy(0x3, &(0x7f0000000000)=0x46d3c281, 0xd3) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)='c||&stat\x00') 13:11:06 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x108}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 13:11:06 executing program 4: set_mempolicy(0x3, &(0x7f0000000000)=0x46d3c281, 0xd3) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)='c||&stat\x00') 13:11:06 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000000)={0x0, 0x4000}) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000040)) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000001400)="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", 0x241) r3 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f00000001c0)=""/197) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)=@allocspi={0xf8, 0x12, 0xe03, 0x0, 0x0, {{{@in=@broadcast, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@loopback}, @in=@multicast2}}}, 0xf8}}, 0x0) sendfile(r3, r4, 0x0, 0x29) pipe(&(0x7f0000000180)) sendfile(r1, r2, 0x0, 0x1c50f) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x20) 13:11:06 executing program 5: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r3, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff7f, 0x0, 0x0, 0x0) recvfrom$inet6(r3, &(0x7f0000000000)=""/60, 0x3c, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) writev(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000000)="480500001400", 0x6}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x200000000e228, 0x0) 13:11:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x39000, 0x0) readv(r2, &(0x7f0000000140)=[{&(0x7f0000000200)=""/212, 0xd4}], 0x1) write(r3, &(0x7f0000000100)="b1", 0x19000) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 13:11:06 executing program 1: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x400002200006007, 0x1) unshare(0x600) r0 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x4c02, 0x0) 13:11:06 executing program 1: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x400002200006007, 0x1) unshare(0x600) r0 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x4c02, 0x0) 13:11:06 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x400002200006007, 0x1) unshare(0x600) r0 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x4c02, 0x0) [ 678.482660][T31936] __nla_validate_parse: 9 callbacks suppressed [ 678.482670][T31936] netlink: 232 bytes leftover after parsing attributes in process `syz-executor.2'. 13:11:06 executing program 1: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x400002200006007, 0x1) unshare(0x600) r0 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x4c02, 0x0) 13:11:06 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x2, 0x3, 0xff) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x1) lseek(r2, 0x1200, 0x0) r3 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) connect$inet(r1, &(0x7f0000001680)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10) r4 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0)=0x4820, 0x4) sendfile(r0, r4, 0x0, 0x200fff) 13:11:06 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x400002200006007, 0x1) unshare(0x600) r0 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x4c02, 0x0) 13:11:06 executing program 1: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x400002200006007, 0x1) unshare(0x600) r0 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x4c02, 0x0) [ 678.528489][T31949] netlink: 1276 bytes leftover after parsing attributes in process `syz-executor.5'. 13:11:06 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x400002200006007, 0x1) unshare(0x600) r0 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x4c02, 0x0) 13:11:06 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x3, &(0x7f0000000000)=[{}, {0x5}, {0x6, 0x0, 0x0, 0x7fffffff}]}) openat$vcs(0xffffffffffffff9c, &(0x7f0000001080), 0x0, 0x0) 13:11:07 executing program 1: syz_mount_image$tmpfs(&(0x7f00000020c0), &(0x7f0000002100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002440)) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1101430, &(0x7f0000000580)=ANY=[]) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x21, &(0x7f00000004c0)) 13:11:07 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x81ff, 0x0) r0 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') preadv(r1, &(0x7f00000017c0), 0x333, 0x0, 0x0) 13:11:07 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x24a, 0x92b8e1750a47fe0d) chown(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 13:11:07 executing program 1: r0 = syz_io_uring_setup(0xd1b, &(0x7f0000000840), &(0x7f0000ee4000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000800)=0x0) set_mempolicy(0x1, &(0x7f0000000040)=0x7f, 0xed) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) 13:11:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x39000, 0x0) readv(r2, &(0x7f0000000140)=[{&(0x7f0000000200)=""/212, 0xd4}], 0x1) write(r3, &(0x7f0000000100)="b1", 0x19000) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 13:11:07 executing program 5: prctl$PR_MCE_KILL(0x2c, 0x0, 0x0) 13:11:07 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x800000000009031, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000469ffc)=0x100000000007fd, 0x4) setsockopt$inet_int(r2, 0x0, 0x12, &(0x7f0000000040)=0xfffffffe, 0x61) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e24}, 0x10) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f00000000c0)=0x9, 0x4) recvmsg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x400020ff) 13:11:07 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCGSERIAL(r1, 0x5425, 0x0) 13:11:07 executing program 5: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) socket$unix(0x1, 0x5, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x775409472d9a169b}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 13:11:07 executing program 3: setrlimit(0x2, &(0x7f0000000240)) mremap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000b2b000/0x2000)=nil) 13:11:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000000)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) 13:11:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000002, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) open(0x0, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000002040)=[{&(0x7f0000001040)="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", 0xf5e}, {&(0x7f0000000140)="6e351d0e8f0625a6e016e2a625b9daf4aa5fae79660f553c213d0acc6251a7ae3a64b3e54943de8d2752018c3e34369a02800bd3cd7d14113a7d53e590d80d0e822cb82b65f06be405887b51f7bca280d362647020dbfa9a4633daf7bcdd818b93727ef45903a41adc", 0x69}, {&(0x7f0000000200)="ac534dc115b220c13cb5f0d0dcd49ff9babecaa940e7a7f90d8b62aa40b84b731fa18c9db35d0ebc1e8faf0c95dda4139c02213f68f6d8cd1f8273babd48a08d564c0f1e5cd03711c6dd7bc2956a25f80ab806c994f06251b324ea62de82446e9cc9c0c8f4de9883fb3d8adab7657c263c400949dd27283ac0fd97328db15a1d7ff38ee12b391431c18451896e52ade9b3dbb363d0d5a96d1547adb20b8c7993da91aa644468f6207bcf6b1f45fb7902663e7db03bd8905d29875ceeb8c721dd8287a111b67de25ab8a9e695fa7c4639a7612def8495580df72f2808877d03f0bc9b0e7227ab92da81f1cd5183a6b0fbdc2482b739b3", 0xf6}, {0x0}, {&(0x7f0000000540)="4983", 0x2}], 0x5) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) open(&(0x7f0000000580)='./file0\x00', 0x101040, 0x84) writev(r1, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e918d324868e83f474d0c3549b712f00c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3164", 0xff7c}], 0x1) 13:11:07 executing program 5: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) socket$unix(0x1, 0x5, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x775409472d9a169b}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 13:11:07 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) socket$unix(0x1, 0x5, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x775409472d9a169b}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 13:11:07 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) socket$unix(0x1, 0x5, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x775409472d9a169b}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 13:11:07 executing program 5: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) socket$unix(0x1, 0x5, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x775409472d9a169b}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 13:11:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000002, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) open(0x0, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000002040)=[{&(0x7f0000001040)="8976e4bda62a406941108de6ebfbc7ff3f209d32578228c312ba1c8ebb94b7c0754c08eb2bc62273a58feafebf655ae170bbb39a5ccc1e6820195e6c44f25880fe19d9d5a802ff1924ee5fd12a32fe4a28636c834d4a82321b1a525f37b9d462dcb4da99a5dcf4036481cd6af0e602fe712ca749a41a44224a6c52b07731726027f9950bf23916c964644c67b02c6e6089f8e7caee0cead41c7f5a217fd2ba86208f5d712c7e68b5c6cd22135520e52a89c9ea5694df6fbcbea5d75636ec841bc37c8587e594a9ca2860b13cff23cb751470b90390ac770ba8720d2c7d3c1e701aa9071ff4e843a91fbb7bb45daf3e3d90aa39492c97e86e53a003712914673b68f50e49794196e66f5610b00e9f61d5afd761daa633c414cda5d4d5b6f33f5fac2faa6bab1b625aad4d49804ad27388f9e5624c5f94d71fbf3e0d2a88b565a63f032e03d3650333222ccdf67fd2e52dc904eccbed78688b13b44f8e527bc11c3c37413cf707650c7c6ad638379da90cf2112d073fefb17c43d0816ab06158c5ee43653e34fd1777aadfc2cd3cf93596b107b63f9e1d72308cf292cdb70115b5d0538286c0a390e54a20c81ab8503d99296ab9a438c277c5e520971fc78f0f1d508ff90801dc49297c71ec7e74fb1afa2374c370f4fcfc82a987f9b8560a049db306e9f0530e1bab656736a9cfdd7263847d1ee489d3b507a7441755d8d4e8d1d6bdd2cd0bebaef7745d6cecf2ade2fd1b2f42693a7b21680fed7f08b6fb2dfd51bfc333a371bd6add42dfe28c7143f463b464cf922d7013fe01a9b8b795e20ba3d888d40a611032896abfba1dbee962a98084b151d02b9393f286aa0fe1f66fa4aec193f62ee1aa9ba09b3a891a7a003cda6998bf1fca78c798f891ccee5e1f59fafc59ce6163570b2ece41cf0b42c880a1dec20b53653790094b06c0957934af8bdc5e429d37971eebc4bd00b54c3d183cd6cfd042d5abff9c8000d48db31a4d03045e802cc5dc47b28a8706ca8e8149f7d89e2245fe9396ce2263afe65c41f4b980b6a90bc560e7f5eeaae4c56a8e959bd0d7fc3de2382bbf89b57c8a6393f3e1ef4a63f2887bd4ca586c76beff719bc01466ac7ba86d9c4bb4a3d976c9a67aa0b628fee44649c9c1297f2c8271426e0ac253df1a7d66dceb6f5d1fabe15e9e6ad458b7d6d68fcf7ab60768f6d272b5dd22b46bf2cf63d38ddce8cf84f95258b8cafdf2e8b79beaa4a3944970b7a646058868c6ba43af4f6f76512ec87a2730e74515b4217a78c5101843643f775804bb475ceda5812296195956f635b182ccafa5b1270e8687645d00cbd9a5c242389b56cad7ab284a4c6d791638c1d188755a79cdd7364f5116d6d4b89d7e9aa52b7b0b434d32a809adc91c3be85e8f7dc5af360d9b39bca973589c5f5ce57c0d49aaf81ed41c3b515379c3a6acfa7a3be11821907b8d232c59f3da4206b9238cfdac85270ddbb76e9b6ce91ffc85db4f0094c81542f5a424df88c9289ef371ec1a3e10ab25fa66f0d1c2798089301f244858fa1562fbc6e2ce13953e3a910e66dcbc4f5e2b6cdd7ed3e7cf8edb50c7a83087aa2ea01ae944c13f79ce96b28215819b2105791350c7896aad5a90776e086509382cd9842521f22f5203c372bddddb94b6d842243578796fc9d0d8464a1b308d9051bdfed80b8d55d37615e0985b035060f68253a11a7aea080fadd01467f1fa2e4df9b856c4ebe8a80231b3c20e63def339eda1ae16ea0f67a1a6fc9df3a028d4d9a5b18ab4387b0aec462b270f1fa371416001704db2be5f5cf4d5192c9825093bbb0bb45a3c1737c45cf8389277b7e7f2d3503922c9d9f3afcfb9d37190020b0654d3b8ff2026f3f0ea8a062547d932ea5b41893bf301eb790ffb3565a59af4bab6ea5b4ee6c06c5d45f3bfb5c0182ff7534533f1a258c911c89e240247cb07b250b4e7b2482b53454cdbc2626844ee56a94888868f75e253446058fcb638c320e9c05d1a88b3e9d9dc01b9dd13285c184657eb020c618c72aea5d05b48b0ed6dae19b305f22f7631c6aab900f85342fc438d61ab98693ea2fa0e32f013cd4e53df39ee8cbe1d7f528064765a6c7a62f5083c68a5346139d7cbabdaf2f5a8f4a75a671974260252cbe01e54a1aee785c27f27d320cd91d20121f7aef3bec454994fe688d4abb28a3901b71852c8eff0e0e6e45600c7b62e6f862e81adedf185be2822a24ff89e91912d695effec9b465939fddd65c83d61dc4e7907ccd47de7ce2418eafc938f61485e8c097e109eb8c8d6f13caec7aa661858c02ea0cde2a9ab8576718ce57d9acfcbec2a22aecdf3148d0822831e324b50cb282ac3f7315a304c4e6d670e599e8146b64c733ac7e3e91b50b02fdc0133720afc2501350e3dbf140c3ab915a1a0c703bd0bac18970f18d98c9787ecc2be52818e53ea88a382e2162dd123ea1237d5557c24b48c35d2c766300177f66c780fc9ee6ddc63a4a63c7a2d5e5ad58665fc498888b687ac8136cb90e093e3efd32a122b39852e3f3843c057326176a008e7e1b952b1441fbad7ecf10003bfb3c2370a161e094cf73de9993ca841e870b85f23483ce48ce02a7260d7388d5e603f388eca5cfe28c075eb0ac3b115e0d229a8087689266f46bf47cf95669dbbf3ec551d78b8a2a419d974d38a4b79c5fe6ec2119052a658b5d47dfcbe993b66d92c6a889f5dba25b9d348e8460743aa122235dad24d729c291cb672d5896069fad2ad7c7c1bf20e2e819ad4769e97ef495f7966c9b1e61a6506910447fedc11deb3696528bf52781f4a5fcdc13fe0b23f080b2d44f1bc2e76fa2b2b9eb36199cc657c35ad79daed5055bb88c44a892adf45541083cc8104c0bdec93652f6bbc62f813a21ae4d1677419304f7e95d2c25a2199d5cc2b32d9713b7cd12202cbcbb44302f514aa657e92729a10da7dbf213e05429c80718a84aeec452601e2dca32248840bfd3b328d808785da7a4b5f90b12c1f56e26c0be6ad83f412dee47fa7b2d34a9fb66948eac4df0f2e586a114f452cee0c36ca819194fac058298b1330f46ef4f1923e4098de74fd9f9f0e92d9f86b59d4e79e49566b130c46c5abcf810cef70afe29e22f084f740ce5cd21cf0ca43313986fb2b91c6f7588b102466415662b739946a7fc8c4108b0776d4e359acad7e55904b6e1f6c34d867f0455e12fe8fd3335807e8ed89a746799906c2ba374eac338221b3a1d039700b38f3278a5e5250503584028f427fd1f9cd1f450c5c29fcd1adc7fc68768df3bce706819580aca22828b6b4d55b5351aaa345edde0389987f19c9369a515ad9ca1152732b994dcf310a5dd42f2aeb6773845cb863081f920d93b4c2de0eb65316ba0d2f4f63dc3f4a90679b4a1ef0434c453f5a1faf99b504f268ae67a59bcb012f5b29c5117d36042a401678cf7e93fd006b7484e853913d2d77ca20c250d4d5d82c6df21830f92431e6c60acb561dd0f8db8ba2abb4f8e638090d68b0cbc7d634fa8d0fdc1f61aaf228a0456b3bcbe3d78aea65af1973488c3bc3359d410c4aa1b13bbd8617361eb34a7028f3b41c1e6f34f07034346aa581cba412093f191c02f96fbd8de4cb294e752fe2236a0de6aad0e370ead7b81a021c9f6795d38319f7aa3123c0c58e2590ff3f1cb3d55ab5fbc7b8c19d8cdae719e5e52acf867ff05e04deba4380bf46f8f4b686f00de29e149b7d5371ed5d52fe8b6195ec177ecca2ef191a5b1cc1acf1651b37f83e06d2ab8dcf8970fdb10b76c2400c869bc1664f110b0e63b28fcaae58e741da40aba67fee7c67ca541ab775b5c4c56514a595e0dd0f96cc6d5e8f7860044aa8482b4f2138bc1e1f3887db903dcc748dc069fbb477823e76f654ae5080f3d147bffa1f404649d33cca2c977473ba353f2c93f56eebbaded3a30a0586ccd3a1a99ae1ab58338b3328dfeb1ebcfda1db3bfffbe2c93eb6fc60a5e34c44a3bc280a4a0e76ee1fea3a01bf1e51257a06f6d97bf61e0b101139d2a1104d8581e4647821dbf9eedb04ddd13f1b1e70ff1fab508c3d4bfb59dab75171bf33ef01d26ed1160018f621be1608f0b34167ab9687c060181b913b26dba5c23e93d7001ba314be104cece8fc754358ed6e73eece92c4ecfbeed82d2250361325dac12a989b60d74564ab3cef0e98fb31a993e4f3389bb30abdf8f31a16b49a8524144ae4eeb0cc8829f1984018b55f7af2443b3f1301fb5ee55c508720fa5e8318432b88ea64d10cae3b0e9631d82cfa4616fee7996c13c1297a690b5b5072ce57d78beb89b3d2299461e270a33165e0387d50ec96f27e6fb9d8c526a36421031d0483076c3258d0f3bd55e161b0588c1c55520b6cf4d12043707c2fc65962691079c5bf7231a55fcea9f575c05345ea9c8848b781a5856b7cab29988af5085dce69e12712606dabac80ebca0eecbb1741fe9314dcaeea32031266df4cfad31a01b6968eb9f2ce47c2eb75ac10b25ddd40af7767b07697d708f61d0bbd3bd27e7e6eb30a81681fa1f7b591eec0dc11fa3ebfa7556822dfc8a4698af7338e57412a9d4a6be3457e511f5975468c0411ec83b075dfd1062f982a190ab29c34770b6c576072385208cd0a722cdaf81dac6af9db84380e8626375bbf461cf9e467f6a89efd40c1da18b94018f7d0d6af6a29440c9b50509e5967097170793d1190f55999829b94df1dcd90f194e445dcecfd945ad0f7952c9b54846a3f9457570406dd9c4923532ceef06189ba4f6b9086f9de8433fbfe9ec59aceba64d348645d4b70695cea611c8631c4b0365dc069e1261acc0abc62125b4f75eb36e72ab4cf085be4babc1e27bd612023fca0e00b19253f7cbd8c6835e9ec52d3fdae7eb2c3aa62c293dbe0d25291c6e3fafbddfc57f1ee7d8e5f5b0ea56b9c51904840319c44e9409215267e23f7bfc528a000234199a9d633d12c445e99e35b7f51ec4f42a5c483cb18f48f177c85121680f5f421e67f5a25f237244ef6a537957c110b42862b24732098e6cc8be398af54b5f515108a8d9136db75e4d6b233330d8570358f3e8ff08a011c268259a1b2882f9c8b833994d8969c8f3e032ae179b4dea45f0440bfe3ba5b67394a8f9201716c84514b1ddc84e39066ed186aca9515a0de5fddd1696fbdafd1c75afcb02a0805ae4596c8c155f3dddf8b40098ad6d9c2e26dfe2a9dd377eebbe24e0dcacc97978340ec5eadf026b0ef4800d19c53c2fa4274299e053b2fbd0d94b7964748be02c49c6033ab791581653ecf3cef7c85f0e55a255ad0a4a0bfc9b952eb871c9f34fc48de427d546fc411b0260a25a4749bd43e43504064edc4fa8b218558078f04492c83543beb7c8f8c671f73a21ed4bcc8729f553265a75a56c545ab3626565922068046d279dc4377ae70f46e8fe2e30c3740aed5f9757b5ac7032f287ac012975db93fb36ec19031b5519c64534ebca6a8f8db990710e8a45d487656bc71d28a0e58dfc5f8f141829e9409d6affa55d37afae91b1c46bda9202e31629b6bc50a08a4e96cbac05b0839d1cc6c2a671996a39f2f4b", 0xf5e}, {&(0x7f0000000140)="6e351d0e8f0625a6e016e2a625b9daf4aa5fae79660f553c213d0acc6251a7ae3a64b3e54943de8d2752018c3e34369a02800bd3cd7d14113a7d53e590d80d0e822cb82b65f06be405887b51f7bca280d362647020dbfa9a4633daf7bcdd818b93727ef45903a41adc", 0x69}, {&(0x7f0000000200)="ac534dc115b220c13cb5f0d0dcd49ff9babecaa940e7a7f90d8b62aa40b84b731fa18c9db35d0ebc1e8faf0c95dda4139c02213f68f6d8cd1f8273babd48a08d564c0f1e5cd03711c6dd7bc2956a25f80ab806c994f06251b324ea62de82446e9cc9c0c8f4de9883fb3d8adab7657c263c400949dd27283ac0fd97328db15a1d7ff38ee12b391431c18451896e52ade9b3dbb363d0d5a96d1547adb20b8c7993da91aa644468f6207bcf6b1f45fb7902663e7db03bd8905d29875ceeb8c721dd8287a111b67de25ab8a9e695fa7c4639a7612def8495580df72f2808877d03f0bc9b0e7227ab92da81f1cd5183a6b0fbdc2482b739b3", 0xf6}, {0x0}, {&(0x7f0000000540)="4983", 0x2}], 0x5) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) open(&(0x7f0000000580)='./file0\x00', 0x101040, 0x84) writev(r1, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e918d324868e83f474d0c3549b712f00c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3164", 0xff7c}], 0x1) 13:11:08 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="66530700ae35c6788b1b0fa1f147a8378f3657cdcf86db93aa6ed9006761f62d641b74cbc6a9e00b9e626aa995d690c8a2372286677850ab8e9b75839f0715a567dafe306f08187d007c111495d58553d8c11c606e13da9b8d4bff0000000000000079cb4188d526a566833fe1f9c73899301d879b51848164e7b988889c753ba801e880c49a91e7b9486916ea7a348947d85d038e1ac9522c11a448eb", 0x9d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x1) 13:11:08 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) socket$unix(0x1, 0x5, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x775409472d9a169b}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 13:11:08 executing program 5: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) socket$unix(0x1, 0x5, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x775409472d9a169b}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 13:11:08 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x822b01) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 13:11:08 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000002080)={0x4, &(0x7f0000000080)=[{}, {0x3d, 0x0, 0x6}, {}, {}]}) 13:11:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$BTRFS_IOC_SPACE_INFO(0xffffffffffffffff, 0xc0109414, &(0x7f00000004c0)={0x9f9, 0x81, ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) sendmmsg$unix(r0, &(0x7f0000000480)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r3, @ANYBLOB="14000000000000000100000001000000", @ANYRES32=r1, @ANYBLOB="b3d548cd37877a689aec8d2958ee91c1b16ec98e0e0a62687a89ef6ea1f8091a64b48cb4820b6d4d9f656675de55029337141bad0b6c1c912ff3799029f47bd9279e08e5f96fc523e0d984efcc75239dc98a870cd151a914ca21f1cb86762ca22706ffcc77834cd6470fecfd6754407773b82bff0c1493462efb7e98378d0b6cd2454becbf5bfc7cf3ccf219e64fd2757a37918c35fdb19c90d1c04888fd91192f20586143f27424b8fc5157bed2bf3820217defab920bf29e3c34c421de20909a8ad7ca2118c60f48d9d1ce3b82d01dd3606fb63813b9ce19251178dee0ddf1a366554ecebfe642"], 0x30}], 0xffffff1f, 0x0) 13:11:08 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/rt_cache\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f00000002c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) pread64(r0, &(0x7f0000000340)=""/191, 