7f0000000000)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x1, 0x0) 03:56:16 executing program 3: r0 = syz_io_uring_setup(0x70c4, &(0x7f0000000240), &(0x7f000033c000/0x2000)=nil, &(0x7f0000400000/0xc00000)=nil, &(0x7f0000000440)=0x0, &(0x7f0000000400)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0xa89a1c1bd660819, 0x0, 0x0, 0x0, &(0x7f0000000140)}, 0x0) r3 = dup(r0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x0, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x4) syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540), &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000380)=@IORING_OP_ASYNC_CANCEL, 0x0) io_uring_enter(r3, 0x6708, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) ppoll(&(0x7f0000000080)=[{r0, 0x89}], 0x1, 0x0, 0x0, 0x0) 03:56:16 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc0189436, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}) [ 246.571804][T13561] new mount options do not match the existing superblock, will be ignored 03:56:17 executing program 5: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) r1 = socket$inet6(0xa, 0x3, 0xff) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) r2 = open(&(0x7f0000000100)='./bus\x00', 0x10a4040, 0x0) r3 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r3, 0x208200) bind(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8000fffffffe) openat$zero(0xffffff9c, 0x0, 0x0, 0x0) 03:56:17 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x7) 03:56:17 executing program 3: r0 = syz_io_uring_setup(0x70c4, &(0x7f0000000240), &(0x7f000033c000/0x2000)=nil, &(0x7f0000400000/0xc00000)=nil, &(0x7f0000000440)=0x0, &(0x7f0000000400)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0xa89a1c1bd660819, 0x0, 0x0, 0x0, &(0x7f0000000140)}, 0x0) r3 = dup(r0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x0, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x4) syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540), &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000380)=@IORING_OP_ASYNC_CANCEL, 0x0) io_uring_enter(r3, 0x6708, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) ppoll(&(0x7f0000000080)=[{r0, 0x89}], 0x1, 0x0, 0x0, 0x0) 03:56:17 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.cpu_exclusive\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x12) 03:56:17 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='cpu&3\n&&\n\t\x00\xc8 \xf4\xb3\xca\f\x90|\x1ff\xf0\xd2\x9ba\xdd\xba\x93\xf3\xa2\x97e\xd7\xa37\xc0\xae$\xef\x1f\x1feq*\xeb\x00\xffx\x7fV-W\xeb\x9c\xf5\xe5!d\x99]\x17~\x9e\\\xac\x1f\x93\x00\x02\x00\x80T\"\x00\x80\xff\xff\x03\xf6\xf2\x15<\xfe\xe3\x8b\xc4\x00\x00\x00') 03:56:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f00000001c0)=ANY=[@ANYBLOB="020000000000000002000000e00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000003000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200"], 0x210) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) dup2(r1, r2) 03:56:17 executing program 1: sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="40000000010700000000000000000000000000000c00025400000000000000000900010073797a300000000014000780080001400000000076fe0240"], 0x40}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="03806749bc970400005bf14b4702381427a5b9890100000000000000010073790930000000001900120c0000000000000000c8000480c40001800700010a6374026fa9b551040000000000000000000000d46ee451"], 0x1}}, 0x0) r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r0, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) 03:56:17 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f0000000240)=ANY=[], 0x120) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f0000000100)) 03:56:17 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.cpu_exclusive\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x12) [ 247.271811][T13585] new mount options do not match the existing superblock, will be ignored 03:56:17 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f00000004c0)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @dev}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2c, &(0x7f00000004c0)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @dev}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f00000004c0)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @dev}}}, 0x108) 03:56:17 executing program 3: r0 = syz_io_uring_setup(0x70c4, &(0x7f0000000240), &(0x7f000033c000/0x2000)=nil, &(0x7f0000400000/0xc00000)=nil, &(0x7f0000000440)=0x0, &(0x7f0000000400)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0xa89a1c1bd660819, 0x0, 0x0, 0x0, &(0x7f0000000140)}, 0x0) r3 = dup(r0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x0, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x4) syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540), &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000380)=@IORING_OP_ASYNC_CANCEL, 0x0) io_uring_enter(r3, 0x6708, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) ppoll(&(0x7f0000000080)=[{r0, 0x89}], 0x1, 0x0, 0x0, 0x0) 03:56:17 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0xc}, {0x6}]}) [ 247.386409][T13612] new mount options do not match the existing superblock, will be ignored [ 247.409904][ T25] kauditd_printk_skb: 14 callbacks suppressed 03:56:17 executing program 5: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) r1 = socket$inet6(0xa, 0x3, 0xff) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) r2 = open(&(0x7f0000000100)='./bus\x00', 0x10a4040, 0x0) r3 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r3, 0x208200) bind(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8000fffffffe) openat$zero(0xffffff9c, 0x0, 0x0, 0x0) 03:56:17 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x11, r0, 0xee00, 0x0) 03:56:17 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x2041) io_setup(0x1, &(0x7f0000000180)=0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r1, 0x2, &(0x7f0000000200)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}, 0x0]) 03:56:17 executing program 4: ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x53, 0x2}, @ramp}) r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x2, 0x822b01) write$char_usb(r0, &(0x7f0000000040)="e2", 0x570) 03:56:17 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890c, 0x0) [ 247.409913][ T25] audit: type=1326 audit(1621914977.346:386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13615 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 03:56:17 executing program 2: unshare(0x6c060000) accept(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000002000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bea00000000f1fffffffffff7ff0000000000000002000000020000007f000001000000000000000000000000000000000000000000000000000000000000000020870000000000001d000000000000000000000000cc15000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002"], 0x190) ioctl$sock_inet_SIOCSIFADDR(r1, 0x891c, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @broadcast}}) 03:56:17 executing program 3: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x1f00000000000000, 0xd0, &(0x7f0000000000), 0x4) 03:56:17 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x139, &(0x7f0000000140)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 03:56:17 executing program 4: r0 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x51e3485c}, 0x10) write(r0, &(0x7f0000000280)="1c0000001a009b8a14e5f4070009042400000000ff02000000000000", 0x1e5) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:56:17 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x2041) io_setup(0x1, &(0x7f0000000180)=0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r1, 0x2, &(0x7f0000000200)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}, 0x0]) 03:56:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x10, &(0x7f0000000040)='sit0\x00', 0x10) 03:56:17 executing program 5: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) r1 = socket$inet6(0xa, 0x3, 0xff) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) r2 = open(&(0x7f0000000100)='./bus\x00', 0x10a4040, 0x0) r3 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r3, 0x208200) bind(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8000fffffffe) openat$zero(0xffffff9c, 0x0, 0x0, 0x0) 03:56:17 executing program 0: r0 = getpid() ioprio_set$pid(0x2, r0, 0x0) [ 247.593290][T13652] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 03:56:17 executing program 4: personality(0x1bb2baf3005ac137) uname(&(0x7f0000000180)=""/189) 03:56:17 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0x10132) bind$unix(r0, &(0x7f0000000440)=@abs={0x1}, 0x6e) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmmsg(r1, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x102, 0x0) 03:56:17 executing program 0: migrate_pages(0x0, 0x7ffd, &(0x7f0000000040)=0x1, &(0x7f0000000000)) [ 247.640602][T13652] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 03:56:17 executing program 2: unshare(0x6c060000) accept(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000002000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bea00000000f1fffffffffff7ff0000000000000002000000020000007f000001000000000000000000000000000000000000000000000000000000000000000020870000000000001d000000000000000000000000cc15000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002"], 0x190) ioctl$sock_inet_SIOCSIFADDR(r1, 0x891c, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @broadcast}}) 03:56:17 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x2041) io_setup(0x1, &(0x7f0000000180)=0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r1, 0x2, &(0x7f0000000200)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}, 0x0]) 03:56:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={&(0x7f00000005c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_EEE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x20}}, 0x0) 03:56:17 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$inet6(r0, &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)=[@hoplimit={{0x14}}], 0x18}, 0x0) 03:56:17 executing program 5: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) r1 = socket$inet6(0xa, 0x3, 0xff) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) r2 = open(&(0x7f0000000100)='./bus\x00', 0x10a4040, 0x0) r3 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r3, 0x208200) bind(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8000fffffffe) openat$zero(0xffffff9c, 0x0, 0x0, 0x0) 03:56:17 executing program 0: rseq(&(0x7f0000000200), 0x20, 0x0, 0x0) io_setup(0x3, &(0x7f0000000140)=0x0) io_pgetevents(r0, 0x5, 0x5, &(0x7f00000004c0)=[{}, {}, {}, {}, {}], &(0x7f0000000040)={0x0, 0x3938700}, 0x0) 03:56:17 executing program 2: unshare(0x6c060000) accept(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000002000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bea00000000f1fffffffffff7ff0000000000000002000000020000007f000001000000000000000000000000000000000000000000000000000000000000000020870000000000001d000000000000000000000000cc15000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002"], 0x190) ioctl$sock_inet_SIOCSIFADDR(r1, 0x891c, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @broadcast}}) 03:56:17 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x2041) io_setup(0x1, &(0x7f0000000180)=0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r1, 0x2, &(0x7f0000000200)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}, 0x0]) 03:56:17 executing program 3: r0 = socket$inet(0x2, 0x3, 0xff) getsockopt$inet_mreq(r0, 0x0, 0x20, 0x0, &(0x7f0000000040)) [ 247.806605][T13695] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 03:56:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0xfefa6ab0ed487de6, 0x0) 03:56:17 executing program 3: clone(0x100100, 0x0, &(0x7f0000000240), 0x0, 0x0) 03:56:17 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={@mcast1={0xff, 0x5}, 0x0, r1}) 03:56:17 executing program 5: r0 = creat(&(0x7f0000000900)='./file0\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7fffffff}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000100)={0x0, 0x5, 0x4}) 03:56:17 executing program 2: unshare(0x6c060000) accept(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000002000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bea00000000f1fffffffffff7ff0000000000000002000000020000007f000001000000000000000000000000000000000000000000000000000000000000000020870000000000001d000000000000000000000000cc15000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002"], 0x190) ioctl$sock_inet_SIOCSIFADDR(r1, 0x891c, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @broadcast}}) 03:56:17 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f00000001c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x7e, &(0x7f0000000200)="8d31ca171569b4621a56e28c5b78376e18cd3d3dfcb946cf885a21539a0c4a081ceeb24ac13870b2beaa344dc69190f8d2802fab69347b9a915308c4829b4b43353c485f8bb2967cd7e1292aaa638836dadc35be1252c596ea9ac7aefa9bbae2eda4ee345105dc5795b1f53cf809c1bbe031921a79aac27420c9f94e87ae"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) [ 247.911954][T13722] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 03:56:17 executing program 1: mmap(&(0x7f0000012000/0x3000)=nil, 0x3000, 0x4, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x5, 0x0, &(0x7f0000013000)) 03:56:17 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000001440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:56:18 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) 03:56:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r1, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c3549b712f00c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3142", 0xff7c}], 0x1) 03:56:18 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000500), 0x5, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x16, 0x38, "798204b89f508af531a9d248d9063303765e798840e577b2ec2e0434eaaf3501bd867eba21158db0ee18940ab69f67d5e5b2eafc909961a984236409d02604c7", "f509fd5e690d62de1b49c31e58e97abd58d8f784174eeb921ad4619b43f8412d"}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000340)={'raw\x00'}, &(0x7f00000003c0)=0x54) 03:56:18 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ftruncate(r0, 0x0) [ 248.074625][T13750] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 03:56:18 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0201a6ffffffc4c10100ff45ac0480ffffffee8008000000000200000000010000ffa9000000e10000008877007200300700bfffffff00040010008000da55aa", 0x40, 0x1c0}]) 03:56:18 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000540)={0x20, r1, 0x701, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x20}}, 0x0) 03:56:18 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x5413, 0xfffffffffffffffb) 03:56:18 executing program 5: r0 = creat(&(0x7f0000000900)='./file0\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7fffffff}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000100)={0x0, 0x5, 0x4}) [ 248.113171][T13773] loop0: detected capacity change from 0 to 4 [ 248.122338][T13773] EXT4-fs (loop0): bad geometry: block count 128 exceeds size of device (1 blocks) 03:56:18 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80021100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:56:18 executing program 0: unshare(0x400) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x4) [ 248.214893][T13789] loop2: detected capacity change from 0 to 1 03:56:18 executing program 4: r0 = semget$private(0x0, 0x4000000009, 0x0) semop(0x0, &(0x7f0000000380)=[{0x1, 0xffff}], 0x1) semop(r0, &(0x7f0000000080)=[{0x0, 0x10}], 0x1) semop(r0, &(0x7f0000000380), 0x1d) semtimedop(r0, &(0x7f00000000c0)=[{0x0, 0xff80}], 0x1, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) semop(r0, &(0x7f0000000140)=[{}, {0x2}], 0x2) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000040)=[0x0, 0x400]) 03:56:18 executing program 1: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x1be, &(0x7f00000002c0)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 03:56:18 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCCONS(r0, 0x545d) 03:56:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r1, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c3549b712f00c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3142", 0xff7c}], 0x1) 03:56:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x28, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e2f4655f000000000000000001000000000000000b0000000001000008000000d2420100128300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e30323537333639353800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="0000000000000000000000009b94b11e46934f5489a26265ae170793010040000c00000000000000e2f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000040000005900000000000000", 0x40, 0x540}, {&(0x7f0000010300)="0300000004000000000000000000000000000000010400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x1000}, {&(0x7f0000010500)="ff030000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000e2f4655fe2f4655fe2f4655f00"/8224, 0x2020, 0x2000}, {&(0x7f0000012600)="ed41000000100000e2f4655fe2f4655fe2f4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x4100}, {&(0x7f0000012700)="20000000b4253260b425326000000000e2f4655f00"/32, 0x20, 0x4180}, {&(0x7f0000012800)="8081000000180000e2f4655fe2f4655fe2f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030000000", 0x40, 0x4200}, {&(0x7f0000012900)="20000000000000000000000000000000e2f4655f00"/32, 0x20, 0x4280}, {&(0x7f0000012a00)="8081000000180000e2f4655fe2f4655fe2f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040000000", 0x40, 0x4300}, {&(0x7f0000012b00)="20000000000000000000000000000000e2f4655f00"/32, 0x20, 0x4380}, {&(0x7f0000012c00)="c041000000400000e2f4655fe2f4655fe2f4655f00000000000002008000000000000800000000000af301000400000000000000000000000400000020000000", 0x40, 0x4a00}, {&(0x7f0000012d00)="20000000000000000000000000000000e2f4655f00"/32, 0x20, 0x4a80}, {&(0x7f0000012e00)="ed41000000100000e2f4655fe2f4655fe2f4655f00000000000002008000000000000800030000000af3010004000000000000000000000001000000500000000000000000000000000000000000000000000000000000000000000000000000000000005bcc129100000000000000000000000000000000000000000000000020000000b4253260b4253260b4253260e2f4655fb42532600000000000000000", 0xa0, 0x4b00}, {&(0x7f0000012f00)="ed8100001a040000e2f4655fe2f4655fe2f4655f00000000000001008000000000000800010000000af3010004000000000000000000000001000000600000000000000000000000000000000000000000000000000000000000000000000000000000005f43fa2400000000000000000000000000000000000000000000000020000000b4253260b4253260b4253260e2f4655fb42532600000000000000000", 0xa0, 0x4c00}, {&(0x7f0000013000)="ffa1000026000000e2f4655fe2f4655fe2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3032353733363935382f66696c65302f66696c6530000000000000000000000000000000000000000000006561281700000000000000000000000000000000000000000000000020000000b4253260b4253260b4253260e2f4655fb42532600000000000000000", 0xa0, 0x4d00}, {&(0x7f0000013100)="ed8100000a000000e2f4655fe2f4655fe2f4655f00000000000001008000000000000800010000000af3010004000000000000000000000001000000700000000000000000000000000000000000000000000000000000000000000000000000000000002a20390700000000000000000000000000000000000000000000000020000000b4253260b4253260b4253260e2f4655fb42532600000000000000000000002ea06015400000000000600000000000000786174747231000006014c0000000000060000000000000078617474723200000000000000000000000000000000000000000000000000000000000078617474723200007861747472310000ed81000028230000e2f4655fe2f4655fe2f4655f00000000000002008000000000000800010000000af30100040000000000000000000000030000008000000002000000010000008200000002000000018000008200000000000000000000000000000033142f1800000000000000000000000000000000000000000000000020000000b4253260b4253260b4253260e2f4655fb42532600000000000000000", 0x1a0, 0x4e00}, {&(0x7f0000013300)="ed81000064000000e2f4655fe2f4655fe2f4655f00000000000001008000000000000800010000000af301000400000000000000000000000100000090000000000000000000000000000000000000000000000000000000000000000000000000000000eaaaeb6900000000000000000000000000000000000000000000000020000000b4253260b4253260b4253260e2f4655fb42532600000000000000000", 0xa0, 0x5000}, {&(0x7f0000013400)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c653300000011000000940f090166696c652e636f6c64000000", 0x80, 0x10000}, {&(0x7f0000013500)="0b0000000c0001022e00000002000000f40f02022e2e00"/32, 0x20, 0x20000}, {&(0x7f0000013600)="00000000001000"/32, 0x20, 0x21000}, {&(0x7f0000013700)="00000000001000"/32, 0x20, 0x22000}, {&(0x7f0000013800)="00000000001000"/32, 0x20, 0x23000}, {&(0x7f0000013900)="111fc0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x30000}, {&(0x7f0000013a00)="0200"/32, 0x20, 0x30400}, {&(0x7f0000013b00)="0300"/32, 0x20, 0x30800}, {&(0x7f0000013c00)="0400"/32, 0x20, 0x30c00}, {&(0x7f0000013d00)="0500"/32, 0x20, 0x31000}, {&(0x7f0000013e00)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000700"/96, 0x60, 0x31400}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x40000}, {&(0x7f0000014000)="0200"/32, 0x20, 0x40400}, {&(0x7f0000014100)="0300"/32, 0x20, 0x40800}, {&(0x7f0000014200)="0400"/32, 0x20, 0x40c00}, {&(0x7f0000014300)="0500"/32, 0x20, 0x41000}, {&(0x7f0000014400)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000700"/96, 0x60, 0x41400}, {&(0x7f0000014500)="0c0000000c0001022e000000020000000c0002022e2e00000d0000001000050166696c65300000000e000000d80f050766696c653100"/64, 0x40, 0x50000}, {&(0x7f0000014600)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x60000}, {&(0x7f0000014b00)='syzkallers\x00'/32, 0x20, 0x70000}, {&(0x7f0000014c00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x90000}], 0x0, &(0x7f0000014d00)) 03:56:18 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in6=@private1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in=@broadcast, 0x0, 0x33}, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x0, 0x2}}, 0xf8}}, 0x0) 03:56:18 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000100)="8e0e9b44081b2547", 0x8}], 0x1) 03:56:18 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in6=@private1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in=@broadcast, 0x0, 0x33}, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x0, 0x2}}, 0xf8}}, 0x0) 03:56:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000002f80)={0x14, r1, 0x1}, 0x14}}, 0x0) 03:56:18 executing program 5: r0 = creat(&(0x7f0000000900)='./file0\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7fffffff}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000100)={0x0, 0x5, 0x4}) 03:56:18 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="66530700ae897094e71b0fa1f1070000003646", 