0x3e, 0x0) 13:11:08 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x8042, 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB="36bb"], 0xe) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4052, r0, 0x0) syz_io_uring_setup(0x2de5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 13:11:08 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000180)=0x3188, 0x4) 13:11:08 executing program 1: set_mempolicy(0x3, &(0x7f0000000140)=0x3ff, 0x6) getcwd(&(0x7f0000000000)=""/191, 0xbf) 13:11:08 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[], 0xfdc4}}, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x1, &(0x7f000039a000)=[{0x6, 0x0, 0x0, 0x1}]}, 0x10) sendmmsg(r0, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) [ 680.309799][ T920] kernel write not supported for file /input/event0 (pid: 920 comm: kworker/1:2) 13:11:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000002, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) open(0x0, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000002040)=[{&(0x7f0000001040)="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", 0xf5e}, {&(0x7f0000000140)="6e351d0e8f0625a6e016e2a625b9daf4aa5fae79660f553c213d0acc6251a7ae3a64b3e54943de8d2752018c3e34369a02800bd3cd7d14113a7d53e590d80d0e822cb82b65f06be405887b51f7bca280d362647020dbfa9a4633daf7bcdd818b93727ef45903a41adc", 0x69}, {&(0x7f0000000200)="ac534dc115b220c13cb5f0d0dcd49ff9babecaa940e7a7f90d8b62aa40b84b731fa18c9db35d0ebc1e8faf0c95dda4139c02213f68f6d8cd1f8273babd48a08d564c0f1e5cd03711c6dd7bc2956a25f80ab806c994f06251b324ea62de82446e9cc9c0c8f4de9883fb3d8adab7657c263c400949dd27283ac0fd97328db15a1d7ff38ee12b391431c18451896e52ade9b3dbb363d0d5a96d1547adb20b8c7993da91aa644468f6207bcf6b1f45fb7902663e7db03bd8905d29875ceeb8c721dd8287a111b67de25ab8a9e695fa7c4639a7612def8495580df72f2808877d03f0bc9b0e7227ab92da81f1cd5183a6b0fbdc2482b739b3", 0xf6}, {0x0}, {&(0x7f0000000540)="4983", 0x2}], 0x5) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) open(&(0x7f0000000580)='./file0\x00', 0x101040, 0x84) writev(r1, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e918d324868e83f474d0c3549b712f00c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3164", 0xff7c}], 0x1) 13:11:08 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) setsockopt$packet_add_memb(r0, 0x107, 0x7, 0x0, 0x0) 13:11:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xf) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000003280)={{0x14}, [], {0x14}}, 0x28}}, 0x0) 13:11:08 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000007000)=[{{&(0x7f0000000080)=@nfc_llcp={0x27, 0x1, 0x0, 0x0, 0x0, 0x0, "61e0017a6f5082d73224be16403735383674b66d5b3aabceb09a671b48545ed7a786eb399df237ac35a2f74581b5c91529fd72c4f55d8144b3e49884c079f1"}, 0x80, 0x0, 0x0, &(0x7f00000004c0)=[{0xf}], 0x10}}], 0x1, 0x0) 13:11:08 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) 13:11:08 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000640)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 13:11:08 executing program 5: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x891b, &(0x7f0000000140)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xb0]\t\xee\x89dD7\xb1\xeb\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) 13:11:08 executing program 0: set_mempolicy(0x3, &(0x7f0000000180)=0x5, 0x3) unshare(0x40000000) r0 = socket$inet6(0x10, 0x2, 0x0) r1 = socket$inet6(0x10, 0x2, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8916, &(0x7f00000000c0)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\x0f\x89d:\x8f\xecb6\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00\x00\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/79) 13:11:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011500)="ed41000000080000d3f4655fd3f4655fd3f4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000000080)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount(0x0, &(0x7f0000000580)='./file0\x00', 0x0, 0x20, 0x0) 13:11:08 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000001200)='/proc/sysvipc/sem\x00', 0x0, 0x0) openat2(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0xffffff9c) 13:11:08 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) clone(0x2002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000000c0)={[{@mpol={'mpol', 0x3d, {'prefer', '', @val={0x3a, [0x4e]}}}, 0x9}]}) 13:11:08 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000000c0)={0x28, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x10, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x14}]}]}, @ETHTOOL_A_STRSET_HEADER={0x4}]}, 0x28}}, 0x0) [ 680.677509][T32166] tmpfs: Bad value for 'mpol' [ 680.696865][T32172] tmpfs: Bad value for 'mpol' 13:11:08 executing program 5: semget$private(0x0, 0x4007, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x4}], 0x1, 0x0) semop(0x0, 0x0, 0x0) 13:11:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000002, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) open(0x0, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000002040)=[{&(0x7f0000001040)="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", 0xf5e}, {&(0x7f0000000140)="6e351d0e8f0625a6e016e2a625b9daf4aa5fae79660f553c213d0acc6251a7ae3a64b3e54943de8d2752018c3e34369a02800bd3cd7d14113a7d53e590d80d0e822cb82b65f06be405887b51f7bca280d362647020dbfa9a4633daf7bcdd818b93727ef45903a41adc", 0x69}, {&(0x7f0000000200)="ac534dc115b220c13cb5f0d0dcd49ff9babecaa940e7a7f90d8b62aa40b84b731fa18c9db35d0ebc1e8faf0c95dda4139c02213f68f6d8cd1f8273babd48a08d564c0f1e5cd03711c6dd7bc2956a25f80ab806c994f06251b324ea62de82446e9cc9c0c8f4de9883fb3d8adab7657c263c400949dd27283ac0fd97328db15a1d7ff38ee12b391431c18451896e52ade9b3dbb363d0d5a96d1547adb20b8c7993da91aa644468f6207bcf6b1f45fb7902663e7db03bd8905d29875ceeb8c721dd8287a111b67de25ab8a9e695fa7c4639a7612def8495580df72f2808877d03f0bc9b0e7227ab92da81f1cd5183a6b0fbdc2482b739b3", 0xf6}, {0x0}, {&(0x7f0000000540)="4983", 0x2}], 0x5) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) open(&(0x7f0000000580)='./file0\x00', 0x101040, 0x84) writev(r1, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e918d324868e83f474d0c3549b712f00c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3164", 0xff7c}], 0x1) 13:11:08 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000440)='./file0\x00', 0x0) 13:11:08 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000004000/0x3000)=nil, 0x3000, 0x0, 0x2812, r0, 0x0) r1 = open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x2812, r1, 0x0) write(r0, &(0x7f0000000280)="ad", 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1202}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:11:08 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "000000001f0000000000000000dd02517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "ab1b0dcff4f15add"}) [ 680.790863][ T25] audit: type=1326 audit(1619961068.860:1138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=32176 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 680.837435][ T25] audit: type=1326 audit(1619961068.860:1139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=32176 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=157 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 680.837502][ T25] audit: type=1326 audit(1619961068.860:1140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=32176 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 680.837606][ T25] audit: type=1326 audit(1619961068.860:1141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=32176 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=298 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 680.837629][ T25] audit: type=1326 audit(1619961068.860:1142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=32176 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 680.837649][ T25] audit: type=1326 audit(1619961068.860:1143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=32176 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=319 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 680.837677][ T25] audit: type=1326 audit(1619961068.860:1144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=32176 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=77 compat=0 ip=0x4665b7 code=0x7ffc0000 [ 680.837769][ T25] audit: type=1326 audit(1619961068.860:1145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=32176 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=257 compat=0 ip=0x4196e4 code=0x7ffc0000 [ 680.837789][ T25] audit: type=1326 audit(1619961068.860:1146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=32176 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=3 compat=0 ip=0x41940b code=0x7ffc0000 [ 680.837890][ T25] audit: type=1326 audit(1619961068.860:1147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=32176 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 13:11:09 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=@newsa={0xf0, 0x10, 0x505, 0x0, 0x0, {{@in=@private, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x2}, {@in6=@remote, 0x0, 0x2b}, @in6=@mcast2, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 13:11:09 executing program 5: r0 = syz_io_uring_setup(0x6b52, &(0x7f0000000080), &(0x7f0000000000/0x11000)=nil, &(0x7f0000003000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000000040)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index}, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0xfff, 0x6) io_uring_enter(r0, 0x3f1, 0x0, 0x0, 0x0, 0x0) 13:11:09 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000440)='./file0\x00', 0x0) 13:11:09 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xc000, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:11:09 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000000c0)={{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {}, {}, 0x0, 0x6e6bb1, 0x1}, {{@in6=@mcast2, 0x0, 0x2b}, 0x2, @in6=@ipv4={'\x00', '\xff\xff', @broadcast}}}, 0xe8) 13:11:09 executing program 4: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/ipc\x00') mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100)={0x100016, 0x70, 0x0, {r0}}, 0x20) 13:11:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000001240)='./bus\x00', &(0x7f00000012c0), 0x0, 0x0) 13:11:09 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendto$inet6(r0, 0x0, 0x0, 0x400c841, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3", 0xffd0}], 0x1, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4007da3) 13:11:09 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="66530700ae897094e71b0fa1f107000000364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb298802d8f6c1f3b18d6d352507f7018b31a53bad1ec3533c791a753a1fef2c560001000000000000fb8005128e7e4d939955f8ac396203784000400f573fbf000000000000000761f35e959f130dec95128ce7ec033dc0a380543bfc99320be1c1bb99bb063fb6092d696569eada31b0040015f0332701d9d14a3f9209d666578cc0266bce7860eaaf305a0ee2af0f82dfefd5e00d", 0xda}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 13:11:09 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000440)='./file0\x00', 0x0) 13:11:09 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0316d6319a4ae27, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$unix(r1, &(0x7f0000000640)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="14000000000000000100000001"], 0x14}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000000)=[{{0x0, 0x4, 0x0, 0x0, 0x0, 0xffffffffffffff61}}], 0x3df, 0x86, 0x0) 13:11:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() poll(0x0, 0x0, 0xfffffffffffffff8) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000100)="66530700ae897094e7b126b097eaa769be6d05c41bd36ab95156e9962f38ee", 0x1f}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$cont(0x9, r1, 0x0, 0x7) 13:11:09 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0xffffffff, 0x3) futex(0x0, 0x8c, 0x0, 0x0, &(0x7f00000001c0), 0x0) 13:11:09 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX]) 13:11:09 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000007280)=[{0x0, 0x0, 0x0}, {0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, &(0x7f0000005800)=[@rights={{0x10}}], 0x10}], 0x3, 0x0) 13:11:09 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000440)='./file0\x00', 0x0) 13:11:09 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0xc, 0x121041) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x0, 0x2710}, 0x14, 0x0, 0xfffffffb}], 0x18) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x9, 0x2}}) write$evdev(r0, &(0x7f0000000040), 0x373) 13:11:09 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX]) 13:11:09 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) getuid() 13:11:09 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/stat\x00') fstat(r0, &(0x7f00000013c0)) 13:11:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={0x0, @l2tp, @l2tp={0x2, 0x0, @broadcast}, @l2tp={0x2, 0x0, @private=0xfe000000}, 0x23a}) [ 681.762027][T32240] 9pnet: Insufficient options for proto=fd 13:11:09 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet(0x2, 0x3, 0x5) getsockopt$inet_pktinfo(r0, 0x0, 0x9, 0x0, &(0x7f0000000040)=0x3) 13:11:09 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX]) [ 681.838534][T32254] 9pnet: Insufficient options for proto=fd [ 681.905311][T32265] 9pnet: Insufficient options for proto=fd 13:11:12 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc) close(r0) 13:11:12 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x5, &(0x7f0000000180)="58d9782858"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 13:11:12 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, 0x108) 13:11:12 executing program 5: timerfd_create(0xc, 0x0) 13:11:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) fcntl$setstatus(r0, 0x4, 0x40000) 13:11:12 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX]) 13:11:12 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x0) fcntl$dupfd(r0, 0x8, r0) 13:11:12 executing program 0: unshare(0x8000400) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_opts(r0, 0x29, 0x40, &(0x7f0000000000)=@srh={0x0, 0xa, 0x4, 0x5, 0x0, 0x0, 0x0, [@private2, @private0, @private0, @empty, @remote]}, 0x58) 13:11:12 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000000), r0) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x58, r1, 0x82d4f8471bee9465, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @private0}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @mcast2}, @NLBL_MGMT_A_DOMAIN={0x9, 0x1, '&)!&\x00'}]}, 0x58}}, 0x0) [ 684.754452][T32280] 9pnet: Insufficient options for proto=fd 13:11:12 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x2, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000001180)=""/132) 13:11:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) shutdown(r0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 13:11:12 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000600)=0x8000, 0x40) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000040)) openat2(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 13:11:12 executing program 0: r0 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f00000002c0)='user\x00', &(0x7f0000001000), &(0x7f0000001000)='.', 0x1, r0) [ 684.877530][T32303] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 684.892505][T32310] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed 13:11:15 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r2, 0x89f0, &(0x7f0000000080)={'sit0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r2, 0x89f3, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 13:11:15 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x2, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000001180)=""/132) 13:11:15 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000000), r0) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x58, r1, 0x82d4f8471bee9465, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @private0}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @mcast2}, @NLBL_MGMT_A_DOMAIN={0x9, 0x1, '&)!&\x00'}]}, 0x58}}, 0x0) 13:11:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000), 0x7f, 0x0) ioctl$LOOP_SET_DIRECT_IO(r1, 0x1268, 0xc04a01) 13:11:15 executing program 0: prctl$PR_GET_NAME(0x10, 0x0) 13:11:15 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x20, r1, 0x1, 0x0, 0x0, {{0x1a}, {@void, @void, @val={0xc}}}}, 0x20}}, 0x0) 13:11:15 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000000), r0) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x58, r1, 0x82d4f8471bee9465, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @private0}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @mcast2}, @NLBL_MGMT_A_DOMAIN={0x9, 0x1, '&)!&\x00'}]}, 0x58}}, 0x0) 13:11:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) stat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000000), 0x80080, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) fstat(r0, &(0x7f0000000080)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r1) r2 = syz_mount_image$vfat(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000000140)}, {&(0x7f0000000780)="57595a4b414c4c45522020085ac19f69b8f2b2b1ea1b8a0ac9135eed1df1d1001cc2de850f1fffb2aed768634ef7e75effac2ac4c15e29fb3c18fafff8d198e312475fc22da2be3e05004fad25822a17b17f463e104179c19c2ad2fbddc0777df2ec4f62826086704ddf95b43fcba468b720660208bb69031e12558284228bf73e037e2880b514a6b8a57f41fb86c26defeaf7e7230987f8ec610694e89ad37c804b9e46226ca6b9956a74a7d9ecf9be8f7ffba2f21b2dd0702c79aba3fe3cdcd747912d1368b60fdc07018080439951cb3790e1138c4ca2f0547030d616de705f68b15d3431e8", 0xe7, 0x600}, {0x0, 0x0, 0x4000000000010e00}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="dd498b3692fdf76c1408c35116b04679bbe3c11d90000084773d42684302ac580da3a7afb47c9deb54c21a1f926d3980f50182a2ee241a61a5897588d1ddc779e4ea9316fcbfa5aea543843a30cef48c1e5610bb51617200b00501bdcf54834944e944918a046956b8ff779309c8b6aed09b33beba8f1ecd078287c426cfbd8d55049195239e87d44f309c8ff54dc0dae0812f980f7de7f20d5c2cc70eef7dc90200f4e4478946388971829fbbc71ad424e2e356d7d4753b4bc1e7d8b6ef70"]) mkdirat(r2, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) 13:11:15 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}}], 0x400000000000107, 0x0) 13:11:15 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x2, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000001180)=""/132) 13:11:15 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000000), r0) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x58, r1, 0x82d4f8471bee9465, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @private0}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @mcast2}, @NLBL_MGMT_A_DOMAIN={0x9, 0x1, '&)!