0x13}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) [ 248.457878][T13843] loop1: detected capacity change from 0 to 4096 03:56:18 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETS(r0, 0x5432, 0x0) [ 248.507964][T13843] loop1: detected capacity change from 0 to 4096 03:56:19 executing program 4: r0 = getpid() r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) clone3(&(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x58) process_vm_readv(r0, &(0x7f0000001580)=[{&(0x7f0000000180)=""/240, 0xf0}, {&(0x7f0000000580)=""/4096, 0x20001580}], 0x2, &(0x7f00000026c0)=[{&(0x7f0000001600)=""/106, 0x7ffff000}, {0x0}], 0x2, 0x0) 03:56:19 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in6=@private1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in=@broadcast, 0x0, 0x33}, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x0, 0x2}}, 0xf8}}, 0x0) 03:56:19 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x74}, {0x16}]}) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, 0x0, 0x0) 03:56:19 executing program 5: r0 = creat(&(0x7f0000000900)='./file0\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7fffffff}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000100)={0x0, 0x5, 0x4}) 03:56:19 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open_by_handle_at(0xffffffffffffff9c, &(0x7f0000000200)=@ceph_nfs_fh={0x8, 0x1, {0x4002}}, 0x0) 03:56:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r1, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c3549b712f00c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3142", 0xff7c}], 0x1) 03:56:19 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in6=@private1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in=@broadcast, 0x0, 0x33}, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x0, 0x2}}, 0xf8}}, 0x0) [ 249.229080][ T25] audit: type=1326 audit(1621914979.166:387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13886 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 03:56:19 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(r2) r4 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x96a44f1) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) dup3(r3, r2, 0x0) 03:56:19 executing program 2: syz_mount_image$nfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='context=sysadm_u,fsc=s']) 03:56:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r1, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c3549b712f00c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3142", 0xff7c}], 0x1) 03:56:19 executing program 2: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="2332aeb36cabc7c419568d"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 03:56:19 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="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", 0x132}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:56:19 executing program 4: r0 = getpid() r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) clone3(&(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x58) process_vm_readv(r0, &(0x7f0000001580)=[{&(0x7f0000000180)=""/240, 0xf0}, {&(0x7f0000000580)=""/4096, 0x20001580}], 0x2, &(0x7f00000026c0)=[{&(0x7f0000001600)=""/106, 0x7ffff000}, {0x0}], 0x2, 0x0) 03:56:19 executing program 5: set_mempolicy(0x0, 0x0, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x20000000005) socket$inet_udplite(0x2, 0x2, 0x88) dup3(r1, r0, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) 03:56:20 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xc, &(0x7f0000000180)="c4c691017bd5960104e77ef8"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1e681e6e61197c7582265beb6311c2daf20eaebeeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 03:56:20 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="f5c60951a2341498ddacb5"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 03:56:20 executing program 3: r0 = epoll_create(0x9) fgetxattr(r0, &(0x7f0000000200)=@random={'security.', '\x11\x7f5CA!\xc8\x12;GLB[v\xb6{>z\x10\xac\t\x06\xc6\x17^\xef\xac\x9d\xf4\x87\x15\x1006\x90\xdaOF\x8c\x9dt5\xf2\xa5!;\x9cR\xe8\xd2\xac\x0e\xa2R|l(6G\xefK\xe5l\x05:\xabp\x972:\x1e}U\x0e\x87\x1f\xc2X\x80[>\xa0\xd6LoGb\xcb\x9b\x80^L\x9du\x85\b_\x11\xdc\xb4\xae\xd7\xcfh\x9d\xa1\x10\xf4\xe5\xe8a\x90\xba\x7f\b\xe1\x8b\xab\x1e\xb8\xbcn\xe6\x138#\xf1\x80;\xab\xc6s\xab<\xbfj=\xa5\v\xe11YA\xe8\xf0\x82\xce\xc1\xfa!Q\xe6\x89}\x97y\xf7\xa6V\x96\x8by\b\xe6|i\x92\xe3\xb8\x9bY\x1f\xb9\x1eu\xd3M\xa3\xf8\a\x15\xe17\xfcJ\xaf\xfayoX\x1b\xee\xdez\xc1,IGT\x14\xe2\x84\xac\x85k\xfeL`\x1fZ\x86\xe1\xb9\t\x9e2\x14F\x806\xb56FW\x8bn\xba\xf2$\xffh\"\x1ed\xcc\xb3\x013\x1d\n&\xea\x872\xf1\x06\xa3dy\xc1\x94\xfb\x18\a\x10\xaa\x8a\xb1*'}, 0x0, 0x0) 03:56:20 executing program 4: r0 = getpid() r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) clone3(&(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x58) process_vm_readv(r0, &(0x7f0000001580)=[{&(0x7f0000000180)=""/240, 0xf0}, {&(0x7f0000000580)=""/4096, 0x20001580}], 0x2, &(0x7f00000026c0)=[{&(0x7f0000001600)=""/106, 0x7ffff000}, {0x0}], 0x2, 0x0) [ 250.055656][ T25] audit: type=1326 audit(1621914979.996:388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13886 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 03:56:20 executing program 1: syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) select(0x61, &(0x7f0000000040), &(0x7f0000000080)={0x8}, 0x0, 0x0) 03:56:20 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(r2) r4 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x96a44f1) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) dup3(r3, r2, 0x0) 03:56:20 executing program 3: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000040)="ff0204000000000100000000000000000000000000000205", 0x18) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @private2}, 0x1c) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f0000000180), 0x8) set_mempolicy(0x2, &(0x7f00000007c0)=0xc5f, 0x1000) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:56:20 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000280), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x24}}, 0x0) 03:56:20 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x10, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000080), 0x5, 0x0, 0x0, &(0x7f00000000c0), 0x93ffffff) 03:56:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x381001, 0x0) fcntl$getflags(r1, 0x2) 03:56:20 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06006c0001000000450000002500000019002e000400ad000200000000000006040000000000000000", 0x39}], 0x1) 03:56:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_io_uring_setup(0x7463, &(0x7f0000000180), &(0x7f00003b2000/0x800000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000000)=0x0) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, r0, 0x0, 0x0}, 0x722c) syz_io_uring_submit(r2, r3, &(0x7f0000000100)=@IORING_OP_FILES_UPDATE={0x14, 0x2, 0x0, 0x0, 0x0, &(0x7f0000000080)=[0xffffffffffffffff], 0x1}, 0x0) syz_io_uring_setup(0x15b4, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000040)=0x0) syz_io_uring_submit(r2, r4, &(0x7f0000000140)=@IORING_OP_SYNC_FILE_RANGE, 0x7fffffff) io_uring_enter(r1, 0x4ab0, 0x0, 0x0, 0x0, 0x0) 03:56:20 executing program 1: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x131001, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20, &(0x7f0000000180)='noquota') 03:56:20 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) read$eventfd(r0, &(0x7f0000000180), 0x8) [ 250.268584][T13972] futex_wake_op: syz-executor.5 tries to shift op by -1; fix this program 03:56:20 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x15, &(0x7f00000004c0)) ptrace(0x4206, r0) ptrace$peeksig(0x4209, r0, &(0x7f0000000600)={0x0, 0x1, 0x1}, &(0x7f0000000640)=[{}]) [ 250.346474][T13989] netlink: 'syz-executor.3': attribute type 46 has an invalid length. [ 250.373704][T13991] EXT4-fs (sda1): re-mounted. Opts: noquota. Quota mode: none. 03:56:20 executing program 4: r0 = getpid() r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) clone3(&(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x58) process_vm_readv(r0, &(0x7f0000001580)=[{&(0x7f0000000180)=""/240, 0xf0}, {&(0x7f0000000580)=""/4096, 0x20001580}], 0x2, &(0x7f00000026c0)=[{&(0x7f0000001600)=""/106, 0x7ffff000}, {0x0}], 0x2, 0x0) 03:56:20 executing program 3: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="0000003a3b70fa1a06fdc6"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) [ 250.422164][T13996] EXT4-fs (sda1): re-mounted. Opts: noquota. Quota mode: none. 03:56:21 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(r2) r4 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x96a44f1) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) dup3(r3, r2, 0x0) 03:56:21 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x11, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) 03:56:21 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9e\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x05\x00\x00\x00\x00\x00\x00\x00aA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xc0\x8b\x19\x17\xb7Rvd\xcb:\b\x00\x00\x00', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f000057f000/0x1000)=nil, 0x1000, 0x4, 0x2012, r0, 0x0) ftruncate(r0, 0xeb) 03:56:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000018000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)) 03:56:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000000)=""/24, 0x18}, {0x0, 0x4000}], 0x2) readv(0xffffffffffffffff, 0x0, 0x0) 03:56:21 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r2 = creat(&(0x7f0000000300)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x46000) lseek(r2, 0x4200, 0x0) open(0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x80, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SEQ_ADJ_REPLY={0x1c, 0xf, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_BEFORE={0x8}, @CTA_SEQADJ_CORRECTION_POS={0x9}, @CTA_SEQADJ_OFFSET_AFTER={0x8}]}]}, 0x80}}, 0x0) 03:56:21 executing program 2: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@updpolicy={0xb8, 0x19, 0x21, 0x0, 0x0, {{@in=@loopback, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x31, &(0x7f0000000040)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x20) 03:56:21 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) ppoll(&(0x7f0000000100)=[{r0}], 0x1, 0x0, 0x0, 0x0) 03:56:21 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') close_range(r0, 0xffffffffffffffff, 0x2) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) 03:56:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee00) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f00000002c0)=0x7, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r3, &(0x7f0000000080)={0xa, 0x14e22, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) [ 251.140725][T14023] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 251.148911][T14023] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 251.161494][T14028] loop1: detected capacity change from 0 to 4 [ 251.177842][T14028] EXT4-fs (loop1): Invalid log block size: 6144 03:56:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800002, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000600)=0x2) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) poll(&(0x7f0000000000)=[{r2}], 0x1, 0x8) 03:56:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_sigprocmask(0x0, &(0x7f0000000100)={[0xfffffffffffe]}, 0x0, 0x8) r1 = gettid() timer_create(0x0, &(0x7f0000000180)={0x0, 0x17, 0x4, @tid=r1}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x3938700}, {0x0, 0xe4c}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040), 0x0) ppoll(0x0, 0x0, &(0x7f0000000140)={0x0, 0x3938700}, &(0x7f0000000280), 0x8) [ 251.241499][T14028] loop1: detected capacity change from 0 to 4 [ 251.250177][T14028] EXT4-fs (loop1): Invalid log block size: 6144 03:56:21 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(r2) r4 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x96a44f1) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) dup3(r3, r2, 0x0) 03:56:21 executing program 1: r0 = perf_event_open(&(0x7f0000001740)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r1, r0) 03:56:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000000)=0x4, 0x4) 03:56:21 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000006b00)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000000580)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="8224", 0x2}], 0x1}}], 0x1, 0x40008000) sendmmsg$inet6(r0, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000016c0)=[{&(0x7f0000000000)="0e35", 0x2}], 0x1}}], 0x1, 0x3a) 03:56:21 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000680)={0x1, &(0x7f0000000640)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xfe, &(0x7f0000000140)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 03:56:21 executing program 4: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) lremovexattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000003c0)=@known='user.incfs.metadata\x00') creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x0, 0x0, 0x9, 0x2, 0x0, 0x3e2, 0x4, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x4000c, 0x0, 0x6, 0x0, 0x7fff, 0x8a, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) getpid() time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 03:56:22 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) utimensat(r0, 0x0, 0x0, 0x0) 03:56:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = semget$private(0x0, 0x20000000102, 0x0) semop(r1, &(0x7f0000000140)=[{0x0, 0x4}], 0x1) semop(r1, &(0x7f0000000000)=[{}], 0x1) semctl$IPC_RMID(r1, 0x0, 0x10) 03:56:22 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000000)={[0xffffffffffff2695]}, 0x8) readv(r0, &(0x7f0000000280)=[{&(0x7f0000001a00)=""/4072, 0xfe8}], 0x1) rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffffffffffffffd]}, 0x0, 0x8) r1 = fork() r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ptrace(0x10, r1) 03:56:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) mmap(&(0x7f00002d8000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) mincore(&(0x7f0000000000/0x800000)=nil, 0x800000, &(0x7f0000000280)=""/141) 03:56:22 executing program 2: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f00000000c0)={{0x80}}) [ 252.088549][ T25] audit: type=1326 audit(1621914982.026:389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14088 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 252.114744][ T25] audit: type=1326 audit(1621914982.026:390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14088 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=2 compat=0 ip=0x4665d9 code=0x7ffc0000 03:56:22 executing program 2: r0 = eventfd(0x0) r1 = syz_io_uring_setup(0x6101, &(0x7f00000001c0), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) io_uring_register$IORING_REGISTER_FILES(r1, 0x7, &(0x7f0000000000)=[r0], 0x1) [ 252.177536][ T25] audit: type=1326 audit(1621914982.026:391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14088 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 252.218570][ T25] audit: type=1326 audit(1621914982.026:392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14088 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=280 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 252.242892][ T25] audit: type=1326 audit(1621914982.026:393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14088 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 252.266989][ T25] audit: type=1326 audit(1621914982.026:394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14088 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=157 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 252.291761][ T25] audit: type=1326 audit(1621914982.056:395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14088 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 03:56:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000000)=0x4, 0x4) 03:56:22 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) setsockopt$sock_int(r0, 0x1, 0x24, &(0x7f0000000080), 0x4) 03:56:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x60, 0x0, 0x2, 0x401, 0x0, 0x0, {0x2}, [@CTA_EXPECT_TUPLE={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x24, 0x3, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0x8, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASTER={0x4}]}, 0x60}}, 0x0) 03:56:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r1) chroot(&(0x7f0000000040)='./file0\x00') 03:56:22 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000000100000008000100010000002c0004800500030080ffffff050003000000e4000500030000000000050003000000000050d70300000000000800020002"], 0x50}}, 0x0) 03:56:22 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "eaff18e2090000000000000200000000010051"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x16, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000000000001000"}) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000040)={0xb, 0x0, 0x0, 0x4000002, 0x0, "3c6eac16000000100000001900000400"}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0xfdfdffff, 0x0, 0x0, 0x0, 0x0, "00000000000003000000000000000000001000"}) 03:56:22 executing program 1: unshare(0x6c060000) r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000000)={'filter\x00', 0x2, [{}, {}]}, 0x48) 03:56:22 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x7f, 0xc4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0/../file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@sb}]}) 03:56:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xe, 0x5ee}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f0000000580)=ANY=[], 0x23) r1 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x84042, 0x0) sendfile(r1, r2, 0x0, 0x200004) 03:56:22 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000640)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e054859cff15f715134d82ce9c096bd644157684e3dae491de7642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103b66e1000031d322dbecfa63da445b8bef5bd9125939f50bd2d4edccbf938604a348a666bf58b23ac4edcce412245deacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d58160fa73f4e946", 0xdd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 252.911079][T14136] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 252.925572][T14139] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 252.934976][T14139] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 03:56:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4b, &(0x7f0000000140)=0x3bf, 0x4) setsockopt$inet6_group_source_req(r0, 0x29, 0x6, &(0x7f00000002c0)={0x108, {{0x29, 0x0, 0x2000000, @ipv4={'\x00', '\xff\xff', @broadcast}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) 03:56:22 executing program 1: unshare(0x6c060000) r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000000)={'filter\x00', 0x2, [{}, {}]}, 0x48) 03:56:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000000)=0x4, 0x4) 03:56:23 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000000), 0xdc7, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 03:56:23 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff01000000000000001b000000000001e000040100000400000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000510000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e30000000000200000000000003f"], 0xb8}, 0x1, 0xfffff000, 0x0, 0x20000005}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000940)=@updpolicy={0x2d0, 0x14, 0x1, 0x70bd29, 0x0, {{@in6=@mcast1, @in6=@private2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x6}, {0x3f000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000000000000}, {0x100000000000b18, 0x0, 0x8c8}, 0x0, 0x6e6bb7, 0x0, 0x0, 0x0, 0x2}, [@XFRMA_IF_ID={0x8}, @lastused={0xc, 0xf, 0x2}, @extra_flags={0x8, 0x18, 0x100}, @XFRMA_SET_MARK={0x8, 0x1d, 0x4941}, @sa={0xe0, 0x6, {{@in=@remote, @in6=@loopback, 0x4e23, 0x1, 0x4e21, 0x8001, 0x2, 0x120, 0x20}, {@in6=@local, 0x4d5, 0x2b}, @in6=@ipv4={'\x00', '\xff\xff', @empty}, {0x40, 0x1ff, 0x1000, 0x80000000, 0x0, 0x1000, 0x7fff, 0xb7}, {0x0, 0x1, 0x40}, {0x5, 0x0, 0x8}, 0x70bd2b, 0x3501, 0x2, 0x3, 0x80}}, @lifetime_val={0x24, 0x9, {0x6, 0xa23, 0x20, 0x8}}, @sa={0xe0, 0x6, {{@in6=@dev={0xfe, 0x80, '\x00', 0xa}, @in=@dev={0xac, 0x14, 0x14, 0x3c}, 0x4e23, 0x401, 0x4e24, 0x5, 0xa, 0x120, 0x80, 0x6}, {@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d4, 0x32}, @in6=@empty, {0x1, 0x1a60000000, 0x8, 0xe9, 0xffffffff, 0x2, 0x8, 0x40}, {0x8, 0x9, 0x100, 0x3}, {0x20, 0x9, 0x40}, 0x70bd26, 0x34ff, 0xa, 0x0, 0x7f, 0x58}}, @lastused={0xc, 0xf, 0x7}, @tfcpad={0x8, 0x16, 0xfb}]}, 0x2d0}, 0x1, 0xfffff000}, 0x20000800) 03:56:23 executing program 1: unshare(0x6c060000) r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000000)={'filter\x00', 0x2, [{}, {}]}, 0x48) 03:56:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xe, 0x5ee}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f0000000580)=ANY=[], 0x23) r1 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x84042, 0x0) sendfile(r1, r2, 0x0, 0x200004) 03:56:23 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000200), 0xc, 0x1e1401) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x11, 0x4}, {}], 0x30) write$evdev(r0, &(0x7f0000000040), 0xfea9) 03:56:23 executing program 1: unshare(0x6c060000) r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000000)={'filter\x00', 0x2, [{}, {}]}, 0x48) 03:56:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000140)={0x14, r1, 0x981, 0x0, 0x0, {0x1e}}, 0x14}}, 0x0) [ 253.807991][T14193] netlink: 640 bytes leftover after parsing attributes in process `syz-executor.2'. [ 253.837266][T14193] netlink: 640 bytes leftover after parsing attributes in process `syz-executor.2'. 03:56:23 executing program 3: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000000480)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000001540)="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", 0x1000}, {&(0x7f0000002540)="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", 0xac1}], 0x2}}], 0x1, 0x4000000) 03:56:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(r0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000200)=""/72, 0x48}], 0x3, 0x0, 0x0) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x134, &(0x7f00000002c0)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x40) [ 253.862043][T14203] netlink: 640 bytes leftover after parsing attributes in process `syz-executor.2'. 