&\x00'}]}, 0x58}}, 0x0) 13:11:15 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b66, &(0x7f00000005c0)={0x1f00, 0x0, &(0x7f00000001c0)="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"}) 13:11:15 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x2, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084503, &(0x7f0000001180)=""/132) 13:11:15 executing program 5: unshare(0x8000400) r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x40044590, 0x0) 13:11:15 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg(r0, &(0x7f0000000880)={&(0x7f0000000140)=@in6={0xa, 0x4e22, 0x0, @loopback}, 0x80, 0x0}, 0x11) 13:11:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WOWLAN(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000008f40)={&(0x7f0000000040)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7e}, {@void, @val={0x8}, @void}}}, 0x1c}}, 0x0) 13:11:15 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f00000003c0)=[{0x6, 0x0, 0xfc, 0xe5}]}, 0x10) bind$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0xda6, 0x4) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340), 0x82, 0x0) sendmsg$NL80211_CMD_GET_POWER_SAVE(r2, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) writev(r1, &(0x7f0000000780)=[{&(0x7f0000000100)="dff548771d77ce8786aca76dda6fb054ab8ea73799d7293eda90ba41a2db81fab55b5415692300a8e64bca2f60e1717f85f06a6bbca90f392b04f34940db7ffccc33ed6ea82296de9683c9e360cd1c477304bd8f9bd74d44a4c7d1c7e625a86cd54b72c5745f475a772b84977a6b05381dbe6259bc510f0f70c3e9946a78c7b5a19e97447799d930f9", 0x89}, {&(0x7f00000001c0)="96431fb1cb119741590ad657dc5e5ce3e5fe9f1f639e6a18bc7b6c1d0b424eb306f34cf2429c62c0fdefbae36740a7169721af852826d7f14b6cae8af86507ff78a1dda991aea5952f43e7e0146a3c035f0113d617240e8940c60cdf3400193bbe3a0c0b1eae5799db27b4ee9c13475210defa4dac9d784e0c89135b82b321f8e43d7a5db9ab1bfd319f472a", 0x8c}, {&(0x7f0000001340)="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", 0x1b9}], 0x3) sendto$inet(r1, &(0x7f00000012c0)="1a268a927f1f6588b967480241ba78600453f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000002c0)={'vlan0\x00'}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000400)={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000500)="71605044cef2b5081e593ada213212a895627eb54e2350c3ef08a897a732ee3cb48f86825c8958d14360786b8ead7dfa5838ce00c61ded8cd624c9918b29ace8ec986e9c0e065bdb79120a91f4decda06ce9454f6beb9c5e207fc1e182d586bcf897d7f936404848e03e19398ca29374a74c3108c1c5790078f69bda289591dc2eb14637139b9fc0605180d2ae7116a7a66792a5d8e594e79003ecbe9a804b64413bc7fa7f0056277d", 0xa9}, {&(0x7f0000000640)="eafe12ad49b2bdd2140ecfb02928d9929a7c61fa20c2109f812a4797ca87a85412378caeb8d9cabb00c704c8810cbfb7018023262f43820b27dd5b25435cb7160bd0a31234d9be23042d6f18901187ac712ef7fa9f84c92aebcc7bbb4e71bf323b7e654c532de9babcd6828db4371ecc3cb99f96d76840e6cce84e352ce00073692350ef349ef72efb310c0e3887dfc0688e2cc4900d11fc22efd71ab3", 0x9d}, {&(0x7f00000007c0)="ffe247aa6b6b8c08f4915cc572df04c36e80ee5d747df2e37a60d3cb0e14dc363d4abed9e0aad9458ea88cc1b343eaebcd97eff3cece2e84e1cc0c964f18fd6374c2e2d171180e2bae14e616cee53722c47c1fd50ca3014a7a9de211d3eed764b48e6a988c94e5e1584b16dfceb66f4a1b8042e32dfc90be50b190f5e0e1332802c09f76659039cf4906bdffd559f7272fb1dc816586ca7354861cd8f3a9f82fed34a50dbec2c226abb88e9042dd866664d4237c48b7765d16c1a5104e8a7a0273c0a4d69f8e39de212a04679e79bb9690036f50c406869a123f6ad0d3476f04ac102e8e173dffa7f8", 0xe9}, {&(0x7f00000008c0)="ba9ca758d4421104cc59aa3d572f852795b778b05151b48acb7afe67b1ea0777cd8ec19d95704298ef395d411013ea96a09411166c03e36d12c2a142a76a687b62b547cb73f2da455c3c343217d208052c42f167e525cfbef494eb1b10b8f0d628da41a94c615a516d7f1f6a062726f1a7c2c405c231656425778e9da89b1da3f255c45e21ad264292c2d42e2a388930185b5802bec2cc73eceec109bfc9a72bd00977c4043071e6ad782cd990a9583ed184cb0ecfd5186e263e6b5e5be58908978d2943932e706d073ec3184e29afe23ac17a716576816d2f068a8a", 0xdc}, {&(0x7f0000000440)}], 0x5, &(0x7f0000000a40)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010100, @remote}}}], 0x20}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) lseek(0xffffffffffffffff, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000440)={0xa, &(0x7f0000000ac0)=[{0x6, 0x8, 0x81, 0x9}, {0x325, 0x8, 0x1f, 0x4e}, {0x9b48, 0xf4, 0x40, 0x7}, {0x9, 0x5, 0xfd}, {0x8, 0x1, 0x6, 0x1}, {0x7, 0x8a, 0x1, 0x1}, {0xd720, 0x81, 0x91, 0x7}, {0x0, 0x1, 0x6d, 0x9}, {0xb05, 0x1, 0x3b, 0xdc4}, {0xfffa, 0x9a, 0x3, 0x6}]}, 0x10) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 13:11:15 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) getrandom(0x0, 0x0, 0x0) r1 = dup(r0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0xc0189436, &(0x7f0000000000)) 13:11:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = semget$private(0x0, 0x8, 0x0) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(r1, &(0x7f0000000100), 0x2d) semtimedop(r1, &(0x7f0000000040), 0x1b9, 0x0) semctl$GETZCNT(r1, 0x0, 0xf, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000400)=[@mss, @timestamp, @mss, @sack_perm], 0x4) semop(r1, &(0x7f0000000000)=[{0x4, 0x0, 0x2000}, {0x1, 0x4}, {0x1, 0x5}, {0x2, 0x19}], 0x4) r2 = semget(0x2, 0x0, 0x200) semctl$SETALL(r2, 0x0, 0x11, &(0x7f0000000040)=[0x2, 0xf001, 0x5, 0x1f, 0x9]) semctl$IPC_RMID(r2, 0x0, 0x0) 13:11:16 executing program 5: unshare(0x8000400) r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x40044590, 0x0) 13:11:16 executing program 4: syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r0 = fork() pidfd_open(r0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) pselect6(0x40, &(0x7f0000000280), &(0x7f00000002c0)={0x7f}, 0x0, 0x0, 0x0) 13:11:16 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b66, &(0x7f00000005c0)={0x1f00, 0x0, &(0x7f00000001c0)="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"}) [ 687.985892][T32356] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 687.995892][ T25] kauditd_printk_skb: 55 callbacks suppressed [ 687.995902][ T25] audit: type=1326 audit(1619961076.002:1203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=32359 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 688.008055][T32363] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 13:11:16 executing program 5: unshare(0x8000400) r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x40044590, 0x0) 13:11:16 executing program 5: unshare(0x8000400) r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x40044590, 0x0) 13:11:16 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b66, &(0x7f00000005c0)={0x1f00, 0x0, &(0x7f00000001c0)="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"}) 13:11:16 executing program 4: semop(0x0, &(0x7f0000000040)=[{0x0, 0x0, 0x3f00}], 0x1f4) 13:11:16 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) listen(r1, 0x0) preadv(r0, &(0x7f0000001800)=[{&(0x7f0000000240)=""/206, 0xce}], 0x1, 0x0, 0x0) 13:11:16 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b66, &(0x7f00000005c0)={0x1f00, 0x0, &(0x7f00000001c0)="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"}) 13:11:16 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in=@loopback, @in6=@ipv4={'\x00', '\xff\xff', @remote}}, {@in=@local, 0x0, 0x33}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x3}, [@algo_auth={0x48, 0x1, {{'hmac(sha256)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) [ 688.834524][ T25] audit: type=1326 audit(1619961076.835:1204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=32359 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 13:11:16 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) getrandom(0x0, 0x0, 0x0) r1 = dup(r0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0xc0189436, &(0x7f0000000000)) 13:11:16 executing program 4: semop(0x0, &(0x7f0000000040)=[{0x0, 0x0, 0x3f00}], 0x1f4) 13:11:16 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x3) 13:11:16 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) getdents64(r0, &(0x7f0000000180)=""/58, 0x3a) 13:11:16 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x456a4056fdf54672) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="2321a598ce2e713c090a"], 0x35) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 13:11:16 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2400, 0x80ffff) 13:11:16 executing program 4: semop(0x0, &(0x7f0000000040)=[{0x0, 0x0, 0x3f00}], 0x1f4) 13:11:16 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x456a4056fdf54672) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="2321a598ce2e713c090a"], 0x35) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 13:11:16 executing program 5: setresgid(0x0, 0xee01, 0x0) clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='io\x00') exit(0x0) fork() wait4(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f00000002c0)=[{&(0x7f0000000300)=""/70, 0x46}], 0x1, 0x0, 0x0) [ 688.954915][ T25] audit: type=1326 audit(1619961076.954:1205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=32427 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 13:11:17 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) dup3(r1, r0, 0x0) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000280)='0', 0x1}, {0x0, 0x2}, {&(0x7f0000000480)="7f", 0x1}], 0x3) 13:11:17 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x456a4056fdf54672) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="2321a598ce2e713c090a"], 0x35) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 13:11:17 executing program 4: semop(0x0, &(0x7f0000000040)=[{0x0, 0x0, 0x3f00}], 0x1f4) [ 689.048171][T32454] new mount options do not match the existing superblock, will be ignored 13:11:17 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) getrandom(0x0, 0x0, 0x0) r1 = dup(r0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0xc0189436, &(0x7f0000000000)) 13:11:17 executing program 4: timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000001c0)) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x20000000005) timer_settime(0x0, 0x0, &(0x7f0000000480)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fe7905543887e7e19cbbbf231956c963dff51e"}) 13:11:17 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x40049409, 0x0) 13:11:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="66530700ae35c6788b1b0fa1f147a8378f3657cdcf86db93aa6ed9006761f62d641b74cbc6a9e00b9e626aa995d690c8a2372286677850ab8e9b75839f0715a567dafe306f08187d007c111495d58553d8c11c606e13da9b8d4bff0000000000000079cb4188d526a566833fe1f9c73899301d879b51848164e7", 0x7a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1e) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:11:17 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x456a4056fdf54672) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="2321a598ce2e713c090a"], 0x35) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 13:11:17 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66f126b0d81a193f030800", 0xb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 13:11:17 executing program 4: timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000001c0)) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x20000000005) timer_settime(0x0, 0x0, &(0x7f0000000480)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fe7905543887e7e19cbbbf231956c963dff51e"}) 13:11:17 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)={0x0, "9878b2521f9ca780b603255ac6244e6da2d9073a5232a013fe5f1a8d441a559917666fbd0f3c1c5c478afd88c10315aa69ead89b0f0384986d266360764b52f0"}, 0x48, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x2, 0x0, 0x0, r0, 0x0) [ 689.810966][ T25] audit: type=1326 audit(1619961077.797:1206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=32470 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 13:11:17 executing program 5: setresgid(0x0, 0xee01, 0x0) clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='io\x00') exit(0x0) fork() wait4(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f00000002c0)=[{&(0x7f0000000300)=""/70, 0x46}], 0x1, 0x0, 0x0) 13:11:17 executing program 4: timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000001c0)) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x20000000005) timer_settime(0x0, 0x0, &(0x7f0000000480)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fe7905543887e7e19cbbbf231956c963dff51e"}) 13:11:17 executing program 0: setresuid(0x0, 0x0, 0xee00) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='wchan\x00') exit(0x0) preadv(r0, &(0x7f0000000000)=[{&(0x7f0000001380)=""/4080, 0xff0}], 0x1, 0x0, 0x0) 13:11:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x20012, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000440)="d0", 0x1}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2fc903c2b54706c05e4cb2e2875107608f9143f299d8e3f78f4bf076484885fd4089cb084607435b77c7f", 0x65}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x36) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 13:11:18 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) getrandom(0x0, 0x0, 0x0) r1 = dup(r0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0xc0189436, &(0x7f0000000000)) 13:11:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x20012, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000440)="d0", 0x1}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2fc903c2b54706c05e4cb2e2875107608f9143f299d8e3f78f4bf076484885fd4089cb084607435b77c7f", 0x65}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x36) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 13:11:18 executing program 4: timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000001c0)) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x20000000005) timer_settime(0x0, 0x0, &(0x7f0000000480)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fe7905543887e7e19cbbbf231956c963dff51e"}) [ 690.678236][ T25] audit: type=1326 audit(1619961078.660:1207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=32523 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 13:11:20 executing program 1: r0 = gettid() process_vm_writev(r0, &(0x7f0000001340)=[{&(0x7f0000000000)=""/92, 0x5c}, {0x0, 0x10}, {&(0x7f00000000c0)=""/176, 0xb0}, {&(0x7f0000000180)=""/50, 0x32}], 0x4, &(0x7f00000019c0)=[{&(0x7f00000013c0)=""/231, 0xe7}, {&(0x7f00000014c0)=""/55, 0x37}], 0x2, 0x0) 13:11:20 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)={@multicast2, @remote, 0x2}, 0x10) 13:11:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x20012, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000440)="d0", 0x1}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2fc903c2b54706c05e4cb2e2875107608f9143f299d8e3f78f4bf076484885fd4089cb084607435b77c7f", 0x65}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x36) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 13:11:20 executing program 4: openat2$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0xc041}, 0x27) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x88b000, &(0x7f0000000500)=ANY=[]) futimesat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) 13:11:20 executing program 5: setresgid(0x0, 0xee01, 0x0) clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='io\x00') exit(0x0) fork() wait4(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f00000002c0)=[{&(0x7f0000000300)=""/70, 0x46}], 0x1, 0x0, 0x0) 13:11:20 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) getrlimit(0x0, &(0x7f0000000040)) 13:11:20 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007ffd) fallocate(r0, 0x0, 0x0, 0x8) 13:11:20 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="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", 0xfc) [ 692.845641][ T25] audit: type=1326 audit(1619961080.802:1208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=32537 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 13:11:20 executing program 2: clone(0x66100d00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_netdev_private(r0, 0x8930, &(0x7f0000000000)) 13:11:20 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee00}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0xf}], 0x1, 0x0) 13:11:20 executing program 1: prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="240000001e0007021dfffd946f610500020003e8fe0208010001080008000e000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 692.892951][T32551] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 692.900198][T32551] IPv6: NLM_F_CREATE should be set when creating new route [ 692.907425][T32551] IPv6: NLM_F_CREATE should be set when creating new route 13:11:20 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000140), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000240)={0x40, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x18, 0x8, 0x0, 0x1, [{0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x25}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x40}}, 0x0) 13:11:20 executing program 2: clone(0x66100d00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_netdev_private(r0, 0x8930, &(0x7f0000000000)) 13:11:20 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="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", 0xfc) [ 692.926389][ T25] audit: type=1326 audit(1619961080.852:1209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=32537 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=97 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 692.956727][T32568] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 13:11:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x20012, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000440)="d0", 0x1}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2fc903c2b54706c05e4cb2e2875107608f9143f299d8e3f78f4bf076484885fd4089cb084607435b77c7f", 0x65}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x36) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 13:11:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_io_uring_setup(0x2380, &(0x7f0000000200)={0x0, 0xe8cf, 0x2a}, &(0x7f000020f000/0x2000)=nil, &(0x7f000070a000/0x4000)=nil, &(0x7f0000000280), &(0x7f00000002c0)) [ 692.981458][ T25] audit: type=1326 audit(1619961080.852:1210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=32537 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 693.028099][T32585] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 693.037544][ T25] audit: type=1326 audit(1619961080.852:1211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=32537 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=157 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 693.067366][ T25] audit: type=1326 audit(1619961080.852:1212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=32537 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 13:11:21 executing program 5: setresgid(0x0, 0xee01, 0x0) clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='io\x00') exit(0x0) fork() wait4(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f00000002c0)=[{&(0x7f0000000300)=""/70, 0x46}], 0x1, 0x0, 0x0) 13:11:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) 13:11:21 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="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", 0xfc) 13:11:21 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000004c0)="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", 0x1ba}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 13:11:21 executing program 2: clone(0x66100d00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_netdev_private(r0, 0x8930, &(0x7f0000000000)) 13:11:21 executing program 3: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, 0x0, 0x1) io_uring_enter(r0, 0x6196, 0x0, 0x0, 0x0, 0x0) dup3(r4, r3, 0x0) 13:11:21 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="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", 0xfc) 13:11:21 executing program 2: clone(0x66100d00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_netdev_private(r0, 0x8930, &(0x7f0000000000)) 13:11:21 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) unshare(0x40020000) sendto$inet6(r0, &(0x7f0000000240)="1c0000001200050f0c1000000049090000000a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0x314aaee635b9c1b6, 0x0, 0x0, 0xfffffffffffffeeb) write(0xffffffffffffffff, &(0x7f0000000000)="15000000140007", 0x7) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6, @random="d9725ae91e17"}, 0x10) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="ffad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='-', 0x10a69, 0x10, 0x0, 0x4b6ae4f95a5de3b2) [ 693.694937][T32602] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 13:11:21 executing program 2: openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, &(0x7f0000000300)) socketpair(0x8, 0x0, 0x2, 0x0) syz_genetlink_get_family_id$gtp(0x0, 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, 0x0, 0x0) syz_io_uring_setup(0x3229, &(0x7f00000009c0)={0x0, 0xe03e, 0x8, 0x0, 0x109}, &(0x7f0000001000/0x2000)=nil, &(0x7f0000001000/0x2000)=nil, &(0x7f0000000a40), &(0x7f0000000a80)) 13:11:21 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000004c0)="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", 0x1ba}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 13:11:21 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x6aab42, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) [ 693.756340][T32634] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 693.793855][T32638] netlink: 44205 bytes leftover after parsing attributes in process `syz-executor.1'. 13:11:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r2, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x80ffff) 13:11:22 executing program 2: unshare(0x400) r0 = fsopen(&(0x7f0000000080)='cgroup\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x4, &(0x7f0000000000)='source', &(0x7f0000000140)='#\n$)-.\x02\xcc\xd7\xb2f\xcdY\xb9\xc77\xb2a\x10\xd7\xef\xc5\n2s\x88\n\x13:\xd6\xfa\xd5?\xc7\xfd&\x8d*\xbb|&,\xe9\xa3\'\x91>C\x1bV\x87\xeb\xfe\x1c\x9d\\C\xfeI%\xae\x8fKHq\x89\x83\xbb\x9dC\xd6Hy\xfao\x04\xa4\xb6\x88\xdb\xa1b\xae\xa7\x87\xcc\xc7\xa4\xdc\n://\xf3\x96\xaf\b1\x1b48\bu\x01\xab\x90\x8d_r\xe7\r\'-06,\xff\x84x\'+\xd5\xd4?[e\x19\xa3\\J\xe9\x8a\xb9\xe495\x12', 0xfeffffff00000000) 13:11:22 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt(r0, 0xff, 0x7, 0x0, &(0x7f0000000080)=0xfffffffffffffe32) 13:11:22 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) capget(&(0x7f0000000400)={0x19980330, r1}, &(0x7f0000000440)) 13:11:22 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='{-X,\x99(!\xbf\\(*\xfc\xea\xc3:\x00\xaej\xbc\x10\x8b\xbf\xa2\xff\xad\x019\xc8<\xc1)[\xf7;\x15a\xea\x17\xfc\xf1\x00+\xab\x805\xb2x\xde,\xc5\x90\xd2\xf7`\xa7\x1b\xb2\xd2\x15b\x86\n~\xb3V\xea\x8b-\xe5\xba\x04\xe4\x05\xd6\xfd\x94\xa7\x8dK\xeaSg \xe4u\v\x00\xa9\xf1\xbb\x19\xf7\x00z\x05\x90\\\xce\xfa\xce\x13I\xa7i!>\xe1\xfb\a\x8dT\xe9\xcfQ\xbc\x8c/g\xf6\x98\x13\xa1Ks\xd3\f;\x90b\xf7e\x86\xd4\xcb\xd2\x88\'\xf4\xe6\xeb\xf7\x9e\xe9\xec\xfc\xb8C\xe4\xbbd\xbb0c\x81\\\xddB\'_\xeds\x14{\xf5\x82\xa7hz\xa4r\x80\xe0\x99J\xcc-4\x19P.') 13:11:22 executing program 5: unshare(0x2a000400) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 13:11:22 executing program 1: eventfd(0x0) pselect6(0x40, &(0x7f0000000000)={0x9}, 0x0, 0x0, 0x0, 0x0) 13:11:22 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f00000003c0)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000780)=[{&(0x7f0000000100)="dff548771d77ce8786aca76dda6fb054ab8ea73799d7293eda90ba41a2db81fab55b5415692300a8e64bca2f60e1717f85f06a6bbca90f392b04f34940db7ffccc33ed6ea82296de9683c9e360cd1c477304bd8f9bd74d44a4c7d1c7e625a86cd54b72c5745f475a772b84977a6b05381dbe6259bc510f0f70c3e9946a78c7b5a19e97447799d930f9", 0x89}, {&(0x7f00000001c0)="96431fb1cb119741590ad657dc5e5ce3e5fe9f1f639e6a18bc7b6c1d0b424eb306f34cf2429c62c0fdefbae36740a7169721af852826d7f14b6cae8af86507ff78a1dda991aea5952f43e7e0146a3c035f0113d617240e8940c60cdf3400193bbe3a0c0b1eae5799db27b4ee9c13475210defa4dac9d784e0c89135b82b321f8e43d7a5db9ab1bfd319f", 0x8a}, {&(0x7f0000001340)="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", 0x1b9}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="1a268a927f1f6588b967480241ba78600453f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x12b4, 0x11, 0x0, 0x27) 13:11:22 executing program 5: unshare(0x2a000400) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 694.579913][ T25] audit: type=1326 audit(1619961082.528:1213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=32667 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665f9 code=0x0 13:11:22 executing program 5: unshare(0x2a000400) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 695.416607][ T25] audit: type=1326 audit(1619961083.361:1214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=32667 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665f9 code=0x0 13:11:24 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000004c0)="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", 0x1ba}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 13:11:24 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x759}], 0x0, 0x0) 13:11:24 executing program 5: unshare(0x2a000400) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 13:11:24 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r2, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x80ffff) 13:11:24 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r2, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x80ffff) 13:11:24 executing program 2: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f00000000c0)=ANY=[@ANYBLOB="00f50000000020"]) read$char_usb(0xffffffffffffffff, 0x0, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 13:11:24 executing program 1: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0xf12}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6e0968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9ae0278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0xf2b}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 13:11:24 executing program 5: perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:11:24 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r2, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x80ffff) 13:11:24 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)="8224", 0x2}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="24000000000000002900000032000000ff000109401001fc91a19afac3e7257241"], 0x28}}], 0x2, 0x40008000) 13:11:24 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000000)={@multicast1, @remote}, 0x8) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @local}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x26, &(0x7f00000002c0)={@multicast1, @remote, @private}, 0xc) 13:11:24 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r2, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x80ffff) 13:11:27 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000004c0)="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", 0x1ba}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 13:11:27 executing program 5: unshare(0x20000600) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x40800080, 0x0, 0x0, 0x0, 0x0) clone(0x40000, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10010, 0xffffffffffffffff, 0xb676e000) exit_group(0x4a00000000000000) 13:11:27 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x7, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) fchown(r1, 0xee00, 0xee00) 13:11:27 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r2, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x80ffff) 13:11:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r2, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x80ffff) 13:11:27 executing program 2: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f00000000c0)=ANY=[@ANYBLOB="00f50000000020"]) read$char_usb(0xffffffffffffffff, 0x0, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 13:11:27 executing program 5: unshare(0x20000600) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x40800080, 0x0, 0x0, 0x0, 0x0) clone(0x40000, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10010, 0xffffffffffffffff, 0xb676e000) exit_group(0x4a00000000000000) 13:11:27 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='4\xacXrcO\b\xc4ut/e\x00'/28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000600)=ANY=[@ANYBLOB="7f454c46000000d20000000000e9ff0003003e0000001000000006000000001e40000000000000000000000800008b000000001000003800020000000000010003"], 0x44) write$P9_RGETATTR(r0, &(0x7f0000000140)={0xa0, 0x19, 0xfffc, {0x0, {}, 0xc8}}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 13:11:27 executing program 5: unshare(0x20000600) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x40800080, 0x0, 0x0, 0x0, 0x0) clone(0x40000, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10010, 0xffffffffffffffff, 0xb676e000) exit_group(0x4a00000000000000) 13:11:27 executing program 0: ustat(0x9, &(0x7f00000000c0)) ustat(0x1, &(0x7f0000000080)) 13:11:27 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8953, &(0x7f0000000040)={'sit0\x00'}) 13:11:27 executing program 5: unshare(0x20000600) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x40800080, 0x0, 0x0, 0x0, 0x0) clone(0x40000, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10010, 0xffffffffffffffff, 0xb676e000) exit_group(0x4a00000000000000) 13:11:30 executing program 2: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f00000000c0)=ANY=[@ANYBLOB="00f50000000020"]) read$char_usb(0xffffffffffffffff, 0x0, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 13:11:30 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10dfe}], 0x0, &(0x7f00000000c0)=ANY=[]) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="d884d3f26d2b7ae9c108b8ebf28ac2a505fa638b4962cf0611b2cd21c746df62d8315292c2f180257b02000000000000", @ANYBLOB="b7492dcb400000cb1b800020874af7956b2e"], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 13:11:30 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r3 = socket(0x400000000000010, 0x3, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r2, 0x0, 0x31, 0x0, 0x0) 13:11:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000200), 0xc, 0x1e1401) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x11, 0x6}], 0x18) write$evdev(r1, &(0x7f0000000040), 0x990) 13:11:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x8901, &(0x7f0000000000)={@loopback={0x8000000000}, @mcast1, @mcast2}) 13:11:30 executing program 4: set_mempolicy(0x4, 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000000200), 0x0, 0x1}, {0x0, 0x0, 0x1e64abfb}]) 13:11:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x102, &(0x7f0000000440)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 13:11:30 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setuid(0xee00) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f0000000080)) 13:11:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clock_getres(0x0, &(0x7f0000000040)) 13:11:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@FOU_ATTR_LOCAL_V6={0x14, 0x7, @mcast1}]}, 0x33fe0}}, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f00000002c0)=0x1c, 0x4) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x10, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8}]}]}]}, 0x24}}, 0x0) 13:11:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount$9p_xen(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1091ed, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004105) 13:11:30 executing program 3: r0 = syz_io_uring_setup(0x574b, &(0x7f0000000100)={0x0, 0x4770}, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = eventfd2(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r1, 0x1) 13:11:31 executing program 2: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f00000000c0)=ANY=[@ANYBLOB="00f50000000020"]) read$char_usb(0xffffffffffffffff, 0x0, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 13:11:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount$9p_xen(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1091ed, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004105) 13:11:31 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000140)={0x3, &(0x7f0000000000)=[{0x50}, {0x20}, {0x6}]}, 0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 13:11:31 executing program 1: name_to_handle_at(0xffffffffffffff9c, 0x0, &(0x7f00000000c0)=@GFS2_SMALL_FH_SIZE={0x10}, 0x0, 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x48) 13:11:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7ef", 0x3f}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 13:11:31 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000140)={0xffffffff}) 13:11:31 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_misc(r0, &(0x7f0000000180)={'syz0', '6'}, 0x5) r1 = perf_event_open(&(0x7f0000000080)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000100)='syz0') 13:11:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount$9p_xen(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1091ed, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004105) 13:11:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec3, 0x0) timer_create(0x0, &(0x7f0000000500)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) write$binfmt_script(r1, 0x0, 0x11e) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) timer_create(0x0, &(0x7f0000000800)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) write$char_usb(r1, &(0x7f0000000540)="e3", 0x1) 13:11:31 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) memfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) 13:11:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount$9p_xen(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1091ed, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004105) 13:11:31 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000200)=""/4096, 0x18) 13:11:32 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000200)=""/4096, 0x18) 13:11:32 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000011c0), 0x0, 0x0) fcntl$getflags(r0, 0x40e) 13:11:32 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='timerslack_ns\x00') write$P9_RREAD(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x39) 13:11:34 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="0201a6ffffff0a000000ff45ac0000fffffffd000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 13:11:34 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)={0x50, 0x1, 0x1, 0x401, 0x0, 0x0, {0xa}, [@CTA_TUPLE_REPLY={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev}, {0x14, 0x4, @private0}}}]}]}, 0x50}}, 0x0) 13:11:34 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000200)=""/4096, 0x18) 13:11:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="66530700ae35c6788b1b0fa1f14704008f3657cdcf86db939d6c818645d0375cd86e59006761f62d641b74cbc6690b9450cb65ced0eda9e00b9e626aa995d690c8a2372286677850ab8e9b75839f0715468fc58f6ebd49cc445ec4fb8aaf95c7e1d650e3a567dafe306f08187d077c111495d58553d8c11c606e13da9b8d4bff00000ee6ba73f418ee5db6", 0x8b}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1e) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:11:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/diskstats\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4000000000010046) 13:11:34 executing program 4: rt_sigprocmask(0x0, &(0x7f000078b000)={[0xfffffffffffffffd]}, 0x0, 0x8) r0 = gettid() r1 = getpid() rt_tgsigqueueinfo(r1, r0, 0x4, &(0x7f0000000080)={0x0, 0x0, 0x5}) r2 = signalfd(0xffffffffffffffff, &(0x7f0000000100)={[0x7f]}, 0x8) read(r2, &(0x7f0000000740)=""/377, 0x179) 13:11:34 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x2c, 0x2, 0x1, 0x801, 0x0, 0x0, {0xa}, [@CTA_TUPLE_REPLY={0x4, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @broadcast}}}]}]}, 0x2c}}, 0x0) 13:11:34 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000200)=""/4096, 0x18) 13:11:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xd6, &(0x7f0000000140)="7430abdd777e5d2a816eac50bdca88577f315f96764e1821a759a9d88c08ef11c583ffa106d883c8213ef307a379bd7e425cd1b71f1f3f03322fe00d534fd8d2f676cbadfee1936f049ade103c89d5e4224f0105906f231bd3e0d9866152643f606b19604940bf58913250186970428e095ac11521b31065ebe09c523eaabaf647609c1eb9239d0be1d2e2fbe7c0f1542e86c466597aa9bb182ad6c2b812024cc68d0d9eb662f5de17701ce3c75c1d08783d556fa24562bf5c30f36d168d3802f322bb8f84c534813c287b71a38d053d87e48533891e"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 13:11:34 executing program 4: set_mempolicy(0x1, &(0x7f0000000400)=0x5, 0x800) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x14, 0x3, 0x1, 0x201, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) [ 706.945479][ T477] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 706.954775][ T477] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 13:11:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xd6, &(0x7f0000000140)="7430abdd777e5d2a816eac50bdca88577f315f96764e1821a759a9d88c08ef11c583ffa106d883c8213ef307a379bd7e425cd1b71f1f3f03322fe00d534fd8d2f676cbadfee1936f049ade103c89d5e4224f0105906f231bd3e0d9866152643f606b19604940bf58913250186970428e095ac11521b31065ebe09c523eaabaf647609c1eb9239d0be1d2e2fbe7c0f1542e86c466597aa9bb182ad6c2b812024cc68d0d9eb662f5de17701ce3c75c1d08783d556fa24562bf5c30f36d168d3802f322bb8f84c534813c287b71a38d053d87e48533891e"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 13:11:34 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x2000c7ec, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto$inet(r0, 0x0, 0x0, 0x2004c0c0, 0x0, 0x0) [ 707.054950][ T498] loop3: detected capacity change from 0 to 1 13:11:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="0201a6ffffff0a000000ff45ac0000fffffffd000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 13:11:35 executing program 2: r0 = syz_io_uring_setup(0x2de1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f00003a1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, &(0x7f0000000700), 0x17}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000580)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=[{0x68, 0x0, 0x0, "797b0bb48011eb042297253373fcdd2ecec6621903e12cf078b774cbeeb95c729877bf164f5fb529fa44cf8691214aa6a49fd97a5235a65f08045c0452f30de279e065695cbab5261bcbac5950205a78a8"}, {0x8e0, 0x0, 0x0, "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"}], 0x948}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) 13:11:35 executing program 5: mknod(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x8001420, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x2, 0x0) r1 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000340)=ANY=[], 0x1) r2 = open(&(0x7f0000000300)='./bus\x00', 0xa02, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x1a7303, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 13:11:35 executing program 4: socketpair$unix(0x1, 0x200400000000003, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x924924924924c31, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) ppoll(&(0x7f0000000100)=[{r1}], 0x1, 0x0, 0x0, 0x0) close(r0) 13:11:35 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x5) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000180)=0xffffffc1, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x380000, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000007e40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[], 0xc}}], 0x1, 0x0) 13:11:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xd6, &(0x7f0000000140)="7430abdd777e5d2a816eac50bdca88577f315f96764e1821a759a9d88c08ef11c583ffa106d883c8213ef307a379bd7e425cd1b71f1f3f03322fe00d534fd8d2f676cbadfee1936f049ade103c89d5e4224f0105906f231bd3e0d9866152643f606b19604940bf58913250186970428e095ac11521b31065ebe09c523eaabaf647609c1eb9239d0be1d2e2fbe7c0f1542e86c466597aa9bb182ad6c2b812024cc68d0d9eb662f5de17701ce3c75c1d08783d556fa24562bf5c30f36d168d3802f322bb8f84c534813c287b71a38d053d87e48533891e"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) [ 707.112057][ T498] loop3: p1 p2 p3 p4 [ 707.116301][ T498] loop3: p1 start 10 is beyond EOD, truncated [ 707.122406][ T498] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 707.130024][ T498] loop3: p3 start 225 is beyond EOD, truncated [ 707.136201][ T498] loop3: p4 size 3657465856 extends beyond EOD, truncated 13:11:35 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x4c}, {0x16}]}) 13:11:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xd6, &(0x7f0000000140)="7430abdd777e5d2a816eac50bdca88577f315f96764e1821a759a9d88c08ef11c583ffa106d883c8213ef307a379bd7e425cd1b71f1f3f03322fe00d534fd8d2f676cbadfee1936f049ade103c89d5e4224f0105906f231bd3e0d9866152643f606b19604940bf58913250186970428e095ac11521b31065ebe09c523eaabaf647609c1eb9239d0be1d2e2fbe7c0f1542e86c466597aa9bb182ad6c2b812024cc68d0d9eb662f5de17701ce3c75c1d08783d556fa24562bf5c30f36d168d3802f322bb8f84c534813c287b71a38d053d87e48533891e"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 13:11:35 executing program 0: madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x2) 13:11:35 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYRES16, @ANYBLOB="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"], 0x2}}, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d0a0b49ff70880000800328000402100001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xfcae) [ 707.255994][ T25] audit: type=1326 audit(1619961095.106:1215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=532 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 707.288895][ T539] loop3: detected capacity change from 0 to 1 13:11:35 executing program 0: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) recvfrom$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) dup2(r1, r0) 13:11:35 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x14) chmod(&(0x7f0000000180)='./file0\x00', 0x23f) mkdir(&(0x7f0000000040)='./file0/file1\x00', 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setreuid(0x0, r0) rmdir(&(0x7f0000000100)='./file0/file1\x00') [ 707.338611][ T539] loop3: p1 p2 p3 p4 [ 707.369997][ T549] netlink: 'syz-executor.2': attribute type 16 has an invalid length. [ 707.378232][ T549] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 707.386961][ T549] netlink: 2508 bytes leftover after parsing attributes in process `syz-executor.2'. [ 707.404459][ T539] loop3: p1 start 10 is beyond EOD, truncated [ 707.410530][ T539] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 707.435599][ T539] loop3: p3 start 225 is beyond EOD, truncated [ 707.441797][ T539] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 707.444598][ T557] netlink: 'syz-executor.2': attribute type 16 has an invalid length. [ 707.457062][ T557] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 707.465395][ T557] netlink: 2508 bytes leftover after parsing attributes in process `syz-executor.2'. 