03:56:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xe, 0x5ee}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f0000000580)=ANY=[], 0x23) r1 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x84042, 0x0) sendfile(r1, r2, 0x0, 0x200004) 03:56:23 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff01000000000000001b000000000001e000040100000400000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000510000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e30000000000200000000000003f"], 0xb8}, 0x1, 0xfffff000, 0x0, 0x20000005}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000940)=@updpolicy={0x2d0, 0x14, 0x1, 0x70bd29, 0x0, {{@in6=@mcast1, @in6=@private2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x6}, {0x3f000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000000000000}, {0x100000000000b18, 0x0, 0x8c8}, 0x0, 0x6e6bb7, 0x0, 0x0, 0x0, 0x2}, [@XFRMA_IF_ID={0x8}, @lastused={0xc, 0xf, 0x2}, @extra_flags={0x8, 0x18, 0x100}, @XFRMA_SET_MARK={0x8, 0x1d, 0x4941}, @sa={0xe0, 0x6, {{@in=@remote, @in6=@loopback, 0x4e23, 0x1, 0x4e21, 0x8001, 0x2, 0x120, 0x20}, {@in6=@local, 0x4d5, 0x2b}, @in6=@ipv4={'\x00', '\xff\xff', @empty}, {0x40, 0x1ff, 0x1000, 0x80000000, 0x0, 0x1000, 0x7fff, 0xb7}, {0x0, 0x1, 0x40}, {0x5, 0x0, 0x8}, 0x70bd2b, 0x3501, 0x2, 0x3, 0x80}}, @lifetime_val={0x24, 0x9, {0x6, 0xa23, 0x20, 0x8}}, @sa={0xe0, 0x6, {{@in6=@dev={0xfe, 0x80, '\x00', 0xa}, @in=@dev={0xac, 0x14, 0x14, 0x3c}, 0x4e23, 0x401, 0x4e24, 0x5, 0xa, 0x120, 0x80, 0x6}, {@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d4, 0x32}, @in6=@empty, {0x1, 0x1a60000000, 0x8, 0xe9, 0xffffffff, 0x2, 0x8, 0x40}, {0x8, 0x9, 0x100, 0x3}, {0x20, 0x9, 0x40}, 0x70bd26, 0x34ff, 0xa, 0x0, 0x7f, 0x58}}, @lastused={0xc, 0xf, 0x7}, @tfcpad={0x8, 0x16, 0xfb}]}, 0x2d0}, 0x1, 0xfffff000}, 0x20000800) [ 253.974432][T14230] netlink: 640 bytes leftover after parsing attributes in process `syz-executor.2'. 03:56:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000000)=0x4, 0x4) 03:56:24 executing program 3: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000000480)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000001540)="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", 0x1000}, {&(0x7f0000002540)="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", 0xac1}], 0x2}}], 0x1, 0x4000000) 03:56:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = epoll_create(0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000000)) r3 = epoll_create(0x2) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r1, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r1, &(0x7f0000000080)={0xc0000003}) ppoll(&(0x7f0000000100)=[{r3, 0xe7e7}], 0x1, 0x0, 0x0, 0x0) 03:56:24 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff01000000000000001b000000000001e000040100000400000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000510000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e30000000000200000000000003f"], 0xb8}, 0x1, 0xfffff000, 0x0, 0x20000005}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000940)=@updpolicy={0x2d0, 0x14, 0x1, 0x70bd29, 0x0, {{@in6=@mcast1, @in6=@private2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x6}, {0x3f000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000000000000}, {0x100000000000b18, 0x0, 0x8c8}, 0x0, 0x6e6bb7, 0x0, 0x0, 0x0, 0x2}, [@XFRMA_IF_ID={0x8}, @lastused={0xc, 0xf, 0x2}, @extra_flags={0x8, 0x18, 0x100}, @XFRMA_SET_MARK={0x8, 0x1d, 0x4941}, @sa={0xe0, 0x6, {{@in=@remote, @in6=@loopback, 0x4e23, 0x1, 0x4e21, 0x8001, 0x2, 0x120, 0x20}, {@in6=@local, 0x4d5, 0x2b}, @in6=@ipv4={'\x00', '\xff\xff', @empty}, {0x40, 0x1ff, 0x1000, 0x80000000, 0x0, 0x1000, 0x7fff, 0xb7}, {0x0, 0x1, 0x40}, {0x5, 0x0, 0x8}, 0x70bd2b, 0x3501, 0x2, 0x3, 0x80}}, @lifetime_val={0x24, 0x9, {0x6, 0xa23, 0x20, 0x8}}, @sa={0xe0, 0x6, {{@in6=@dev={0xfe, 0x80, '\x00', 0xa}, @in=@dev={0xac, 0x14, 0x14, 0x3c}, 0x4e23, 0x401, 0x4e24, 0x5, 0xa, 0x120, 0x80, 0x6}, {@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d4, 0x32}, @in6=@empty, {0x1, 0x1a60000000, 0x8, 0xe9, 0xffffffff, 0x2, 0x8, 0x40}, {0x8, 0x9, 0x100, 0x3}, {0x20, 0x9, 0x40}, 0x70bd26, 0x34ff, 0xa, 0x0, 0x7f, 0x58}}, @lastused={0xc, 0xf, 0x7}, @tfcpad={0x8, 0x16, 0xfb}]}, 0x2d0}, 0x1, 0xfffff000}, 0x20000800) 03:56:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xe, 0x5ee}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f0000000580)=ANY=[], 0x23) r1 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x84042, 0x0) sendfile(r1, r2, 0x0, 0x200004) 03:56:24 executing program 3: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000000480)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000001540)="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", 0x1000}, {&(0x7f0000002540)="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", 0xac1}], 0x2}}], 0x1, 0x4000000) 03:56:24 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff01000000000000001b000000000001e000040100000400000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000510000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e30000000000200000000000003f"], 0xb8}, 0x1, 0xfffff000, 0x0, 0x20000005}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000940)=@updpolicy={0x2d0, 0x14, 0x1, 0x70bd29, 0x0, {{@in6=@mcast1, @in6=@private2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x6}, {0x3f000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000000000000}, {0x100000000000b18, 0x0, 0x8c8}, 0x0, 0x6e6bb7, 0x0, 0x0, 0x0, 0x2}, [@XFRMA_IF_ID={0x8}, @lastused={0xc, 0xf, 0x2}, @extra_flags={0x8, 0x18, 0x100}, @XFRMA_SET_MARK={0x8, 0x1d, 0x4941}, @sa={0xe0, 0x6, {{@in=@remote, @in6=@loopback, 0x4e23, 0x1, 0x4e21, 0x8001, 0x2, 0x120, 0x20}, {@in6=@local, 0x4d5, 0x2b}, @in6=@ipv4={'\x00', '\xff\xff', @empty}, {0x40, 0x1ff, 0x1000, 0x80000000, 0x0, 0x1000, 0x7fff, 0xb7}, {0x0, 0x1, 0x40}, {0x5, 0x0, 0x8}, 0x70bd2b, 0x3501, 0x2, 0x3, 0x80}}, @lifetime_val={0x24, 0x9, {0x6, 0xa23, 0x20, 0x8}}, @sa={0xe0, 0x6, {{@in6=@dev={0xfe, 0x80, '\x00', 0xa}, @in=@dev={0xac, 0x14, 0x14, 0x3c}, 0x4e23, 0x401, 0x4e24, 0x5, 0xa, 0x120, 0x80, 0x6}, {@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d4, 0x32}, @in6=@empty, {0x1, 0x1a60000000, 0x8, 0xe9, 0xffffffff, 0x2, 0x8, 0x40}, {0x8, 0x9, 0x100, 0x3}, {0x20, 0x9, 0x40}, 0x70bd26, 0x34ff, 0xa, 0x0, 0x7f, 0x58}}, @lastused={0xc, 0xf, 0x7}, @tfcpad={0x8, 0x16, 0xfb}]}, 0x2d0}, 0x1, 0xfffff000}, 0x20000800) 03:56:24 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000001200)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}, @ETHTOOL_A_BITSET_VALUE={0x4}]}]}, 0x40}}, 0x0) 03:56:24 executing program 3: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000000480)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000001540)="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", 0x1000}, {&(0x7f0000002540)="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", 0xac1}], 0x2}}], 0x1, 0x4000000) [ 254.699499][T14245] netlink: 640 bytes leftover after parsing attributes in process `syz-executor.2'. 03:56:24 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(r0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000200)=""/72, 0x48}], 0x3, 0x0, 0x0) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x134, &(0x7f00000002c0)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x40) 03:56:24 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @multicast1}, {0x2, 0x0, @remote}, {0x2, 0x0, @loopback}, 0x1e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7ff}) 03:56:24 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)={0x40, 0x0, 0x1, 0x201, 0x0, 0x0, {0x2}, [@CTA_TUPLE_REPLY={0x2c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_ZONE={0x6}]}]}, 0x40}}, 0x0) [ 254.783944][T14260] netlink: 640 bytes leftover after parsing attributes in process `syz-executor.2'. 03:56:25 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) acct(0x0) 03:56:25 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_PMKSA(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000300)={0x28, 0x0, 0x0, 0x0, 0x0, {{0x7e}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socket(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, 0x0) 03:56:25 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x10f, &(0x7f0000000140)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:56:25 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000180)={0x38, 0x1, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getflags(r2, 0x408) 03:56:25 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40082102, &(0x7f0000000140)) 03:56:25 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f00000000c0)={0xfffffffffffffffe, 0xc0, &(0x7f0000000080)={0x0}}, 0x0) 03:56:25 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0xfffc, 0x0) vmsplice(r3, &(0x7f0000000380)=[{&(0x7f0000000280)="eb", 0x1}], 0x1, 0xf) read(r2, &(0x7f0000000040)=""/64, 0x88) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[], 0x10034) 03:56:25 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_matches\x00') setresuid(0x0, 0xee00, 0x0) fchown(r0, 0xffffffffffffffff, 0x0) 03:56:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) 03:56:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(r0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000200)=""/72, 0x48}], 0x3, 0x0, 0x0) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x134, &(0x7f00000002c0)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x40) 03:56:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = memfd_create(&(0x7f0000000140)='sysr\x01\xdf;HX%\x8f\xdd\xff\xff\xffame\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8f{\x85\x19\xe4\xf6n{B\x88\xd6\xacQ\xa9\a\xc9J\x1b\xefT\x9b\xd3\x9e\xe6YX\xb7<@\xdd\xab\x8c\xe5\x82o\xd1lyk\x11\x11\xa4\xff\x92\x04\x15R!\xa0\x17g\xb1\x91\xb6/\x8a\xb18\xa0\xbe\'\xa8$\x03\x9d\x93\xf9\x1a\\\xe2\xa1,\xbe\x01\x8a\xfe4\xa7\xc8\x9eP\xc2\x01\x10\"\x00\x00', 0x0) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x10813, r1, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x40501, 0x0) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000300)="02000000020219", 0x7}, {&(0x7f0000001480)="a349b1e15b38cc", 0x7}], 0x2) 03:56:25 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000001340)='./file0\x00', &(0x7f0000001380)='system.posix_acl_default\x00', &(0x7f00000013c0), 0x24, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') 03:56:25 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7a}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x129, &(0x7f0000000600)="c4c691019919da078a0098d1e0a593b040f762910000000000000022addee07bee0d6333b5cacd893169b618322ff6602022511253508b5a4496728c2a46e1bc340e29b9ab9b7136283e350808ffdb2dbea7410b363de4fb357baa16dacdcfac32957dc8bb44e203c4b1bc83d8c0b29f75bcf2e3482945fef116371f8c8c0c4db583a208718e3cccd9dd3bf7a0b9daf36c29d2d3e73af34a91a4a8844ee497e66452419a30843900bb4ff9a7df5ee0fdbb6e3a288594f90399ef71d1fa7b32513f49d5135aea235f800059995d267e04f4579298cddd604f5f3bcdc9ded4aad49dc3d25b919b831d2c8e6845a80deedf485234af0e7317f1ec9f9a795c21f38b00907bac0a7553cf257c7f2b292f726533865cbf11c2e5537877b9c935d3cc6e1cfb6ea23be293a887"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 03:56:25 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) write(r0, &(0x7f0000000380)="260000002200470508d258002b1f00eb0101c7033500b000"/38, 0x26) setsockopt$sock_int(r0, 0x1, 0x20800000000008, &(0x7f0000000280), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000040)={0x20000000, 0x4000000000003, 0x2, @thr={0x0, 