13:11:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="0201a6ffffff0a000000ff45ac0000fffffffd000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 13:11:35 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x14) chmod(&(0x7f0000000180)='./file0\x00', 0x23f) mkdir(&(0x7f0000000040)='./file0/file1\x00', 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setreuid(0x0, r0) rmdir(&(0x7f0000000100)='./file0/file1\x00') 13:11:35 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_PMKSA(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="03070000000000000000050000000800030001"], 0x28}}, 0x0) [ 707.654115][ T573] loop3: detected capacity change from 0 to 1 [ 707.671426][ T579] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 707.681234][ T580] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 707.706797][ T573] loop3: p1 p2 p3 p4 [ 707.711197][ T573] loop3: p1 start 10 is beyond EOD, truncated [ 707.717313][ T573] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 707.724865][ T573] loop3: p3 start 225 is beyond EOD, truncated [ 707.731223][ T573] loop3: p4 size 3657465856 extends beyond EOD, truncated 13:11:35 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{}, {0x45}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 13:11:35 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) 13:11:35 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x14) chmod(&(0x7f0000000180)='./file0\x00', 0x23f) mkdir(&(0x7f0000000040)='./file0/file1\x00', 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setreuid(0x0, r0) rmdir(&(0x7f0000000100)='./file0/file1\x00') 13:11:35 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_PMKSA(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="03070000000000000000050000000800030001"], 0x28}}, 0x0) 13:11:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="0201a6ffffff0a000000ff45ac0000fffffffd000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 13:11:36 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000000c0)=0x7) shutdown(r0, 0x1) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000300), 0x4) 13:11:36 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x14) chmod(&(0x7f0000000180)='./file0\x00', 0x23f) mkdir(&(0x7f0000000040)='./file0/file1\x00', 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setreuid(0x0, r0) rmdir(&(0x7f0000000100)='./file0/file1\x00') [ 708.105135][ T25] audit: type=1326 audit(1619961095.949:1216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=592 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 708.130354][ T596] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 708.173056][ T25] audit: type=1326 audit(1619961095.978:1217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=591 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 708.199666][ T25] audit: type=1326 audit(1619961095.978:1218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=591 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=282 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 708.206145][ T604] loop3: detected capacity change from 0 to 1 [ 708.224004][ T25] audit: type=1326 audit(1619961095.978:1219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=591 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 13:11:36 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) mlock(&(0x7f00002b9000/0x3000)=nil, 0x3000) 13:11:36 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_PMKSA(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="03070000000000000000050000000800030001"], 0x28}}, 0x0) 13:11:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000001000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 13:11:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000600100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000000040)={[{@journal_async_commit}]}) [ 708.254659][ T25] audit: type=1326 audit(1619961095.978:1220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=591 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=317 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 708.278824][ T25] audit: type=1326 audit(1619961095.978:1221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=591 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 13:11:36 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) [ 708.324168][ T604] loop3: p1 p2 p3 p4 [ 708.342308][ T604] loop3: p1 start 10 is beyond EOD, truncated [ 708.348432][ T604] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 708.358128][ T604] loop3: p3 start 225 is beyond EOD, truncated [ 708.358213][ T622] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 708.364308][ T604] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 708.421617][ T1031] loop3: p1 p2 p3 p4 [ 708.425756][ T1031] loop3: p1 start 10 is beyond EOD, truncated [ 708.431879][ T1031] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 708.439533][ T1031] loop3: p3 start 225 is beyond EOD, truncated [ 708.445954][ T1031] loop3: p4 size 3657465856 extends beyond EOD, truncated 13:11:36 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{}]}, 0x10) 13:11:36 executing program 2: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) vmsplice(r1, &(0x7f0000000900)=[{&(0x7f0000000180)="ba", 0x1}], 0x1, 0x0) 13:11:36 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @loopback}, {0x0, @remote}, 0xfdfdffff, {0x2, 0x0, @remote}, 'lo\x00'}) 13:11:36 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_PMKSA(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="03070000000000000000050000000800030001"], 0x28}}, 0x0) 13:11:36 executing program 0: symlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0) 13:11:36 executing program 3: r0 = socket(0x400000000010, 0x2, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_HOPOPTS(r1, 0x29, 0x36, &(0x7f0000000000)=ANY=[], 0x58) setsockopt$inet6_IPV6_HOPOPTS(r1, 0x29, 0x6, 0x0, 0x0) recvmsg(r1, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=""/102398, 0x18ffe}, 0x55ed094faf31cd3b) setsockopt$sock_int(r0, 0x1, 0x22, &(0x7f00000000c0)=0x525, 0x4) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'btrfs.', '^&*^+\x00'}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x581102, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000a, 0x12, r2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f000001c240)={'ip6_vti0\x00', &(0x7f000001c580)={'syztnl2\x00', 0x0, 0x4, 0x81, 0x3, 0x8, 0x1, @local, @dev={0xfe, 0x80, '\x00', 0x3b}, 0x10, 0x700, 0x9, 0xa46e}}) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmmsg(r2, &(0x7f000001c3c0)=[{{&(0x7f0000000100)=@rc={0x1f, @none}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000180)=""/180, 0xb4}], 0x1, &(0x7f0000000280)=""/235, 0xeb}, 0xfffffff9}, {{&(0x7f0000000380)=@ax25={{0x3, @rose}, [@null, @netrom, @null, @bcast, @null, @netrom, @rose, @netrom]}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000400)=""/169, 0xa9}, {&(0x7f00000004c0)=""/20, 0x14}, {&(0x7f0000000500)=""/168, 0xa8}, {&(0x7f00000005c0)=""/119, 0x77}], 0x4, &(0x7f0000000680)=""/56, 0x38}, 0x8}, {{&(0x7f00000006c0)=@ethernet={0x0, @link_local}, 0x80, &(0x7f0000001780)=[{&(0x7f0000000740)=""/59, 0x3b}, {&(0x7f000001c700)=""/4098, 0x1002}, {&(0x7f000001a840)=""/165, 0xa5}], 0x3, &(0x7f000001a900)=""/255, 0xff}, 0xc4}, {{&(0x7f000001aa00)=@phonet, 0x80, &(0x7f000001ab00)=[{&(0x7f00000017c0)=""/10, 0xa}, {&(0x7f000001aa80)=""/34, 0x22}, {&(0x7f000001aac0)=""/14, 0xe}], 0x3, 0x0, 0xffffffffffffffeb}, 0xffffff81}, {{&(0x7f000001ab40)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f000001c140)=[{&(0x7f000001c600)=""/240, 0xf0}, {&(0x7f000001acc0)=""/21, 0x15}, {&(0x7f000001ad00)=""/103, 0x67}, {&(0x7f000001ad80)=""/159, 0x9f}, {&(0x7f000001ae40)=""/156, 0x9c}, {&(0x7f000001af00)=""/4096, 0x1000}, {&(0x7f000001bf00)=""/138, 0x8a}, {&(0x7f000001bfc0)=""/233, 0xe9}, {&(0x7f000001c0c0)=""/65, 0x41}], 0x9, &(0x7f000001c200)=""/30, 0x1e}, 0x10001}, {{0x0, 0x0, &(0x7f000001c280)=[{&(0x7f000001c240)}], 0x1, &(0x7f000001c2c0)=""/227, 0xe3}, 0x3}], 0x6, 0x40, &(0x7f000001c540)={0x77359400}) write(r0, &(0x7f0000000000)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000b0000000000", 0x24) [ 708.912682][ T25] audit: type=1326 audit(1619961096.777:1222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=592 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 13:11:36 executing program 4: setfsuid(0xffffffffffffffff) 13:11:36 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7a}]}) time(0x0) 13:11:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x110, &(0x7f0000000140)="c4c691019919da078a0098d1e0a593b0c52606991437be044fa4ea57ff22eafabe19af3dc4a01419cd2386ad59157689c9c6a47312334cd4afab5d8673c6f1e036a1fd1bb12a96ac2b7f0fb4aabebae8dc5dffbcd48a70502156e2bb08487ddca7fdb8e4189ebe84c95ed983ac128b83e5150eaa22c1b17e8b0686d3b5a92c184464c96a362a3bbd10db5b4763ba355156641ba9f11e37b4944bd60bb0b536473b19cbbfdaddf5a30f0e8ff6ad7fd0edd5f52735999a5f62287f651c37a552be88aaa77a8ce88cb9d8fabace9135398c898c4be4cdb94fbaeadd3684af6a1469edb7e81cadff903172d069b7063c799b9365b5478149404407044f4c7bbe5b3a82f60399fb11ea5330ee1a26cf3af8c2"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x40) 13:11:36 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) bind$inet6(r0, &(0x7f0000000980)={0xa, 0x0, 0x0, @remote}, 0x1c) [ 709.002581][ T652] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 13:11:36 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x100000001, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x26, &(0x7f0000000080)) fcntl$lock(r0, 0x26, &(0x7f0000000180)={0x2, 0x0, 0x0, 0x2}) 13:11:36 executing program 1: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000240)=[{&(0x7f0000000000)="4c0000001e00ff10ff3a150099a283ff07b8008000f0ffff000000060040150024001d001fc411a0b598bc593ab6821148a730cc33a49868c62b2ca654a6613b6aab", 0x42}, {&(0x7f0000000440)="0baba02e95c8c0408265", 0xa}], 0x2}, 0x0) 13:11:36 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fsopen(&(0x7f0000000100)='configfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000000)='mqueue\x00', &(0x7f0000000140)='mqueue\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000240)='ppp1[\x00', &(0x7f00000004c0)='\x15\xcc\x10\xddu\xfe\x7f\xcb\f\xc6\xc1^N\xec\x95\xa5\x9a~\x8f\xba[\xaeC(\xbf\xf31\xee\x00\xfc\xd4\xc2\x7f\xb9\x8f\x94k\x85n\x9f\x1e\xf7\xee\xb7\x00\x8bg$?OM+\x9d\x1f\x05\xf4\x8d%\xf6\xb5l\x8f\xaf<\xef\"V\x9f\xde\xf5\xa6\xe8\xa0\x99R}\xa9\x83\xd9\xe2\xfa}\xaf\xf3\xc0\xd0\x81to\xe9k4U1\xea\xa3\xa2F\x01\xf2$\xd8\xea\xe0 I\xa8\xd4\nYp\x9c-P\x90\xea?o\xc4\x17]cW\xd5\xa9Y\x8d\xffp\x9a\n;\xb8\xf1)e\x7f\xc8G\x8dv\xfb\xe3\x03\x10WV\xfa\xed\xb7\xee\x1eW\xc7\xbc\xe3S\x97\x00'/171, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000300)='.vboxnet0^keyring,%\x00', &(0x7f0000000480)='selinuxwlan0eth1+md5sum\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000340)='&em0wlan1-\x00', &(0x7f0000000380)='bdevtrusted\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f00000001c0)='/dev/audio\x00', &(0x7f0000000200)='/dev/audio\x00', 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r1, 0x4, &(0x7f0000000400)='\xc8:,#\x00', &(0x7f00000005c0)='./file0\x00', 0xffffffffffffff9c) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000180)='!-]F^\x00', &(0x7f0000000280)='i-\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000040)='ppp1[\x00', &(0x7f0000000080)='/dev/audio\x00', 0x0) close(r1) 13:11:37 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae897094e7", 0x9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x1e) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0212ab2aee00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="08000500", @ANYRES32, @ANYBLOB="81000020", @ANYRES32=0xee00, @ANYBLOB="01000000", @ANYRES32, @ANYBLOB="491023ef", @ANYRES32, @ANYBLOB="08000500", @ANYRES32=0xee00, @ANYBLOB='t'], 0x7c, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) 13:11:37 executing program 3: clone(0x4300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f00000027c0)='/proc/self/exe\x00', 0x0, 0x0) waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x8, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x20012, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0xf38055be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit(0x0) setitimer(0x0, &(0x7f0000000000)={{}, {0x0, 0x2710}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 13:11:37 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet6(0xa, 0x803, 0x6) setsockopt$inet6_int(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) 13:11:37 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x100000001, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x26, &(0x7f0000000080)) fcntl$lock(r0, 0x26, &(0x7f0000000180)={0x2, 0x0, 0x0, 0x2}) 13:11:37 executing program 5: set_mempolicy(0x2, &(0x7f0000000000)=0x100000001, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x26, &(0x7f0000000080)) fcntl$lock(r0, 0x26, &(0x7f0000000180)={0x2, 0x0, 0x0, 0x2}) 13:11:37 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp, 0x10, 0x0, 0x0, 0x1}, r0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 13:11:37 executing program 5: set_mempolicy(0x2, &(0x7f0000000000)=0x100000001, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x26, &(0x7f0000000080)) fcntl$lock(r0, 0x26, &(0x7f0000000180)={0x2, 0x0, 0x0, 0x2}) 13:11:37 executing program 2: r0 = fsopen(&(0x7f00000000c0)='bdev\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x4, &(0x7f0000000000)='ro\x00', &(0x7f00000001c0), 0x0) 13:11:37 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x100000001, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x26, &(0x7f0000000080)) fcntl$lock(r0, 0x26, &(0x7f0000000180)={0x2, 0x0, 0x0, 0x2}) 13:11:37 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet6(0xa, 0x803, 0x6) setsockopt$inet6_int(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) 13:11:37 executing program 5: set_mempolicy(0x2, &(0x7f0000000000)=0x100000001, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x26, &(0x7f0000000080)) fcntl$lock(r0, 0x26, &(0x7f0000000180)={0x2, 0x0, 0x0, 0x2}) 13:11:37 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x80000000}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) setresuid(0x0, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4800000}, 0xc, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="a4000000", @ANYRES16, @ANYBLOB="000225067000fcdbdf250300000008000100020000003c0008801c000780080006005300000008000500ab4d791508000600130000001c0007803560050072182f6c080006001700000008000500b3f3af394c000c8024008b80080009007a99427108000a008dc9000008000a00431e000008000a00430a000024000b800800090064d327580800090052867e1508000a004c28000008000a000184000092b5caacf5f1e88421574b948bf6609e78fb52356d93211cf3b1841a91c7faacf9d5d2c580"], 0xa4}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x700, 0x0, 0xffffffffffffff39) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000200)={{0x0, @empty, 0x4e20, 0x4, 'nq\x00', 0x17, 0x7, 0x2f}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e24, 0x0, 0x9, 0xdf9b, 0xffff}}, 0x44) 13:11:37 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net\x00') mknodat$loop(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1) 13:11:37 executing program 2: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @private=0xa010102}, {0x0, @link_local}, 0x6a, {0x2, 0x0, @loopback}, 'sit0\x00'}) write(0xffffffffffffffff, &(0x7f0000000200)="9c10ab00801ada2eb4ae3c532f9426afab26b49614db2b51017eee80170168d0d1326f10bacb2889a8018f7e233c7482c24641d22fd3a1e43ed8e8836701e9fc5f45c8558a1eac338b36f5e01dbe94b053548c68a8a44735c024e2141b1e2ffc9fd66410a27fa98735636c0aa8dc7d6a45b99404112b0ff78888fabbfebe7dee4b93265d22769619d1e0a29ef4603a560e14588256d015dcc5e57c53100bdfa22f", 0xa1) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000018c0)="1c0000001200050f0ca6760000ee53c6ce0ffb299d49b23e9b200a00089f36b878220724e59b4786e36bbe65d7b96e4161b0a242563fefdc437c632071d191cfe58d6875069935cbb3bf3dda5e55d1b6bcd38cab8bbb93ad3a31287b0f0af6e96ea1db4bd320d1b6857f884a5457716b3ba6e4e6b5aa629f2d678f53ad3fcb", 0x7f, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000400)=""/4096, 0x7e, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x2, 0x0) sendto$inet6(r1, &(0x7f00000000c0)="1ba0000010001d0200fdc5cbdd041d8e828003000000000001a7960fab0fc8da78031c6660b08f00003f71aced466b4644434a88fed7d75725e1069e42dc4b3844e5fb82bb02fec770967c740c00000000d02830b5a4c01a92317320f0c0a5adb7b5b8bf255f1a8dffa8", 0xfe0b, 0x40800, 0x0, 0xffffffffffffff95) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x20}, 0x1c) recvfrom$inet6(r3, &(0x7f0000000000)=""/35, 0xffffffffffffff13, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r4 = accept4(r2, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) sendto$inet6(r3, &(0x7f00000001c0)="9750757e6e", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x600000000000004) 13:11:37 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x100000001, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x26, &(0x7f0000000080)) fcntl$lock(r0, 0x26, &(0x7f0000000180)={0x2, 0x0, 0x0, 0x2}) 13:11:37 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet6(0xa, 0x803, 0x6) setsockopt$inet6_int(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) 13:11:37 executing program 5: r0 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="240000001a0003041dfffd946f6105000214010a1f00ff050c100800080003000a000000", 0x24}], 0x1}, 0x0) [ 709.528975][ T743] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 709.564397][ T743] device sit0 entered promiscuous mode [ 709.571832][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 13:11:37 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x200cc842, &(0x7f0000000080)={0xa, 0x4c24, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000040), 0x4) 13:11:37 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet6(0xa, 0x803, 0x6) setsockopt$inet6_int(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) 13:11:37 executing program 4: fsync(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:11:37 executing program 3: r0 = epoll_create(0x4) fcntl$lock(r0, 0x5, &(0x7f00000001c0)={0x0, 0x2, 0x0, 0xfffffffffffffffc}) 13:11:37 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000000000)={0x2}, 0xc) 13:11:38 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6641db6e0551832d303744e57e897094b15ba5d9e70400b1f14712d8ebca47f8b25e7717fd68a8378f362fbf30b8a40a525b7be87baeb12d8e440a49eb252ea2f7fc05d7e532e1a906abffff030000000000008bc3b53e32de099dad2f8fea962d0cbb0f", 0x64}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x6) 13:11:38 executing program 4: r0 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'sit0\x00', &(0x7f0000000100)=@ethtool_cmd={0x9}}) 13:11:38 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1c) tkill(r0, 0x12) ptrace$cont(0x18, r0, 0x0, 0x0) 13:11:38 executing program 2: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @private=0xa010102}, {0x0, @link_local}, 0x6a, {0x2, 0x0, @loopback}, 'sit0\x00'}) write(0xffffffffffffffff, &(0x7f0000000200)="9c10ab00801ada2eb4ae3c532f9426afab26b49614db2b51017eee80170168d0d1326f10bacb2889a8018f7e233c7482c24641d22fd3a1e43ed8e8836701e9fc5f45c8558a1eac338b36f5e01dbe94b053548c68a8a44735c024e2141b1e2ffc9fd66410a27fa98735636c0aa8dc7d6a45b99404112b0ff78888fabbfebe7dee4b93265d22769619d1e0a29ef4603a560e14588256d015dcc5e57c53100bdfa22f", 0xa1) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000018c0)="1c0000001200050f0ca6760000ee53c6ce0ffb299d49b23e9b200a00089f36b878220724e59b4786e36bbe65d7b96e4161b0a242563fefdc437c632071d191cfe58d6875069935cbb3bf3dda5e55d1b6bcd38cab8bbb93ad3a31287b0f0af6e96ea1db4bd320d1b6857f884a5457716b3ba6e4e6b5aa629f2d678f53ad3fcb", 0x7f, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000400)=""/4096, 0x7e, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x2, 0x0) sendto$inet6(r1, &(0x7f00000000c0)="1ba0000010001d0200fdc5cbdd041d8e828003000000000001a7960fab0fc8da78031c6660b08f00003f71aced466b4644434a88fed7d75725e1069e42dc4b3844e5fb82bb02fec770967c740c00000000d02830b5a4c01a92317320f0c0a5adb7b5b8bf255f1a8dffa8", 0xfe0b, 0x40800, 0x0, 0xffffffffffffff95) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x20}, 0x1c) recvfrom$inet6(r3, &(0x7f0000000000)=""/35, 0xffffffffffffff13, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r4 = accept4(r2, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) sendto$inet6(r3, &(0x7f00000001c0)="9750757e6e", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x600000000000004) 13:11:38 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r1, r0, 0x0) sendfile(r0, r0, 0x0, 0x8000) 13:11:38 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xd}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001d40)=[{{&(0x7f0000001a80)=@ll, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='smaps\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x7a000000, 0x0) syz_open_procfs(r0, &(0x7f0000000000)='schedstat\x00') 13:11:38 executing program 4: openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x1}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 13:11:38 executing program 0: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @private=0xa010102}, {0x0, @link_local}, 0x6a, {0x2, 0x0, @loopback}, 'sit0\x00'}) write(0xffffffffffffffff, &(0x7f0000000200)="9c10ab00801ada2eb4ae3c532f9426afab26b49614db2b51017eee80170168d0d1326f10bacb2889a8018f7e233c7482c24641d22fd3a1e43ed8e8836701e9fc5f45c8558a1eac338b36f5e01dbe94b053548c68a8a44735c024e2141b1e2ffc9fd66410a27fa98735636c0aa8dc7d6a45b99404112b0ff78888fabbfebe7dee4b93265d22769619d1e0a29ef4603a560e14588256d015dcc5e57c53100bdfa22f", 0xa1) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000018c0)="1c0000001200050f0ca6760000ee53c6ce0ffb299d49b23e9b200a00089f36b878220724e59b4786e36bbe65d7b96e4161b0a242563fefdc437c632071d191cfe58d6875069935cbb3bf3dda5e55d1b6bcd38cab8bbb93ad3a31287b0f0af6e96ea1db4bd320d1b6857f884a5457716b3ba6e4e6b5aa629f2d678f53ad3fcb", 0x7f, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000400)=""/4096, 0x7e, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x2, 0x0) sendto$inet6(r1, &(0x7f00000000c0)="1ba0000010001d0200fdc5cbdd041d8e828003000000000001a7960fab0fc8da78031c6660b08f00003f71aced466b4644434a88fed7d75725e1069e42dc4b3844e5fb82bb02fec770967c740c00000000d02830b5a4c01a92317320f0c0a5adb7b5b8bf255f1a8dffa8", 0xfe0b, 0x40800, 0x0, 0xffffffffffffff95) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x20}, 0x1c) recvfrom$inet6(r3, &(0x7f0000000000)=""/35, 0xffffffffffffff13, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r4 = accept4(r2, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) sendto$inet6(r3, &(0x7f00000001c0)="9750757e6e", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x600000000000004) [ 710.397403][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 710.398105][ T800] new mount options do not match the existing superblock, will be ignored [ 710.418484][ T801] device lo entered promiscuous mode [ 710.424375][ T801] device sit0 entered promiscuous mode [ 710.424435][ T800] new mount options do not match the existing superblock, will be ignored 13:11:38 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') close_range(r0, 0xffffffffffffffff, 0x2) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) 13:11:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9f4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x10010fc) lseek(r0, 0x0, 0x3) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, "00410000ec8ae7bc6c4bb1af00"}) [ 710.438345][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 13:11:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800004, 0x12, r0, 0x0) r1 = epoll_create1(0x0) r2 = eventfd2(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000200)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000000)) epoll_wait(r1, &(0x7f0000000180)=[{}], 0x1, 0x0) 13:11:38 executing program 3: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) lseek(r0, 0xffffffffffffffff, 0x4) 13:11:41 executing program 5: r0 = timerfd_create(0x9, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x77359400}}, 0x0) r1 = timerfd_create(0x9, 0x0) timerfd_settime(r1, 0x1, &(0x7f0000000000)={{0x0, 0x989680}, {0x77359400}}, 0x0) 13:11:41 executing program 3: r0 = socket$inet(0x10, 0x400000002, 0x0) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000180007041dfffd946f610529802000001f110005000008000800070002000000", 0x24}], 0x1}, 0x0) 13:11:41 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@remote, 0x0, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000000), 0x8) close(r0) 13:11:41 executing program 2: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @private=0xa010102}, {0x0, @link_local}, 0x6a, {0x2, 0x0, @loopback}, 'sit0\x00'}) write(0xffffffffffffffff, &(0x7f0000000200)="9c10ab00801ada2eb4ae3c532f9426afab26b49614db2b51017eee80170168d0d1326f10bacb2889a8018f7e233c7482c24641d22fd3a1e43ed8e8836701e9fc5f45c8558a1eac338b36f5e01dbe94b053548c68a8a44735c024e2141b1e2ffc9fd66410a27fa98735636c0aa8dc7d6a45b99404112b0ff78888fabbfebe7dee4b93265d22769619d1e0a29ef4603a560e14588256d015dcc5e57c53100bdfa22f", 0xa1) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000018c0)="1c0000001200050f0ca6760000ee53c6ce0ffb299d49b23e9b200a00089f36b878220724e59b4786e36bbe65d7b96e4161b0a242563fefdc437c632071d191cfe58d6875069935cbb3bf3dda5e55d1b6bcd38cab8bbb93ad3a31287b0f0af6e96ea1db4bd320d1b6857f884a5457716b3ba6e4e6b5aa629f2d678f53ad3fcb", 0x7f, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000400)=""/4096, 0x7e, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x2, 0x0) sendto$inet6(r1, &(0x7f00000000c0)="1ba0000010001d0200fdc5cbdd041d8e828003000000000001a7960fab0fc8da78031c6660b08f00003f71aced466b4644434a88fed7d75725e1069e42dc4b3844e5fb82bb02fec770967c740c00000000d02830b5a4c01a92317320f0c0a5adb7b5b8bf255f1a8dffa8", 0xfe0b, 0x40800, 0x0, 0xffffffffffffff95) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x20}, 0x1c) recvfrom$inet6(r3, &(0x7f0000000000)=""/35, 0xffffffffffffff13, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r4 = accept4(r2, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) sendto$inet6(r3, &(0x7f00000001c0)="9750757e6e", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x600000000000004) 13:11:41 executing program 0: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @private=0xa010102}, {0x0, @link_local}, 0x6a, {0x2, 0x0, @loopback}, 'sit0\x00'}) write(0xffffffffffffffff, &(0x7f0000000200)="9c10ab00801ada2eb4ae3c532f9426afab26b49614db2b51017eee80170168d0d1326f10bacb2889a8018f7e233c7482c24641d22fd3a1e43ed8e8836701e9fc5f45c8558a1eac338b36f5e01dbe94b053548c68a8a44735c024e2141b1e2ffc9fd66410a27fa98735636c0aa8dc7d6a45b99404112b0ff78888fabbfebe7dee4b93265d22769619d1e0a29ef4603a560e14588256d015dcc5e57c53100bdfa22f", 0xa1) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000018c0)="1c0000001200050f0ca6760000ee53c6ce0ffb299d49b23e9b200a00089f36b878220724e59b4786e36bbe65d7b96e4161b0a242563fefdc437c632071d191cfe58d6875069935cbb3bf3dda5e55d1b6bcd38cab8bbb93ad3a31287b0f0af6e96ea1db4bd320d1b6857f884a5457716b3ba6e4e6b5aa629f2d678f53ad3fcb", 0x7f, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000400)=""/4096, 0x7e, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x2, 0x0) sendto$inet6(r1, &(0x7f00000000c0)="1ba0000010001d0200fdc5cbdd041d8e828003000000000001a7960fab0fc8da78031c6660b08f00003f71aced466b4644434a88fed7d75725e1069e42dc4b3844e5fb82bb02fec770967c740c00000000d02830b5a4c01a92317320f0c0a5adb7b5b8bf255f1a8dffa8", 0xfe0b, 0x40800, 0x0, 0xffffffffffffff95) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x20}, 0x1c) recvfrom$inet6(r3, &(0x7f0000000000)=""/35, 0xffffffffffffff13, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r4 = accept4(r2, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) sendto$inet6(r3, &(0x7f00000001c0)="9750757e6e", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x600000000000004) 13:11:41 executing program 1: unshare(0x400) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/cpuinfo\x00', 0x0, 0x0) close(r0) fdatasync(r0) 13:11:41 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8d, 0xfffffffffffffff9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) r1 = gettid() r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/238, 0xee) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc0bc5351, &(0x7f0000000200)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r2, 0x402c5342, &(0x7f0000000440)) tkill(r1, 0x7) 13:11:41 executing program 1: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = getpid() tkill(r1, 0x3f) waitid$P_PIDFD(0x3, r0, &(0x7f0000000200), 0x180000003, 0x0) [ 713.146537][ T853] __nla_validate_parse: 14 callbacks suppressed [ 713.146550][ T853] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 713.152166][ T856] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 713.157811][ T853] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 713.184956][ T856] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 13:11:41 executing program 5: timerfd_create(0x0, 0x0) pipe2(&(0x7f0000000200), 0x0) pipe2(&(0x7f0000000100), 0x0) pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x7f}, 0x0, 0x0, 0x0) 13:11:41 executing program 1: write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffddd) keyctl$set_timeout(0xf, 0x0, 0x0) unshare(0x60000000) [ 713.196929][ T863] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 713.207076][ T863] netlink: 40027 bytes leftover after parsing attributes in process `syz-executor.2'. [ 713.220157][ T866] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 13:11:41 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000003f40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c00)=[@rthdrdstopts={{0x18, 0x29, 0x3b}}], 0x18}}], 0x1, 0x0) 13:11:41 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x20, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000000780)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchown(r0, r1, 0xffffffffffffffff) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 13:11:41 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000003f40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c00)=[@rthdrdstopts={{0x18, 0x29, 0x3b}}], 0x18}}], 0x1, 0x0) [ 713.244476][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 713.257543][ T856] netlink: 40027 bytes leftover after parsing attributes in process `syz-executor.0'. [ 713.277494][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 13:11:41 executing program 1: r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)="b3", 0xffffff5e}], 0x1, 0x0, 0x0) fsetxattr$security_capability(r0, &(0x7f00000000c0), &(0x7f0000000100)=@v3, 0x18, 0x0) 13:11:41 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000003f40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c00)=[@rthdrdstopts={{0x18, 0x29, 0x3b}}], 0x18}}], 0x1, 0x0) [ 713.370734][ T895] loop3: detected capacity change from 0 to 4096 [ 713.472850][ T895] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 713.630028][ T1777] ================================================================== [ 713.638138][ T1777] BUG: KCSAN: data-race in lru_add_drain_all / lru_cache_add [ 713.645504][ T1777] [ 713.647816][ T1777] write to 0xffff888237c264a8 of 1 bytes by task 894 on cpu 0: [ 713.655340][ T1777] lru_cache_add+0x74/0x130 [ 713.659831][ T1777] add_to_page_cache_lru+0x150/0x1b0 [ 713.665113][ T1777] pagecache_get_page+0x6a3/0x900 [ 713.670133][ T1777] grab_cache_page_write_begin+0x3f/0x70 [ 713.675770][ T1777] ext4_da_write_begin+0x305/0x820 [ 713.681057][ T1777] generic_perform_write+0x196/0x3a0 [ 713.686365][ T1777] ext4_buffered_write_iter+0x2f2/0x3f0 [ 713.691900][ T1777] ext4_file_write_iter+0x2e7/0x11d0 [ 713.697189][ T1777] do_iter_readv_writev+0x2cb/0x360 [ 713.702411][ T1777] do_iter_write+0x112/0x4c0 [ 713.707021][ T1777] do_pwritev+0x1e5/0x3a0 [ 713.711333][ T1777] __x64_sys_pwritev+0x54/0x60 [ 713.716073][ T1777] do_syscall_64+0x4a/0x90 [ 713.720475][ T1777] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 713.726350][ T1777] [ 713.728668][ T1777] read to 0xffff888237c264a8 of 1 bytes by task 1777 on cpu 1: [ 713.736227][ T1777] lru_add_drain_all+0x108/0x3b0 [ 713.741144][ T1777] invalidate_bdev+0x50/0x70 [ 713.745729][ T1777] ext4_put_super+0x5d0/0x8e0 [ 713.750397][ T1777] generic_shutdown_super+0xe1/0x230 [ 713.755659][ T1777] kill_block_super+0x4a/0x90 [ 713.760312][ T1777] deactivate_locked_super+0x65/0xd0 [ 713.765576][ T1777] deactivate_super+0x85/0x90 [ 713.770235][ T1777] cleanup_mnt+0x267/0x2d0 [ 713.774647][ T1777] __cleanup_mnt+0x15/0x20 [ 713.779045][ T1777] task_work_run+0xae/0x130 [ 713.783539][ T1777] exit_to_user_mode_prepare+0x156/0x190 [ 713.789153][ T1777] syscall_exit_to_user_mode+0x20/0x40 [ 713.794594][ T1777] do_syscall_64+0x56/0x90 [ 713.799004][ T1777] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 713.804875][ T1777] [ 713.807187][ T1777] Reported by Kernel Concurrency Sanitizer on: [ 713.813488][ T1777] CPU: 1 PID: 1777 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 713.823205][ T1777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 713.833236][ T1777] ================================================================== 13:11:41 executing program 2: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @private=0xa010102}, {0x0, @link_local}, 0x6a, {0x2, 0x0, @loopback}, 'sit0\x00'}) write(0xffffffffffffffff, &(0x7f0000000200)="9c10ab00801ada2eb4ae3c532f9426afab26b49614db2b51017eee80170168d0d1326f10bacb2889a8018f7e233c7482c24641d22fd3a1e43ed8e8836701e9fc5f45c8558a1eac338b36f5e01dbe94b053548c68a8a44735c024e2141b1e2ffc9fd66410a27fa98735636c0aa8dc7d6a45b99404112b0ff78888fabbfebe7dee4b93265d22769619d1e0a29ef4603a560e14588256d015dcc5e57c53100bdfa22f", 0xa1) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000018c0)="1c0000001200050f0ca6760000ee53c6ce0ffb299d49b23e9b200a00089f36b878220724e59b4786e36bbe65d7b96e4161b0a242563fefdc437c632071d191cfe58d6875069935cbb3bf3dda5e55d1b6bcd38cab8bbb93ad3a31287b0f0af6e96ea1db4bd320d1b6857f884a5457716b3ba6e4e6b5aa629f2d678f53ad3fcb", 0x7f, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000400)=""/4096, 0x7e, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x2, 0x0) sendto$inet6(r1, &(0x7f00000000c0)="1ba0000010001d0200fdc5cbdd041d8e828003000000000001a7960fab0fc8da78031c6660b08f00003f71aced466b4644434a88fed7d75725e1069e42dc4b3844e5fb82bb02fec770967c740c00000000d02830b5a4c01a92317320f0c0a5adb7b5b8bf255f1a8dffa8", 0xfe0b, 0x40800, 0x0, 0xffffffffffffff95) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x20}, 0x1c) recvfrom$inet6(r3, &(0x7f0000000000)=""/35, 0xffffffffffffff13, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r4 = accept4(r2, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) sendto$inet6(r3, &(0x7f00000001c0)="9750757e6e", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x600000000000004) 13:11:41 executing program 0: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @private=0xa010102}, {0x0, @link_local}, 0x6a, {0x2, 0x0, @loopback}, 'sit0\x00'}) write(0xffffffffffffffff, &(0x7f0000000200)="9c10ab00801ada2eb4ae3c532f9426afab26b49614db2b51017eee80170168d0d1326f10bacb2889a8018f7e233c7482c24641d22fd3a1e43ed8e8836701e9fc5f45c8558a1eac338b36f5e01dbe94b053548c68a8a44735c024e2141b1e2ffc9fd66410a27fa98735636c0aa8dc7d6a45b99404112b0ff78888fabbfebe7dee4b93265d22769619d1e0a29ef4603a560e14588256d015dcc5e57c53100bdfa22f", 0xa1) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000018c0)="1c0000001200050f0ca6760000ee53c6ce0ffb299d49b23e9b200a00089f36b878220724e59b4786e36bbe65d7b96e4161b0a242563fefdc437c632071d191cfe58d6875069935cbb3bf3dda5e55d1b6bcd38cab8bbb93ad3a31287b0f0af6e96ea1db4bd320d1b6857f884a5457716b3ba6e4e6b5aa629f2d678f53ad3fcb", 0x7f, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000400)=""/4096, 0x7e, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x2, 0x0) sendto$inet6(r1, &(0x7f00000000c0)="1ba0000010001d0200fdc5cbdd041d8e828003000000000001a7960fab0fc8da78031c6660b08f00003f71aced466b4644434a88fed7d75725e1069e42dc4b3844e5fb82bb02fec770967c740c00000000d02830b5a4c01a92317320f0c0a5adb7b5b8bf255f1a8dffa8", 0xfe0b, 0x40800, 0x0, 0xffffffffffffff95) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x20}, 0x1c) recvfrom$inet6(r3, &(0x7f0000000000)=""/35, 0xffffffffffffff13, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r4 = accept4(r2, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) sendto$inet6(r3, &(0x7f00000001c0)="9750757e6e", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x600000000000004) 13:11:41 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000003f40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c00)=[@rthdrdstopts={{0x18, 0x29, 0x3b}}], 0x18}}], 0x1, 0x0) 13:11:41 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x5452, &(0x7f00000002c0)={0x750, {0x2, 0x0, @remote={0xac, 0x25}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a}) 13:11:41 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() sendmsg$NL802154_CMD_SET_CCA_MODE(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="a4090053db9c66cefa698c"], 0x14}}, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 13:11:41 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000001840)={0x0, 0x0, &(0x7f0000001800)={&(0x7f0000000380)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}]}]}, 0x2c}}, 0x0) [ 714.013396][ T922] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 714.041734][ T922] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 13:11:42 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000001840)={0x0, 0x0, &(0x7f0000001800)={&(0x7f0000000380)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}]}]}, 0x2c}}, 0x0) 13:11:42 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) epoll_create1(0x0) 13:11:42 executing program 3: syz_open_procfs(0x0, 0x0) r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14, 0x80800) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, r0, 0x0, 0x0, 0x0, 0x80000001}) preadv(0xffffffffffffffff, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r3) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) r4 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x1, 0x6, &(0x7f0000000900)=[{&(0x7f0000000200)="5cc268cfa5e32c24264d6fc635fd042185c4e142f8378fbb58b1150c94adb7e92245e29f6e0a500f09a67317c7dba636bd83f41160e8f2995f8272147a8b9afd5fa18a6b34d25f5f9f0876f9a4b577e4a749c5c06c8f1abefd118a37b7a344423959ab16aa524125e8dc297d340c867f2760c6861460b1d2451b2761099b6cb0547f65726f29467dfad58e721b58ff6f5a8d3385d2fd3350c944a752b0d08b53ddefc6601b23d59d1605c8", 0xab, 0x80000001}, {&(0x7f00000002c0)="73d25ce0f70520bb4bd560f4d940cb1fe918a964abd3f314ecdf8de702a986659fd33e7ee9ee50091361f832d5488b10acdb500a082f8ffa4849d7e206e5d8097ca2cbd115c39de3871ca4435651e50caaa1294ee2d47a0278e41805ce9692cd", 0x60, 0x100}, {&(0x7f0000000340)="e3f75a08dca2460962d060ccd44013ea3c6c0d4e4d8dc4086630010daa657c779b2799df5059b1c3bbfd1e38de748af6d7a57a84c82d6a5fe8b89396c3adbe790e443eb148bc8fd8cecb4efb2ad8b395f27445620b155f9b7e762aaaca415b9ddb9df27136e55c0d32f969f5ddea5ca3681d9dfdc3d7cf4b641510c9c41da8c021acd222f477c317ef1fc19782c5c5b634dd3162b3624488e0208b54e7d0efd2c06496df826fbc9435c08934a884b026cb38f5a5d4d389b63863469d5fb1240dbc2022", 0xc3, 0x400}, {&(0x7f0000000580)="e929d9ad9246441d29935acdd61b17416a72952c89ff3550c11c9d361a63a6f717566eb7bb3de9b1922b826cf0b5d15a47c83062ff58a445e64287b6e9377470e1fc52caf7fc91ad0c493e8d3426a15b609f2a59f177c84cb0a7ca5e71f72acdb279ee0e4db546f78bc1a14b344ea90c88531772dc82023ded98d24e8b0cdfe10689e3bb7d2fc903938ab5c6688a24ff10366d614cdb978a45aa846aec8d80d11de2083643115b766647454500cc58eb68f165e83e667c3f872e0ba1aac4b5193fbdc25e3706541ce8b4e45331ad1dd222ba7c69fb77168b0eca0c96ca0509677d6504fc583f8bf6a509841c450706a55c0a8d4b937b", 0xf6}, {&(0x7f0000000680)="b55d1b2cd1cd7d0c2b7aaf441aacd7d71e3a029e3bdaa938e52433e389ae7da274321d09a1fe183444a0f695218f6f92fb5aac18d3a24318af162a7db1149a165560a54e5cb40ff0e65a4dcc4ce15bf4672062c0ea0fb4c229d2d9381df619dd3f2fd1ea5ae87430d37dae24b9236d2a420dee6b96010bb3900c97dc976c427483317e868bcbfb8ae15198d0ba921711941f72ccd94cc7b3d837a6a5da941897c856f8402421aace5a2ae41709b3ea9aed9b2b369959a45dddf1acd0170b01431f05375ff2e83d8eb9eb456cf28df45a3e5a78c7fd37d0a276b89cd9778db21e80a947abd6506fdd40d921a06e658b0df4afd3a8d802e0994bb1c2dc02", 0xfd, 0x5}, {&(0x7f0000000840)="b9aef66831784f4cda92a7c80d7f2138d592ef29df4d6e2708329cf698b6bdc863f20e876a48d79527128f9e2dc819edf874be7dcb24236651b5c5301c300330c8f96d7c0d55eafe06674dfd5cf2c0577269702f12f7ef27a6efafcbb25d0a8c9a97a2fb0646fb6c92eacd35f48099438087717366243fcac1f03ed0d03a2444d94ebc489d429ec35f045cf746de7846", 0x90, 0x7}], 0x80000, &(0x7f00000009c0)={[{@dots}, {@nodots}], [{@uid_lt={'uid<', 0xee01}}, {@permit_directio}, {@audit}, {@dont_measure}, {@obj_user={'obj_user', 0x3d, '/dev/loop#\x00'}}, {@measure}, {@fowner_gt={'fowner>', 0xee00}}, {@permit_directio}]}) sendfile(r3, r4, &(0x7f0000000440)=0x4, 0xa500000000000000) sendfile(r1, r1, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x6, 0x9, "2bbb19e5631df896ba98674d0b4703551f0d03e2ed186049da15bffbdd1a3e02c2dda1e04e6fcd5ce9801d897649292487be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7, 0xfffffffffffff8a2]}) 13:11:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000007dc0)=[{&(0x7f0000006b00)={0x14, 0x2c, 0x1, 0x0, 0x0, "", [@nested={0x4}]}, 0x14}], 0x1}, 0x0) [ 714.064118][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 714.081150][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 13:11:42 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000001840)={0x0, 0x0, &(0x7f0000001800)={&(0x7f0000000380)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}]}]}, 0x2c}}, 0x0) 13:11:42 executing program 5: r0 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)="240000002e00074c8bfffd946fa2830022200affffffffff0300000000000000040000f3", 0x24}], 0x1}, 0x0) [ 714.124951][ T25] audit: type=1326 audit(1619961102.066:1223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=941 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 714.183918][ T25] audit: type=1326 audit(1619961102.066:1224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=941 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 714.210530][ T25] audit: type=1326 audit(1619961102.096:1225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=941 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=291 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 714.221533][ T960] loop3: detected capacity change from 0 to 264192 [ 714.247721][ T25] audit: type=1326 audit(1619961102.096:1226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=941 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 714.271896][ T25] audit: type=1326 audit(1619961102.096:1227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=941 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 714.295920][ T25] audit: type=1326 audit(1619961102.096:1228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=941 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=157 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 714.319864][ T25] audit: type=1326 audit(1619961102.096:1229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=941 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 714.343961][ T25] audit: type=1326 audit(1619961102.096:1230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=941 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 714.376350][ T25] audit: type=1326 audit(1619961102.096:1231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=941 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=291 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 714.400365][ T25] audit: type=1326 audit(1619961102.096:1232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=941 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 714.450453][ T960] loop7: detected capacity change from 0 to 1036 [ 714.535552][ T965] loop3: detected capacity change from 0 to 264192 13:11:42 executing program 3: syz_open_procfs(0x0, 0x0) r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14, 0x80800) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, r0, 0x0, 0x0, 0x0, 0x80000001}) preadv(0xffffffffffffffff, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r3) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) r4 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x1, 0x6, &(0x7f0000000900)=[{&(0x7f0000000200)="5cc268cfa5e32c24264d6fc635fd042185c4e142f8378fbb58b1150c94adb7e92245e29f6e0a500f09a67317c7dba636bd83f41160e8f2995f8272147a8b9afd5fa18a6b34d25f5f9f0876f9a4b577e4a749c5c06c8f1abefd118a37b7a344423959ab16aa524125e8dc297d340c867f2760c6861460b1d2451b2761099b6cb0547f65726f29467dfad58e721b58ff6f5a8d3385d2fd3350c944a752b0d08b53ddefc6601b23d59d1605c8", 0xab, 0x80000001}, {&(0x7f00000002c0)="73d25ce0f70520bb4bd560f4d940cb1fe918a964abd3f314ecdf8de702a986659fd33e7ee9ee50091361f832d5488b10acdb500a082f8ffa4849d7e206e5d8097ca2cbd115c39de3871ca4435651e50caaa1294ee2d47a0278e41805ce9692cd", 0x60, 0x100}, {&(0x7f0000000340)="e3f75a08dca2460962d060ccd44013ea3c6c0d4e4d8dc4086630010daa657c779b2799df5059b1c3bbfd1e38de748af6d7a57a84c82d6a5fe8b89396c3adbe790e443eb148bc8fd8cecb4efb2ad8b395f27445620b155f9b7e762aaaca415b9ddb9df27136e55c0d32f969f5ddea5ca3681d9dfdc3d7cf4b641510c9c41da8c021acd222f477c317ef1fc19782c5c5b634dd3162b3624488e0208b54e7d0efd2c06496df826fbc9435c08934a884b026cb38f5a5d4d389b63863469d5fb1240dbc2022", 0xc3, 0x400}, {&(0x7f0000000580)="e929d9ad9246441d29935acdd61b17416a72952c89ff3550c11c9d361a63a6f717566eb7bb3de9b1922b826cf0b5d15a47c83062ff58a445e64287b6e9377470e1fc52caf7fc91ad0c493e8d3426a15b609f2a59f177c84cb0a7ca5e71f72acdb279ee0e4db546f78bc1a14b344ea90c88531772dc82023ded98d24e8b0cdfe10689e3bb7d2fc903938ab5c6688a24ff10366d614cdb978a45aa846aec8d80d11de2083643115b766647454500cc58eb68f165e83e667c3f872e0ba1aac4b5193fbdc25e3706541ce8b4e45331ad1dd222ba7c69fb77168b0eca0c96ca0509677d6504fc583f8bf6a509841c450706a55c0a8d4b937b", 0xf6}, {&(0x7f0000000680)="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", 0xfd, 0x5}, {&(0x7f0000000840)="b9aef66831784f4cda92a7c80d7f2138d592ef29df4d6e2708329cf698b6bdc863f20e876a48d79527128f9e2dc819edf874be7dcb24236651b5c5301c300330c8f96d7c0d55eafe06674dfd5cf2c0577269702f12f7ef27a6efafcbb25d0a8c9a97a2fb0646fb6c92eacd35f48099438087717366243fcac1f03ed0d03a2444d94ebc489d429ec35f045cf746de7846", 0x90, 0x7}], 0x80000, &(0x7f00000009c0)={[{@dots}, {@nodots}], [{@uid_lt={'uid<', 0xee01}}, {@permit_directio}, {@audit}, {@dont_measure}, {@obj_user={'obj_user', 0x3d, '/dev/loop#\x00'}}, {@measure}, {@fowner_gt={'fowner>', 0xee00}}, {@permit_directio}]}) sendfile(r3, r4, &(0x7f0000000440)=0x4, 0xa500000000000000) sendfile(r1, r1, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x6, 0x9, "2bbb19e5631df896ba98674d0b4703551f0d03e2ed186049da15bffbdd1a3e02c2dda1e04e6fcd5ce9801d897649292487be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7, 0xfffffffffffff8a2]}) 13:11:42 executing program 2: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 13:11:42 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) epoll_create1(0x0) 13:11:42 executing program 5: unshare(0x8000000) r0 = mq_open(&(0x7f000084dff0)='!\x00nu\\\x00\x00\x00\x86\xbaCga1`h', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x0, 0x1, 0x1f}) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) mq_timedreceive(r0, &(0x7f0000000180)=""/204, 0xcc, 0x20000180, 0x0) 13:11:42 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000001840)={0x0, 0x0, &(0x7f0000001800)={&(0x7f0000000380)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}]}]}, 0x2c}}, 0x0) 13:11:42 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040), r0) sendmsg$NLBL_CIPSOV4_C_LISTALL(r1, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000780)={0x14, r2, 0x9b1ffd0766a2c3e9}, 0x14}}, 0x0) [ 714.887466][ T982] loop3: detected capacity change from 0 to 264192 13:11:42 executing program 5: unshare(0x8000000) r0 = mq_open(&(0x7f000084dff0)='!\x00nu\\\x00\x00\x00\x86\xbaCga1`h', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x0, 0x1, 0x1f}) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) mq_timedreceive(r0, &(0x7f0000000180)=""/204, 0xcc, 0x20000180, 0x0) 13:11:42 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) mmap(&(0x7f0000ff6000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) prlimit64(0x0, 0x2, &(0x7f0000000000), 0x0) mprotect(&(0x7f0000ff6000/0x2000)=nil, 0x2000, 0x2) 13:11:42 executing program 5: unshare(0x8000000) r0 = mq_open(&(0x7f000084dff0)='!\x00nu\\\x00\x00\x00\x86\xbaCga1`h', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x0, 0x1, 0x1f}) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) mq_timedreceive(r0, &(0x7f0000000180)=""/204, 0xcc, 0x20000180, 0x0) 13:11:43 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) epoll_create1(0x0) 13:11:43 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) lseek(r0, 0x0, 0x2) 13:11:43 executing program 2: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000540), 0x0) io_setup(0xdaf, &(0x7f0000000b00)=0x0) io_submit(r1, 0x1, &(0x7f0000002600)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_cancel(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 13:11:43 executing program 3: syz_open_procfs(0x0, 0x0) r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14, 0x80800) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, r0, 0x0, 0x0, 0x0, 0x80000001}) preadv(0xffffffffffffffff, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r3) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) r4 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x1, 0x6, &(0x7f0000000900)=[{&(0x7f0000000200)="5cc268cfa5e32c24264d6fc635fd042185c4e142f8378fbb58b1150c94adb7e92245e29f6e0a500f09a67317c7dba636bd83f41160e8f2995f8272147a8b9afd5fa18a6b34d25f5f9f0876f9a4b577e4a749c5c06c8f1abefd118a37b7a344423959ab16aa524125e8dc297d340c867f2760c6861460b1d2451b2761099b6cb0547f65726f29467dfad58e721b58ff6f5a8d3385d2fd3350c944a752b0d08b53ddefc6601b23d59d1605c8", 0xab, 0x80000001}, {&(0x7f00000002c0)="73d25ce0f70520bb4bd560f4d940cb1fe918a964abd3f314ecdf8de702a986659fd33e7ee9ee50091361f832d5488b10acdb500a082f8ffa4849d7e206e5d8097ca2cbd115c39de3871ca4435651e50caaa1294ee2d47a0278e41805ce9692cd", 0x60, 0x100}, {&(0x7f0000000340)="e3f75a08dca2460962d060ccd44013ea3c6c0d4e4d8dc4086630010daa657c779b2799df5059b1c3bbfd1e38de748af6d7a57a84c82d6a5fe8b89396c3adbe790e443eb148bc8fd8cecb4efb2ad8b395f27445620b155f9b7e762aaaca415b9ddb9df27136e55c0d32f969f5ddea5ca3681d9dfdc3d7cf4b641510c9c41da8c021acd222f477c317ef1fc19782c5c5b634dd3162b3624488e0208b54e7d0efd2c06496df826fbc9435c08934a884b026cb38f5a5d4d389b63863469d5fb1240dbc2022", 0xc3, 0x400}, {&(0x7f0000000580)="e929d9ad9246441d29935acdd61b17416a72952c89ff3550c11c9d361a63a6f717566eb7bb3de9b1922b826cf0b5d15a47c83062ff58a445e64287b6e9377470e1fc52caf7fc91ad0c493e8d3426a15b609f2a59f177c84cb0a7ca5e71f72acdb279ee0e4db546f78bc1a14b344ea90c88531772dc82023ded98d24e8b0cdfe10689e3bb7d2fc903938ab5c6688a24ff10366d614cdb978a45aa846aec8d80d11de2083643115b766647454500cc58eb68f165e83e667c3f872e0ba1aac4b5193fbdc25e3706541ce8b4e45331ad1dd222ba7c69fb77168b0eca0c96ca0509677d6504fc583f8bf6a509841c450706a55c0a8d4b937b", 0xf6}, {&(0x7f0000000680)="b55d1b2cd1cd7d0c2b7aaf441aacd7d71e3a029e3bdaa938e52433e389ae7da274321d09a1fe183444a0f695218f6f92fb5aac18d3a24318af162a7db1149a165560a54e5cb40ff0e65a4dcc4ce15bf4672062c0ea0fb4c229d2d9381df619dd3f2fd1ea5ae87430d37dae24b9236d2a420dee6b96010bb3900c97dc976c427483317e868bcbfb8ae15198d0ba921711941f72ccd94cc7b3d837a6a5da941897c856f8402421aace5a2ae41709b3ea9aed9b2b369959a45dddf1acd0170b01431f05375ff2e83d8eb9eb456cf28df45a3e5a78c7fd37d0a276b89cd9778db21e80a947abd6506fdd40d921a06e658b0df4afd3a8d802e0994bb1c2dc02", 0xfd, 0x5}, {&(0x7f0000000840)="b9aef66831784f4cda92a7c80d7f2138d592ef29df4d6e2708329cf698b6bdc863f20e876a48d79527128f9e2dc819edf874be7dcb24236651b5c5301c300330c8f96d7c0d55eafe06674dfd5cf2c0577269702f12f7ef27a6efafcbb25d0a8c9a97a2fb0646fb6c92eacd35f48099438087717366243fcac1f03ed0d03a2444d94ebc489d429ec35f045cf746de7846", 0x90, 0x7}], 0x80000, &(0x7f00000009c0)={[{@dots}, {@nodots}], [{@uid_lt={'uid<', 0xee01}}, {@permit_directio}, {@audit}, {@dont_measure}, {@obj_user={'obj_user', 0x3d, '/dev/loop#\x00'}}, {@measure}, {@fowner_gt={'fowner>', 0xee00}}, {@permit_directio}]}) sendfile(r3, r4, &(0x7f0000000440)=0x4, 0xa500000000000000) sendfile(r1, r1, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x6, 0x9, "2bbb19e5631df896ba98674d0b4703551f0d03e2ed186049da15bffbdd1a3e02c2dda1e04e6fcd5ce9801d897649292487be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7, 0xfffffffffffff8a2]}) 13:11:43 executing program 5: unshare(0x8000000) r0 = mq_open(&(0x7f000084dff0)='!\x00nu\\\x00\x00\x00\x86\xbaCga1`h', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x0, 0x1, 0x1f}) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) mq_timedreceive(r0, &(0x7f0000000180)=""/204, 0xcc, 0x20000180, 0x0) 13:11:43 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) epoll_create1(0x0) 13:11:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) accept4(r0, 0x0, 0x0, 0x0) 13:11:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x21, &(0x7f0000000140)="7430abdd777e5d2a816eac50bdca88577f315f96764e1821a759a9d88c08ef11c5"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 13:11:43 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000140), 0xe6e8, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000180)={0xff, 0x0, 0x0, 0x0, "954a382c31315d4ced37ef069681ef861b878b08c260c3888e8c3a898e930f70"}) 13:11:43 executing program 0: r0 = creat(&(0x7f0000002a40)='./file0\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x80000001}) 13:11:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)={0x20, r3, 0xb15, 0x0, 0x0, {0x1c}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x20}}, 0x0) 13:11:43 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000480)={0x0, 0x0, 0x10000000, 0x0, 0x0, "ca82ed8d93c2aa0f3f21bd7c1c4a9e0eb544b8"}) 13:11:43 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10dfe}], 0x0, &(0x7f00000000c0)=ANY=[]) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRESOCT, @ANYBLOB="b7492dcb400000001b800020874af7956b2ec9fc50811897fd514c65d613f7ad563eee8c0a74f8695c8f56b17594f4c7eede3719"], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 13:11:43 executing program 2: r0 = fsopen(&(0x7f0000000000)='selinuxfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 13:11:43 executing program 5: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/238, 0xee) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0xcb}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) close(r1) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) tkill(r0, 0x7) [ 715.319644][ T1043] loop3: detected capacity change from 0 to 264192 13:11:43 executing program 3: syz_open_procfs(0x0, 0x0) r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14, 0x80800) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, r0, 0x0, 0x0, 0x0, 0x80000001}) preadv(0xffffffffffffffff, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r3) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) r4 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x1, 0x6, &(0x7f0000000900)=[{&(0x7f0000000200)="5cc268cfa5e32c24264d6fc635fd042185c4e142f8378fbb58b1150c94adb7e92245e29f6e0a500f09a67317c7dba636bd83f41160e8f2995f8272147a8b9afd5fa18a6b34d25f5f9f0876f9a4b577e4a749c5c06c8f1abefd118a37b7a344423959ab16aa524125e8dc297d340c867f2760c6861460b1d2451b2761099b6cb0547f65726f29467dfad58e721b58ff6f5a8d3385d2fd3350c944a752b0d08b53ddefc6601b23d59d1605c8", 0xab, 0x80000001}, {&(0x7f00000002c0)="73d25ce0f70520bb4bd560f4d940cb1fe918a964abd3f314ecdf8de702a986659fd33e7ee9ee50091361f832d5488b10acdb500a082f8ffa4849d7e206e5d8097ca2cbd115c39de3871ca4435651e50caaa1294ee2d47a0278e41805ce9692cd", 0x60, 0x100}, {&(0x7f0000000340)="e3f75a08dca2460962d060ccd44013ea3c6c0d4e4d8dc4086630010daa657c779b2799df5059b1c3bbfd1e38de748af6d7a57a84c82d6a5fe8b89396c3adbe790e443eb148bc8fd8cecb4efb2ad8b395f27445620b155f9b7e762aaaca415b9ddb9df27136e55c0d32f969f5ddea5ca3681d9dfdc3d7cf4b641510c9c41da8c021acd222f477c317ef1fc19782c5c5b634dd3162b3624488e0208b54e7d0efd2c06496df826fbc9435c08934a884b026cb38f5a5d4d389b63863469d5fb1240dbc2022", 0xc3, 0x400}, {&(0x7f0000000580)="e929d9ad9246441d29935acdd61b17416a72952c89ff3550c11c9d361a63a6f717566eb7bb3de9b1922b826cf0b5d15a47c83062ff58a445e64287b6e9377470e1fc52caf7fc91ad0c493e8d3426a15b609f2a59f177c84cb0a7ca5e71f72acdb279ee0e4db546f78bc1a14b344ea90c88531772dc82023ded98d24e8b0cdfe10689e3bb7d2fc903938ab5c6688a24ff10366d614cdb978a45aa846aec8d80d11de2083643115b766647454500cc58eb68f165e83e667c3f872e0ba1aac4b5193fbdc25e3706541ce8b4e45331ad1dd222ba7c69fb77168b0eca0c96ca0509677d6504fc583f8bf6a509841c450706a55c0a8d4b937b", 0xf6}, {&(0x7f0000000680)="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", 0xfd, 0x5}, {&(0x7f0000000840)="b9aef66831784f4cda92a7c80d7f2138d592ef29df4d6e2708329cf698b6bdc863f20e876a48d79527128f9e2dc819edf874be7dcb24236651b5c5301c300330c8f96d7c0d55eafe06674dfd5cf2c0577269702f12f7ef27a6efafcbb25d0a8c9a97a2fb0646fb6c92eacd35f48099438087717366243fcac1f03ed0d03a2444d94ebc489d429ec35f045cf746de7846", 