0x0}}) [ 256.457288][ T25] kauditd_printk_skb: 3 callbacks suppressed [ 256.457298][ T25] audit: type=1326 audit(1621914986.396:400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14293 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 [ 256.488013][ T25] audit: type=1326 audit(1621914986.396:399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14293 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7fc00000 03:56:28 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x10f, &(0x7f0000000140)="f47970da7c2fd541e0656c5762306aa606a0c2a16e59b65fa78fb184da006cabbd58564cf09dcac54f6d212e05d23391ff083d78ff122a776e08af2025580c72249ad2f5376f60b87a982a8066b10f8b85b47e770f548fd2e3c6a8323152fbeebdec6058daee7c23390ee132bd154c99fd3d69623481e1af603fc9d42b2f7173f23f843eb6669d9de930445756424b355d08c8786bf6e250deae7a6d8332607f93938fabe2e77eb4ff46d2b6acf3307cc56a31e02e391ddc16c13dc7d29b1066029eb7c8e2104f912e7302925bc5bae94591ce8aeee0a0e17619d8bb7afa892dc1eb22fc017336f12d9abdfe295b5149cf962c310d6c511c5ec9e808f4e8edc496e548df7c192dc0097271c11c128f"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:56:28 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0xfffc, 0x0) vmsplice(r3, &(0x7f0000000380)=[{&(0x7f0000000280)="eb", 0x1}], 0x1, 0xf) read(r2, &(0x7f0000000040)=""/64, 0x88) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[], 0x10034) 03:56:28 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0xfffc, 0x0) vmsplice(r3, &(0x7f0000000380)=[{&(0x7f0000000280)="eb", 0x1}], 0x1, 0xf) read(r2, &(0x7f0000000040)=""/64, 0x88) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[], 0x10034) 03:56:28 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)="4c0000001000fff1fefefd956f76c9b724a600c00e000000000000683440150004001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca62000000000000000001cbc882b079881", 0x4c}], 0x1}, 0x0) 03:56:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(r0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000200)=""/72, 0x48}], 0x3, 0x0, 0x0) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x134, &(0x7f00000002c0)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x40) 03:56:28 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)=@allocspi={0x16c, 0x16, 0x1, 0x0, 0x0, {{{@in6=@private0, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x33}, @in=@loopback, {}, {}, {}, 0x0, 0x8, 0x2}, 0x3, 0x3}, [@XFRMA_SET_MARK_MASK={0x8, 0x1e, 0xfffff7ac}, @XFRMA_IF_ID={0x8}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in6=@private0, 0x0, 0x2}}, @replay_esn_val={0x38, 0x17, {0x7, 0x70bd26, 0x70bd29, 0x70bd28, 0x70bd28, 0x5, [0xfffffffd, 0x20, 0x370, 0x4, 0x9, 0xbc, 0x7]}}]}, 0x16c}, 0x1, 0x0, 0x0, 0x40001}, 0xc000) 03:56:28 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)=@allocspi={0x16c, 0x16, 0x1, 0x0, 0x0, {{{@in6=@private0, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x33}, @in=@loopback, {}, {}, {}, 0x0, 0x8, 0x2}, 0x3, 0x3}, [@XFRMA_SET_MARK_MASK={0x8, 0x1e, 0xfffff7ac}, @XFRMA_IF_ID={0x8}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in6=@private0, 0x0, 0x2}}, @replay_esn_val={0x38, 0x17, {0x7, 0x70bd26, 0x70bd29, 0x70bd28, 0x70bd28, 0x5, [0xfffffffd, 0x20, 0x370, 0x4, 0x9, 0xbc, 0x7]}}]}, 0x16c}, 0x1, 0x0, 0x0, 0x40001}, 0xc000) 03:56:28 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)=@allocspi={0x16c, 0x16, 0x1, 0x0, 0x0, {{{@in6=@private0, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x33}, @in=@loopback, {}, {}, {}, 0x0, 0x8, 0x2}, 0x3, 0x3}, [@XFRMA_SET_MARK_MASK={0x8, 0x1e, 0xfffff7ac}, @XFRMA_IF_ID={0x8}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in6=@private0, 0x0, 0x2}}, @replay_esn_val={0x38, 0x17, {0x7, 0x70bd26, 0x70bd29, 0x70bd28, 0x70bd28, 0x5, [0xfffffffd, 0x20, 0x370, 0x4, 0x9, 0xbc, 0x7]}}]}, 0x16c}, 0x1, 0x0, 0x0, 0x40001}, 0xc000) 03:56:28 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)="4c0000001000fff1fefefd956f76c9b724a600c00e000000000000683440150004001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca62000000000000000001cbc882b079881", 0x4c}], 0x1}, 0x0) 03:56:28 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)=@allocspi={0x16c, 0x16, 0x1, 0x0, 0x0, {{{@in6=@private0, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x33}, @in=@loopback, {}, {}, {}, 0x0, 0x8, 0x2}, 0x3, 0x3}, [@XFRMA_SET_MARK_MASK={0x8, 0x1e, 0xfffff7ac}, @XFRMA_IF_ID={0x8}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in6=@private0, 0x0, 0x2}}, @replay_esn_val={0x38, 0x17, {0x7, 0x70bd26, 0x70bd29, 0x70bd28, 0x70bd28, 0x5, [0xfffffffd, 0x20, 0x370, 0x4, 0x9, 0xbc, 0x7]}}]}, 0x16c}, 0x1, 0x0, 0x0, 0x40001}, 0xc000) [ 258.593394][T14362] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 258.618753][T14373] netlink: 'syz-executor.5': attribute type 27 has an invalid length. 03:56:28 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)="4c0000001000fff1fefefd956f76c9b724a600c00e000000000000683440150004001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca62000000000000000001cbc882b079881", 0x4c}], 0x1}, 0x0) 03:56:28 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2811c91, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x30380a4, &(0x7f00000001c0)={[{@nomblk_io_submit}]}) [ 258.663792][T14384] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 258.694445][T14390] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 258.705983][T14393] EXT4-fs (sda1): Ignoring removed nomblk_io_submit option [ 258.714647][T14393] EXT4-fs (sda1): re-mounted. Opts: nomblk_io_submit,,errors=continue. Quota mode: none. [ 258.725496][T14396] EXT4-fs (sda1): Ignoring removed nomblk_io_submit option [ 258.733752][T14396] EXT4-fs (sda1): re-mounted. Opts: nomblk_io_submit,,errors=continue. Quota mode: none. 03:56:31 executing program 0: munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) 03:56:31 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x10f, &(0x7f0000000140)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:56:31 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0xfffc, 0x0) vmsplice(r3, &(0x7f0000000380)=[{&(0x7f0000000280)="eb", 0x1}], 0x1, 0xf) read(r2, &(0x7f0000000040)=""/64, 0x88) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[], 0x10034) 03:56:31 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0xfffc, 0x0) vmsplice(r3, &(0x7f0000000380)=[{&(0x7f0000000280)="eb", 0x1}], 0x1, 0xf) read(r2, &(0x7f0000000040)=""/64, 0x88) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[], 0x10034) 03:56:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x7dbf, &(0x7f0000000080)={0x0, 0xa54c, 0x0, 0x1}, &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) eventfd(0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_MADVISE={0x19, 0x0, 0x0, 0x0, 0x0, &(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, {0x0, r3}}, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0xffff0484) io_uring_enter(r0, 0x393c, 0x0, 0x0, 0x0, 0x0) 03:56:31 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)="4c0000001000fff1fefefd956f76c9b724a600c00e000000000000683440150004001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca62000000000000000001cbc882b079881", 0x4c}], 0x1}, 0x0) 03:56:31 executing program 0: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x2, 0x0, @rand_addr=0xe0380000}, 0x10) 03:56:31 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000440)={{0x1b, 0x5b, 0x7, 0x7, 0x31, 0x0, 0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x105d, 0x40}, [{}]}, 0x78) [ 261.625960][T14414] netlink: 'syz-executor.5': attribute type 27 has an invalid length. 03:56:31 executing program 0: syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) mremap(&(0x7f0000bee000/0x3000)=nil, 0x12000, 0x4000, 0x3, &(0x7f0000624000/0x4000)=nil) r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) shmat(r0, &(0x7f0000ffc000/0x3000)=nil, 0x4000) shmat(0x0, &(0x7f0000bf0000/0x4000)=nil, 0x0) 03:56:31 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet_mreq(r0, 0x0, 0x7, 0x0, 0x0) 03:56:31 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) read$usbmon(r0, 0x0, 0x0) 03:56:31 executing program 5: setregid(0x0, 0xffffffffffffffff) 03:56:31 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0xfffc, 0x0) vmsplice(r3, &(0x7f0000000380)=[{&(0x7f0000000280)="eb", 0x1}], 0x1, 0xf) read(r2, &(0x7f0000000040)=""/64, 0x88) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[], 0x10034) 03:56:34 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x10f, &(0x7f0000000140)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:56:34 executing program 0: set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0x9) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r1, &(0x7f0000000180)=[{&(0x7f0000001400)=""/4100, 0x1004}], 0x1) 03:56:34 executing program 4: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="2332aefdffff5c9803f793"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102373, 0x18fe5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 03:56:34 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0xfffc, 0x0) vmsplice(r3, &(0x7f0000000380)=[{&(0x7f0000000280)="eb", 0x1}], 0x1, 0xf) read(r2, &(0x7f0000000040)=""/64, 0x88) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[], 0x10034) 03:56:34 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = io_uring_setup(0x78a1, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000180)=""/38, 0x26}], 0x1) 03:56:34 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x7) r1 = dup2(r0, r0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x3fb, 0x4) setsockopt$sock_int(r1, 0x1, 0x29, &(0x7f00000000c0)=0x1, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r0, &(0x7f0000004640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 03:56:34 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9a05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be", 0x65}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 03:56:34 executing program 0: set_mempolicy(0x3, &(0x7f0000000000)=0x9, 0x4) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000740)={0x2, &(0x7f0000000700)=[{0x25}, {0x6}]}) 03:56:34 executing program 5: unshare(0x400) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x5420, 0x0) 03:56:34 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, 0x0) 03:56:34 executing program 5: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f00000045c0)=ANY=[], 0x4) fadvise64(r0, 0x0, 0x0, 0x4) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000000)=0x3) finit_module(r1, 0x0, 0x0) 03:56:34 executing program 4: clone(0x4380, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000000016, &(0x7f0000000640)) ptrace(0x10, r0) rt_tgsigqueueinfo(r0, r0, 0x12, &(0x7f0000001180)={0x0, 0x0, 0xffffbfffffffc58e}) waitid(0x0, 0x0, 0x0, 0x8, 0x0) waitid(0x0, 0x0, 0x0, 0x8, &(0x7f00000002c0)) [ 264.709582][ T25] audit: type=1326 audit(1621914994.646:401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14486 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 264.781334][ T25] audit: type=1400 audit(1621914994.716:402): avc: denied { module_load } for pid=14504 comm="syz-executor.5" path="/root/syz-executor.5" dev="sda1" ino=13853 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=system permissive=1 [ 264.782912][T14508] Module has invalid ELF structures 03:56:37 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000000)={'icmp\x00'}, &(0x7f0000000040)=0x1e) 