0x90, 0x7}], 0x80000, &(0x7f00000009c0)={[{@dots}, {@nodots}], [{@uid_lt={'uid<', 0xee01}}, {@permit_directio}, {@audit}, {@dont_measure}, {@obj_user={'obj_user', 0x3d, '/dev/loop#\x00'}}, {@measure}, {@fowner_gt={'fowner>', 0xee00}}, {@permit_directio}]}) sendfile(r3, r4, &(0x7f0000000440)=0x4, 0xa500000000000000) sendfile(r1, r1, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x6, 0x9, "2bbb19e5631df896ba98674d0b4703551f0d03e2ed186049da15bffbdd1a3e02c2dda1e04e6fcd5ce9801d897649292487be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7, 0xfffffffffffff8a2]}) 13:11:43 executing program 4: perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:11:43 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f00000003c0)=@newpolicy={0xb8, 0x13, 0x1, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xa0, 0x0, 0x0, 0xee00}}}, 0xb8}}, 0x0) 13:11:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000300)="1c0000001200050f0ca6760000ee53c6ce0ffb299d49b23e9b200a00", 0x1c, 0x0, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f0000000400)=""/4096, 0x7e, 0x0, 0x0, 0x0) r2 = socket$inet6(0x10, 0x2, 0x0) sendto$inet6(r2, &(0x7f00000000c0)="1ba0000010001d0800fdc5cbdd041d8e828003000000000001a7960fab0fc8da78031c6660b08f00003f71aced466b4644434a88fed7d75725e1069e42dc4b3844e5fb82bb02fec770967c740c00000000d02830b5a4c01a92317320f0c0a5adb7b5b8bf255f1a8dffa8", 0xfe0b, 0x40800, 0x0, 0xffffffffffffff95) 13:11:43 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/stat\x00') getdents64(r0, &(0x7f0000000140)=""/4096, 0x18) getdents64(r0, &(0x7f0000001140)=""/112, 0x70) 13:11:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f00002cd000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) 13:11:43 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6560ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2fc903c2b54706c05e4cb2e2875107608f9143f299d8e3f78f4bf076484885fd4089cb084607435b77c7f44cf0783279a494c8e4eba955b16e77f57966d4b79ce63a7560f29500352", 0x80}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:11:43 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) writev(r3, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4feff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000200)=0x0) tkill(r4, 0x34) getpid() pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000780)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x2, 0xf9, 0x5, 0x8, 0x3, 0x3e, 0xb39, 0x250, 0x40, 0x397, 0x8, 0x200, 0x38, 0x2, 0x4, 0x1, 0x9fc}, [{0x6, 0x6, 0x3, 0x7, 0x270, 0x8001, 0xffff, 0x6}, {0x0, 0x10000, 0x81, 0x4, 0x81, 0x6, 0x5, 0x2}], "e8b585c9c19b6ccfae42d5182ce9b876306b23bba488b3349e40c84db51441902d6d7a56a4d87b0a6e0294452212e36c58bc71507864983c05", ['\x00', '\x00']}, 0x2e9) 13:11:43 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) dup3(r2, r0, 0x0) 13:11:43 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000900), r0) sendmsg$NLBL_CALIPSO_C_REMOVE(r1, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={&(0x7f0000000940)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CALIPSO_A_DOI={0x8}]}, 0x1c}}, 0x0) 13:11:43 executing program 0: clone(0xf522d9c0, 0x0, 0x0, 0x0, 0x0) 13:11:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sysfs$1(0x1, &(0x7f0000000040)='vfat\x00') [ 715.658461][ T1090] loop3: detected capacity change from 0 to 264192 [ 715.675023][ T1105] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 13:11:43 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6560ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2fc903c2b54706c05e4cb2e2875107608f9143f299d8e3f78f4bf076484885fd4089cb084607435b77c7f44cf0783279a494c8e4eba955b16e77f57966d4b79ce63a7560f29500352", 0x80}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:11:43 executing program 1: socket$nl_route(0x10, 0x3, 0x0) r0 = memfd_create(&(0x7f0000000140)='\xedr!QY\x88=Vx\xa1\xd1<\xdeb\x17\xd3\xe2i\x1d5\x17\xa4\x00\xd8\x02\x9f\x11\xfa\t\x13]\f\xcbo\xc4X\x00\x94/\x96h\xef~Ms\"\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000100000094, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000001c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x264, &(0x7f0000000000)=[{0x16}]}, 0x10) bind(0xffffffffffffffff, 0x0, 0x0) 13:11:43 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000006000), 0x8, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000006000), 0x8, 0x0) signalfd4(r2, &(0x7f0000000100), 0x8, 0x0) 13:11:43 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={@local, @private0, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x0, 0x641, 0x0, 0x0, 0x0, 0x1000081}) 13:11:43 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'syztnl0\x00', r1, 0x4, 0x7f, 0x8b, 0x9, 0x44, @ipv4={'\x00', '\xff\xff', @local}, @local, 0x10, 0x8000, 0x3, 0x80}}) socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@private2}}, &(0x7f0000000380)=0xe8) r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800001, 0x80010, r5, 0x0) connect$inet(r6, &(0x7f0000000340)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$RTC_UIE_OFF(r6, 0x7004) ioctl$sock_inet6_SIOCADDRT(r7, 0x890b, &(0x7f00000002c0)={@local, @private2, @mcast2, 0x0, 0x4, 0x0, 0x0, 0x7fffffff, 0x80440000, r8}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000280)={'ip6_vti0\x00', &(0x7f0000000200)={'syztnl1\x00', r8, 0x29, 0xff, 0x3, 0x9b, 0x40, @dev={0xfe, 0x80, '\x00', 0x19}, @ipv4={'\x00', '\xff\xff', @rand_addr=0xb815}, 0x7800, 0x7, 0x3, 0x7fff}}) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6tnl0\x00', r8, 0x2f, 0x8, 0x5, 0x101, 0x51, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7, 0x8000, 0xf, 0x8}}) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f0000000000)={@local, @mcast1, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x27}}, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x480003, r8}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB='(\n\x00\x00', @ANYRES16=r2, @ANYBLOB="080025bd7000fedbdf250d0000002000018008000300000000001400020069703665727370616e300000000000007c00018014000200766c616e31000000000000000000000014000200766c616e30000000000000000000000008000100", @ANYRES32=r3, @ANYBLOB="14000200766972745f651188f0c218e3d34511887814836468776966693000000000000014000200626f6e645f7346", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="08000100", @ANYRES32=r1, @ANYBLOB="08000300010000002000018008000300000000001400020076657468305f746f5f626174616476004000018008000300030000001400020076657468305f746f5f626f6e64000000080003000200000008000300020000000800030002000000080003000300000018000180140002007369743000"/128], 0x128}, 0x1, 0x0, 0x0, 0x10}, 0x100) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, 0x0) 13:11:43 executing program 2: r0 = semget$private(0x0, 0x1, 0x0) semtimedop(r0, &(0x7f0000000140)=[{0x0, 0x0, 0x1000}], 0x1, 0x0) r1 = semget$private(0x0, 0x1, 0x0) semtimedop(r1, &(0x7f0000000140)=[{0x0, 0x0, 0x1000}], 0x1, 0x0) semtimedop(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x1800}], 0x1, 0x0) 13:11:43 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x17f) write(0xffffffffffffffff, &(0x7f0000000180)="140000004a005f0214f9f424000904000a", 0x11) splice(r0, 0x0, r1, 0x0, 0xfffd, 0x0) 13:11:44 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) writev(r3, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4feff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000200)=0x0) tkill(r4, 0x34) getpid() pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000780)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x2, 0xf9, 0x5, 0x8, 0x3, 0x3e, 0xb39, 0x250, 0x40, 0x397, 0x8, 0x200, 0x38, 0x2, 0x4, 0x1, 0x9fc}, [{0x6, 0x6, 0x3, 0x7, 0x270, 0x8001, 0xffff, 0x6}, {0x0, 0x10000, 0x81, 0x4, 0x81, 0x6, 0x5, 0x2}], "e8b585c9c19b6ccfae42d5182ce9b876306b23bba488b3349e40c84db51441902d6d7a56a4d87b0a6e0294452212e36c58bc71507864983c05", ['\x00', '\x00']}, 0x2e9) 13:11:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1, 0x0, 0x0, 0x3}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000100)=ANY=[], 0x1c) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 13:11:44 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x17f) write(0xffffffffffffffff, &(0x7f0000000180)="140000004a005f0214f9f424000904000a", 0x11) splice(r0, 0x0, r1, 0x0, 0xfffd, 0x0) 13:11:44 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sysvipc/sem\x00', 0x0, 0x0) lseek(r0, 0x400, 0x0) 13:11:44 executing program 1: socket$nl_route(0x10, 0x3, 0x0) r0 = memfd_create(&(0x7f0000000140)='\xedr!QY\x88=Vx\xa1\xd1<\xdeb\x17\xd3\xe2i\x1d5\x17\xa4\x00\xd8\x02\x9f\x11\xfa\t\x13]\f\xcbo\xc4X\x00\x94/\x96h\xef~Ms\"\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000100000094, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000001c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x264, &(0x7f0000000000)=[{0x16}]}, 0x10) bind(0xffffffffffffffff, 0x0, 0x0) [ 716.446682][ T1148] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 716.549278][ T1159] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 13:11:46 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6560ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2fc903c2b54706c05e4cb2e2875107608f9143f299d8e3f78f4bf076484885fd4089cb084607435b77c7f44cf0783279a494c8e4eba955b16e77f57966d4b79ce63a7560f29500352", 0x80}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:11:46 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x17f) write(0xffffffffffffffff, &(0x7f0000000180)="140000004a005f0214f9f424000904000a", 0x11) splice(r0, 0x0, r1, 0x0, 0xfffd, 0x0) 13:11:46 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sysvipc/sem\x00', 0x0, 0x0) lseek(r0, 0x400, 0x0) 13:11:46 executing program 1: socket$nl_route(0x10, 0x3, 0x0) r0 = memfd_create(&(0x7f0000000140)='\xedr!QY\x88=Vx\xa1\xd1<\xdeb\x17\xd3\xe2i\x1d5\x17\xa4\x00\xd8\x02\x9f\x11\xfa\t\x13]\f\xcbo\xc4X\x00\x94/\x96h\xef~Ms\"\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000100000094, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000001c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x264, &(0x7f0000000000)=[{0x16}]}, 0x10) bind(0xffffffffffffffff, 0x0, 0x0) 13:11:46 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) writev(r3, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4feff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000200)=0x0) tkill(r4, 0x34) getpid() pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000780)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x2, 0xf9, 0x5, 0x8, 0x3, 0x3e, 0xb39, 0x250, 0x40, 0x397, 0x8, 0x200, 0x38, 0x2, 0x4, 0x1, 0x9fc}, [{0x6, 0x6, 0x3, 0x7, 0x270, 0x8001, 0xffff, 0x6}, {0x0, 0x10000, 0x81, 0x4, 0x81, 0x6, 0x5, 0x2}], "e8b585c9c19b6ccfae42d5182ce9b876306b23bba488b3349e40c84db51441902d6d7a56a4d87b0a6e0294452212e36c58bc71507864983c05", ['\x00', '\x00']}, 0x2e9) 13:11:46 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='tmpfs\x00', 0xa08007, 0x0) mount_setattr(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000180)={0x9, 0x0, 0x80000}, 0x20) 13:11:46 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x17f) write(0xffffffffffffffff, &(0x7f0000000180)="140000004a005f0214f9f424000904000a", 0x11) splice(r0, 0x0, r1, 0x0, 0xfffd, 0x0) 13:11:46 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/locks\x00', 0x0, 0x0) lseek(r0, 0x1000000000000003, 0x0) fcntl$setlease(r0, 0x400, 0x0) 13:11:46 executing program 0: r0 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(\x00'/118, 0x0) write(r0, &(0x7f00000004c0)='1', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) unshare(0x20000400) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_mtu(r1, 0x6, 0x17, 0x0, &(0x7f0000000080)) 13:11:46 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) recvmmsg(r0, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000000)=""/133, 0x85}, {&(0x7f00000002c0)=""/130, 0x82}, {0x0}, {&(0x7f0000000380)=""/161, 0xa1}, {&(0x7f0000000440)=""/184, 0xb8}, {&(0x7f0000000500)=""/153, 0x99}, {&(0x7f00000005c0)=""/213, 0xd5}, {&(0x7f0000000180)=""/53, 0x35}, {&(0x7f00000006c0)=""/244, 0xf4}], 0x9}}], 0x2102, 0x0, 0x0) 13:11:46 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sysvipc/sem\x00', 0x0, 0x0) lseek(r0, 0x400, 0x0) [ 718.954690][ T1185] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 13:11:47 executing program 0: r0 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="5500000018007f7000fe01b282a280930a60000248a84302910000003900090023001000010000000d0005005071c110aa2ebc37fb696bfe80000720000000000000149b1100b1df13000000fb0000400000000040", 0x55}], 0x1}, 0x0) 13:11:49 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6560ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2fc903c2b54706c05e4cb2e2875107608f9143f299d8e3f78f4bf076484885fd4089cb084607435b77c7f44cf0783279a494c8e4eba955b16e77f57966d4b79ce63a7560f29500352", 0x80}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:11:49 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sysvipc/sem\x00', 0x0, 0x0) lseek(r0, 0x400, 0x0) 13:11:49 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200, 0x0, 0x3be}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000080)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f00000009c0)='./file1\x00') close(r1) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x1) writev(0xffffffffffffffff, &(0x7f0000000980)=[{&(0x7f0000000700)="6e563c5f10aef1868b34b2b003bb8fe4cc91d15e76caa4aac3e8b81d5e34a48386f16e494e2d03140d", 0x29}, {&(0x7f0000000780)}, {&(0x7f0000000800)="a024e0c8f23e55f95807a4ef61150ce9cc2bd9b2423a673b", 0x18}], 0x3) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000001700)=ANY=[@ANYRESHEX, @ANYRES16, @ANYBLOB="a5002bbd7000ffdbdfa06b00000c0800021480e1b57c95a5296b00000080000000007ec3127c8201609150ddfd000000", @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000001900)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="ba01000015e913e73ab82083271a850455e66e48f8ab6340fbf34259671d74010000000000000021964771a5daf364daf34a7bc1bdf18c4ba98ff8199775863f84c471d71975672ce83820e109d40ac4c9ef4204b10c9511d4cb9a1fdb1d41f552acacdf08752840baf90700000000000000b8c8db05c01d17468f1c5702d54280d0cb1cbe631c4f47acc100a4918dfce089dd08d527ffcb2f6588d51a8e89ad3e61a114bd7bd354865812ad283fc8eee46cb7fd999c5bed57fa62b97c8ce7e87e01d6d8fe54b2269bffb6fd8ffa67c6cdb3674521bb7b878c88a057ed339f9310f7db66cd1e19c9e0a1b4d455511b70647dd7e8142f71bdfc69552f0883880ff0dccd51b95504d22279135b3df122fefee05f71250da37f4f3f14f504e1c46cb6a2cbf6fc70aca58b97e76e8023f99be68e76782d479b9f7d26ddef0e6adae305b9aac8055180ccf555d429e58a7aba6df0291b88237fe41e711942095e8c02e26a22675bcc54300094a1af5ce11ffd1104db9f71eddad711c00c24e90f8f90866300f81ca06d66f4b17915fef24a7a6b8e7c1e80d3b8dffff2c96c77a578875c793445ffb3ec7ca8696d288552e6df1039c48e4ceb77f51b14127fcc001cc3248744d462b43d48cba20ccc3d40be923594a7b65b737fb9983a45164b8f701996c7d1d0886f604d179149c2deb908000000e3006173372860f0c57226fba67d795b32fc319e249dec420eeaa4d27173371e4785831ab0f81e90468a97e6bc1a4755ad23c44c72e7a205f4ec61a6c8e5c2d8636e9c9782", @ANYRES16, @ANYRESDEC], 0x1d4}, 0x1, 0x0, 0x0, 0x24048000}, 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000280)={0x0, 0x407, 0x0, 0x1}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000001200)={0x0, 0x0, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct}}) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000180)={{}, 0x0, 0x2, @inherit={0x90, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000000000009000000000000008f0400000000000000000000000000001600000000000000600800000000000001000000000000000900000000003db699b5ccc2c763e30d91444d740000010000800000000001000080000000000800000000"]}, @devid}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000a00)={0x0, 0x0, 0xa8b9, 0x1}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:11:49 executing program 1: socket$nl_route(0x10, 0x3, 0x0) r0 = memfd_create(&(0x7f0000000140)='\xedr!QY\x88=Vx\xa1\xd1<\xdeb\x17\xd3\xe2i\x1d5\x17\xa4\x00\xd8\x02\x9f\x11\xfa\t\x13]\f\xcbo\xc4X\x00\x94/\x96h\xef~Ms\"\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000100000094, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000001c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x264, &(0x7f0000000000)=[{0x16}]}, 0x10) bind(0xffffffffffffffff, 0x0, 0x0) 13:11:49 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) writev(r3, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4feff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000200)=0x0) tkill(r4, 0x34) getpid() pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000780)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x2, 0xf9, 0x5, 0x8, 0x3, 0x3e, 0xb39, 0x250, 0x40, 0x397, 0x8, 0x200, 0x38, 0x2, 0x4, 0x1, 0x9fc}, [{0x6, 0x6, 0x3, 0x7, 0x270, 0x8001, 0xffff, 0x6}, {0x0, 0x10000, 0x81, 0x4, 0x81, 0x6, 0x5, 0x2}], "e8b585c9c19b6ccfae42d5182ce9b876306b23bba488b3349e40c84db51441902d6d7a56a4d87b0a6e0294452212e36c58bc71507864983c05", ['\x00', '\x00']}, 0x2e9) 13:11:49 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) recvmmsg(r0, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000000)=""/133, 0x85}, {&(0x7f00000002c0)=""/130, 0x82}, {0x0}, {&(0x7f0000000380)=""/161, 0xa1}, {&(0x7f0000000440)=""/184, 0xb8}, {&(0x7f0000000500)=""/153, 0x99}, {&(0x7f00000005c0)=""/213, 0xd5}, {&(0x7f0000000180)=""/53, 0x35}, {&(0x7f00000006c0)=""/244, 0xf4}], 0x9}}], 0x2102, 0x0, 0x0) 13:11:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) recvmmsg(r0, &(0x7f0000000440), 0x0, 0x100, &(0x7f0000000540)={0x0, 0x3938700}) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a}, 0x0, 0x0, 0xffffffffffffffff, 0x9) inotify_init() r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r1, &(0x7f00000009c0)=[{0x0}, {&(0x7f0000000480)=""/13, 0xd}], 0x2, 0x0, 0x0) 13:11:49 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x1405, 0x4) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000002c0)='!pu\t\t&6|\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x04\x00\x00\x00\x00\x00\x00\x00\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') [ 722.017971][ T1229] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 722.020624][ T1225] new mount options do not match the existing superblock, will be ignored 13:11:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) recvmmsg(r0, &(0x7f0000000440), 0x0, 0x100, &(0x7f0000000540)={0x0, 0x3938700}) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a}, 0x0, 0x0, 0xffffffffffffffff, 0x9) inotify_init() r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r1, &(0x7f00000009c0)=[{0x0}, {&(0x7f0000000480)=""/13, 0xd}], 0x2, 0x0, 0x0) [ 722.066475][ T1225] new mount options do not match the existing superblock, will be ignored 13:11:50 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x1405, 0x4) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000002c0)='!pu\t\t&6|\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x04\x00\x00\x00\x00\x00\x00\x00\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') 13:11:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) recvmmsg(r0, &(0x7f0000000440), 0x0, 0x100, &(0x7f0000000540)={0x0, 0x3938700}) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a}, 0x0, 0x0, 0xffffffffffffffff, 0x9) inotify_init() r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r1, &(0x7f00000009c0)=[{0x0}, {&(0x7f0000000480)=""/13, 0xd}], 0x2, 0x0, 0x0) [ 722.148422][ T1237] new mount options do not match the existing superblock, will be ignored 13:11:50 executing program 1: set_mempolicy(0x2, &(0x7f0000000040)=0x1405, 0x4) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000002c0)='!pu\t\t&6|\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x04\x00\x00\x00\x00\x00\x00\x00\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') [ 722.220223][ T1241] new mount options do not match the existing superblock, will be ignored