03:56:37 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ftruncate(r0, 0x0) 03:56:37 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x114, &(0x7f00000002c0)="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"}}], 0x1c) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000001400)={0x1, &(0x7f00000013c0)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 03:56:37 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/user\x00') ioctl$NS_GET_PARENT(r0, 0x5460, 0x970000000000) 03:56:37 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x20000000000003, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000), 0x6, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) 03:56:37 executing program 3: r0 = eventfd(0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)="db045be290043cce", 0x8}, {&(0x7f0000000080)="2dbc279ec87ca186", 0x8}], 0x2) timer_create(0x0, &(0x7f0000000780)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) r1 = gettid() write(r0, &(0x7f0000000100)="9cdbc0f30fcbf4cd", 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) tkill(r1, 0x14) 03:56:37 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8400fffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) sendfile(r0, r3, 0x0, 0x8400fffffffa) 03:56:37 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x114, &(0x7f00000002c0)="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"}}], 0x1c) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000001400)={0x1, &(0x7f00000013c0)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 03:56:37 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={@empty, 0x0, r1}) 03:56:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, 0x0, 0x0) 03:56:37 executing program 2: open_by_handle_at(0xffffffffffffff9c, &(0x7f0000000200)=@reiserfs_2={0x8, 0x2, {0x3ff, 0x7}}, 0x0) 03:56:37 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x114, &(0x7f00000002c0)="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"}}], 0x1c) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000001400)={0x1, &(0x7f00000013c0)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 03:56:37 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0000}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) fchmod(r0, 0x0) 03:56:37 executing program 5: r0 = io_uring_setup(0x687c, &(0x7f0000000340)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0xa, 0x0, 0x0) [ 267.753775][T14548] loop1: detected capacity change from 0 to 264192 03:56:37 executing program 2: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000640), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x80605414, &(0x7f0000000080)) 03:56:37 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x114, &(0x7f00000002c0)="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"}}], 0x1c) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000001400)={0x1, &(0x7f00000013c0)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 03:56:37 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x56, &(0x7f0000000140)="c4c69101ac19da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad591576ac2b7f0fb4aabebae8dc5dffbcd48a70502173d6efa56b60f48cf0c9d0989ecbbf904b097481d0"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) [ 267.831122][ T25] audit: type=1326 audit(1621914997.766:403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14564 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 03:56:37 executing program 5: r0 = memfd_create(&(0x7f0000000600)='secur\x8dty.se|\xfcH\x9c\'}\x00\xcbu\x00\x00q\x10B\x90\xda\x882\x14\xd6\x9a\x8eic\xd4N\t\xea\r0\x963\x8aR\xd1\xb6J\xbb\a\x8d\x1b\x90\x90\x13,\x93wc\x11k\x17\x9c\xad>\x05\xcf\xb5\xe1X\xbbH\x91f\xa6T\x00\x00\x00\x00\xbdr\xe2\xbbT\x15F$\xc0?\x89\xb6\xecP\xba\xac\xca=\xea\xa0\xbb\xf1\xd7\x05\xc1\xec$E#\xc6\x8cI5\x13\xca\x1dg\x95\xb3I\xed\xaam\x92\x96q\x05\x00\xe4\x95\x1d0\xd8\xa3\xe0\xe8XD\xa5\xc1\x8c\xa2\xe0HM\xa5\xd2AH&\x12\x1f\x10\xe9\n\xae\x0e7Y\xc6^\xe0l\x06A\xd2\xc4\xe5c\xea\"#\xca\xbdBQ\x90\x99E\x10)N\xddKd\xe31\x99`\xbf*\x10\xee\x80\x04\xc0I\x81\xc1\x0e\xfe\xc5i\xa5\xbb\x18\xa2\x93\x191V\xbd,\xbb\xb5\xea\xfeZ\x1e\xc9\x94\xe5\xc8fnz\xe5\xa0F\x8a\xe6\x87\xaa\x9d\xd4\xe4\xad\xbe\x8a;\xe2\xba\xff\x1c\\\x9fU\xdf\xa4\x93\xb25\x9e\xdf\xb4\xee\xab)\x7f\xdd\x00\xef\x83$\xe6\xeb49=\x00\x00\xd1\xc0\xf0\xce\x91P;\xa2$\x93\x13\xdef\xdd\x8d\xf3\x14+{\xf6\x9e\xb0\xf1\xf2sf\xaf\x95\x8b\xe5\xf0\xdc\xdf7\xad\xb9#mz\xebW\x10[\xb0Bq\xa8\xfa^\xe7\xc9\x14q\xf7\a\xe1\xb0z.K\xa15\x84\xcd', 0x0) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./bus\x00', 0x0, 0x0) getdents(r1, &(0x7f00000004c0)=""/172, 0x2000056c) [ 267.934237][ T25] audit: type=1326 audit(1621914997.776:404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14564 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=41 compat=0 ip=0x4665d9 code=0x7ffc0000 03:56:37 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8400fffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) sendfile(r0, r3, 0x0, 0x8400fffffffa) 03:56:37 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000002080)='loginuid\x00') writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)='T', 0x1}], 0x1) 03:56:37 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0x1, 0x6) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{}]}) 03:56:37 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) 03:56:37 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) sendmsg(r0, &(0x7f0000000340)={&(0x7f0000000180)=@qipcrtr={0x2a, 0x2}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="6ec097be2e682ffa918dcec9b9dd7902000000009c000000000000000000d4f66fc479d2a736fca118f1880b", 0x2c}], 0x1}, 0x0) [ 268.028967][ T25] audit: type=1326 audit(1621914997.776:405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14564 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 03:56:38 executing program 5: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fstat(r0, &(0x7f00000014c0)) 03:56:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) tgkill(0x0, 0xffffffffffffffff, 0x0) [ 268.057050][ T25] audit: type=1326 audit(1621914997.776:406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14564 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=91 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 268.081177][ T25] audit: type=1326 audit(1621914997.776:407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14564 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 03:56:38 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7fff0200}]}) getcwd(&(0x7f0000000100)=""/167, 0xa7) 03:56:38 executing program 4: setuid(0xee00) clock_settime(0x0, &(0x7f00000008c0)={0x77359400}) [ 268.105175][ T25] audit: type=1326 audit(1621914997.776:408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14564 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=157 compat=0 ip=0x4665d9 code=0x7ffc0000 03:56:38 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x102440, 0x0) fcntl$setlease(r1, 0x400, 0x0) link(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./bus\x00') unlink(&(0x7f0000000080)='./bus\x00') 03:56:38 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0x1, 0x6) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{}]}) 03:56:38 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) [ 268.216795][T14621] loop1: detected capacity change from 0 to 264192 03:56:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000240), 0x0, 0x0) r2 = dup2(r1, r1) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f00000000c0)) ioctl$EVIOCREVOKE(r1, 0x40044591, 0x0) 03:56:38 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000140)=0x2, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r0, &(0x7f00000002c0)="3a6ef723078cbf12d5fe2ea7b6ba00bdeee062b671e17c4735f32008bf98877a640b48e9c24e631d89cd84da4a7a5ff9a7", 0x31, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000240)=[@mss, @window, @window, @timestamp, @timestamp, @window, @window, @sack_perm], 0x8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f00000004c0)="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", 0x20000671, 0x805, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x13, r1, 0x0) 03:56:38 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8400fffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) sendfile(r0, r3, 0x0, 0x8400fffffffa) 03:56:38 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@newsa={0x160, 0x10, 0x713, 0x0, 0x0, {{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {@in=@dev, 0x0, 0x33}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0x2}, [@replay_esn_val={0x1c, 0x17, {0x40000143}}, @algo_auth={0x48, 0x1, {{'md5\x00'}}}, @sec_ctx={0xc, 0x8, {0x8}}]}, 0x160}}, 0x0) 03:56:38 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000080), 0xfffffe58) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1d, &(0x7f0000000080)={0x1, &(0x7f00000001c0)=[{0x6}]}) 03:56:38 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0x1, 0x6) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{}]}) 03:56:38 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x44, 0x1, 0x1, 0x801, 0x0, 0x0, {0x2}, [@CTA_TUPLE_REPLY={0x30, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private2}, {0x14, 0x4, @private0}}}]}]}, 0x44}}, 0x0) 03:56:38 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0x1, 0x6) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{}]}) 03:56:38 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) clone(0x20087104ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') 03:56:38 executing program 4: munmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x7) 03:56:38 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) pwritev2(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="cb", 0xf000}], 0x1, 0x0, 0x0, 0xc) 03:56:38 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000140)=0x2, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r0, &(0x7f00000002c0)="3a6ef723078cbf12d5fe2ea7b6ba00bdeee062b671e17c4735f32008bf98877a640b48e9c24e631d89cd84da4a7a5ff9a7", 0x31, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000240)=[@mss, @window, @window, @timestamp, @timestamp, @window, @window, @sack_perm], 0x8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f00000004c0)="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", 0x20000671, 0x805, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x13, r1, 0x0) 03:56:38 executing program 4: futex(0x0, 0x81, 0x0, 0x0, 0x0, 0x0) 03:56:38 executing program 5: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x6, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000003000/0x1000)=nil) setrlimit(0x3, &(0x7f0000000080)) r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0xb, &(0x7f0000000040)=0x0) io_submit(r1, 0xf10, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x6010000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) [ 268.506719][T14669] loop1: detected capacity change from 0 to 264192 03:56:38 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8400fffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) sendfile(r0, r3, 0x0, 0x8400fffffffa) 03:56:38 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0xc0105303, &(0x7f0000000180)={0xff, 0x0, 0x0, 'queue1\x00'}) 03:56:38 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000002, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000290000000f000000000000040000000002000000008000000080000020000000d9f4655fd9f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@dioread_nolock}]}) 03:56:38 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000140)=0x2, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r0, &(0x7f00000002c0)="3a6ef723078cbf12d5fe2ea7b6ba00bdeee062b671e17c4735f32008bf98877a640b48e9c24e631d89cd84da4a7a5ff9a7", 0x31, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000240)=[@mss, @window, @window, @timestamp, @timestamp, @window, @window, @sack_perm], 0x8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f00000004c0)="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", 0x20000671, 0x805, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x13, r1, 0x0) 03:56:38 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/consoles\x00', 0x0, 0x0) read$char_usb(r0, &(0x7f0000000140)=""/124, 0x2a) read$char_usb(r0, &(0x7f00000002c0)=""/73, 0x49) 03:56:38 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$P9_RRENAMEAT(r0, &(0x7f00000000c0)={0x7}, 0x7) write$P9_RFLUSH(r0, &(0x7f0000000200)={0x7}, 0x7ffff000) 03:56:38 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x1, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000080)) 03:56:38 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x3b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0x40042408, 0x0) 03:56:38 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) syz_io_uring_setup(0x1a51, &(0x7f0000000080), &(0x7f00003cd000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, 0x0, 0x0) syz_io_uring_setup(0x15b4, &(0x7f00000001c0), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, 0x0, 0x0) syz_io_uring_setup(0x15b4, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index}, 0x0) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x0, 0x0}}], 0xfd63) 03:56:38 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71ae2000000922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) write$binfmt_elf32(r1, &(0x7f0000000180)=ANY=[], 0x58) [ 268.799693][T14702] loop2: detected capacity change from 0 to 4 [ 268.812372][T14702] EXT4-fs (loop2): Warning: mounting with an experimental mount option 'dioread_nolock' for blocksize < PAGE_SIZE [ 268.824432][T14702] EXT4-fs (loop2): fragment/cluster size (4096) != block size (1024) 03:56:38 executing program 4: set_mempolicy(0x1, &(0x7f0000000080)=0x101, 0x5) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ppoll(&(0x7f0000000040)=[{r0}], 0x1, &(0x7f00000000c0)={0x0, 0x3938700}, 0x0, 0x0) 03:56:38 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000140)=0x2, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r0, &(0x7f00000002c0)="3a6ef723078cbf12d5fe2ea7b6ba00bdeee062b671e17c4735f32008bf98877a640b48e9c24e631d89cd84da4a7a5ff9a7", 0x31, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000240)=[@mss, @window, @window, @timestamp, @timestamp, @window, @window, @sack_perm], 0x8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f00000004c0)="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", 0x20000671, 0x805, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x13, r1, 0x0) [ 268.884312][T14729] loop1: detected capacity change from 0 to 264192 03:56:39 executing program 0: r0 = socket(0xa, 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) epoll_wait(r1, &(0x7f0000000200)=[{}], 0x1, 0x200) shutdown(r0, 0x0) 03:56:39 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000001440)={{0x3}}, 0x24, 0x0) 03:56:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=""/46, 0x2e}, 0x0) sendmsg$netlink(r0, &(0x7f0000001f00)={0x0, 0x0, &(0x7f0000001dc0)=[{&(0x7f00000087c0)={0x28, 0x26, 0x11d58d2ce6a3315f, 0x0, 0x0, "", [@typed={0x15, 0x0, 0x0, 0x0, @binary="e655c1b47b6c4142eb22f18a346444baaf"}]}, 0x28}], 0x1}, 0x0) 03:56:39 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setreuid(0x0, 0xee00) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 03:56:39 executing program 4: r0 = mq_open(&(0x7f0000001440)='#m\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000002740)=[{&(0x7f00000014c0)=""/215, 0xd7}], 0x1, 0xffffe4ed, 0x0) 03:56:39 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:56:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8953, &(0x7f0000000200)={{}, {0x0, @random="4146b7e8ec21"}, 0x0, {0x2, 0x0, @empty}, 'lo\x00'}) 03:56:39 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000100)=[{0x2}, {0xc}, {0x6}]}) socket$inet6_udp(0xa, 0x2, 0x0) [ 269.172852][T14770] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 269.182623][T14773] ------------[ cut here ]------------ [ 269.188133][T14773] trying to isolate tail page [ 269.188224][T14773] WARNING: CPU: 0 PID: 14773 at mm/vmscan.c:1960 isolate_lru_page+0x360/0x370 [ 269.196448][T14757] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 269.201971][T14773] Modules linked in: 03:56:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=""/46, 0x2e}, 0x0) sendmsg$netlink(r0, &(0x7f0000001f00)={0x0, 0x0, &(0x7f0000001dc0)=[{&(0x7f00000087c0)={0x28, 0x26, 0x11d58d2ce6a3315f, 0x0, 0x0, "", [@typed={0x15, 0x0, 0x0, 0x0, @binary="e655c1b47b6c4142eb22f18a346444baaf"}]}, 0x28}], 0x1}, 0x0) [ 269.201981][T14773] CPU: 0 PID: 14773 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 269.219538][T14770] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 269.223854][T14773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.223865][T14773] RIP: 0010:isolate_lru_page+0x360/0x370 [ 269.223890][T14773] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 6e 1e f2 ff 48 c7 c7 53 1c 3b 83 31 c0 e8 90 58 da ff <0f> 0b e9 01 fd ff ff e8 54 1e f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 269.223903][T14773] RSP: 0018:ffffc9000028bb08 EFLAGS: 00010246 [ 269.223914][T14773] RAX: b3b2c34a8a005400 RBX: 0000000000000001 RCX: 0000000000040000 [ 269.234246][T14757] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 269.243227][T14773] RDX: ffffc900005e2000 RSI: 0000000000000a72 RDI: 0000000000000a73 [ 269.292085][ T25] audit: type=1326 audit(1621914999.236:409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14775 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 269.299753][T14773] RBP: ffffea000422c000 R08: ffffffff8129ab8c R09: 0001c9000028b8b7 [ 269.299766][T14773] R10: 0000000000000002 R11: ffff888107567000 R12: ffffea000422c040 [ 269.339117][T14773] R13: ffff888124961008 R14: ffffea000422c048 R15: 0000000020001000 [ 269.347219][T14773] FS: 00007f501580a700(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 269.356161][T14773] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 269.362778][T14773] CR2: 0000001b32222000 CR3: 0000000130e77000 CR4: 00000000001506f0 [ 269.370753][T14773] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 269.378735][T14773] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 269.386744][T14773] Call Trace: [ 269.390021][T14773] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 269.396375][T14773] ? swapin_walk_pmd_entry+0x320/0x320 [ 269.398750][T14782] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 269.401828][T14773] __walk_page_range+0x93f/0x10e0 [ 269.401849][T14773] walk_page_range+0x111/0x2e0 [ 269.411699][T14781] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 269.416173][T14773] do_madvise+0x84e/0x1050 [ 269.416195][T14773] ? __schedule+0x427/0x5b0 [ 269.439000][T14773] ? __fpregs_load_activate+0x103/0x1b0 [ 269.444794][T14773] __x64_sys_madvise+0x5d/0x70 [ 269.449569][T14773] do_syscall_64+0x4a/0x90 [ 269.454024][T14773] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 269.459914][T14773] RIP: 0033:0x4665d9 [ 269.463924][T14773] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 269.483676][T14773] RSP: 002b:00007f501580a188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 269.492134][T14773] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 269.500119][T14773] RDX: 0000000000000015 RSI: 0000000000600003 RDI: 0000000020000000 [ 269.508264][T14773] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 269.516253][T14773] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 269.524235][T14773] R13: 00007ffc5bcd76af R14: 00007f501580a300 R15: 0000000000022000 [ 269.532276][T14773] ---[ end trace 53ed414deca314c5 ]--- [ 269.537759][T14773] ------------[ cut here ]------------ [ 269.543214][T14773] trying to isolate tail page [ 269.543301][T14773] WARNING: CPU: 0 PID: 14773 at mm/vmscan.c:1960 isolate_lru_page+0x360/0x370 [ 269.556799][T14773] Modules linked in: [ 269.560687][T14773] CPU: 0 PID: 14773 Comm: syz-executor.1 Tainted: G W 5.13.0-rc3-syzkaller #0 [ 269.570882][T14773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.580952][T14773] RIP: 0010:isolate_lru_page+0x360/0x370 [ 269.586684][T14773] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 6e 1e f2 ff 48 c7 c7 53 1c 3b 83 31 c0 e8 90 58 da ff <0f> 0b e9 01 fd ff ff e8 54 1e f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 269.606363][T14773] RSP: 0018:ffffc9000028bb08 EFLAGS: 00010246 [ 269.612410][T14773] RAX: b3b2c34a8a005400 RBX: 0000000000000001 RCX: 0000000000040000 [ 269.620473][T14773] RDX: ffffc900005e2000 RSI: 000000000003ffff RDI: 0000000000040000 [ 269.628538][T14773] RBP: ffffea000422c000 R08: ffffffff8129ab8c R09: 0001c9000028b8b7 [ 269.636519][T14773] R10: 0000000000000002 R11: ffff888107567000 R12: ffffea000422c080 [ 269.644498][T14773] R13: ffff888124961010 R14: ffffea000422c088 R15: 0000000020002000 [ 269.652461][T14773] FS: 00007f501580a700(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 269.661397][T14773] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 269.668011][T14773] CR2: 0000001b32222000 CR3: 0000000130e77000 CR4: 00000000001506f0 [ 269.675993][T14773] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 269.683995][T14773] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 269.692041][T14773] Call Trace: [ 269.695391][T14773] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 269.701715][T14773] ? swapin_walk_pmd_entry+0x320/0x320 [ 269.707181][T14773] __walk_page_range+0x93f/0x10e0 [ 269.712224][T14773] walk_page_range+0x111/0x2e0 [ 269.717000][T14773] do_madvise+0x84e/0x1050 [ 269.721468][T14773] ? __schedule+0x427/0x5b0 [ 269.726038][T14773] ? __fpregs_load_activate+0x103/0x1b0 [ 269.731642][T14773] __x64_sys_madvise+0x5d/0x70 [ 269.736558][T14773] do_syscall_64+0x4a/0x90 [ 269.740972][T14773] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 269.746862][T14773] RIP: 0033:0x4665d9 [ 269.750774][T14773] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 269.770379][T14773] RSP: 002b:00007f501580a188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 269.778807][T14773] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 269.786825][T14773] RDX: 0000000000000015 RSI: 0000000000600003 RDI: 0000000020000000 [ 269.794809][T14773] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 269.802820][T14773] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 269.810792][T14773] R13: 00007ffc5bcd76af R14: 00007f501580a300 R15: 0000000000022000 [ 269.818779][T14773] ---[ end trace 53ed414deca314c6 ]--- [ 269.824243][T14773] ------------[ cut here ]------------ [ 269.829677][T14773] trying to isolate tail page [ 269.829784][T14773] WARNING: CPU: 0 PID: 14773 at mm/vmscan.c:1960 isolate_lru_page+0x360/0x370 [ 269.843317][T14773] Modules linked in: [ 269.847188][T14773] CPU: 0 PID: 14773 Comm: syz-executor.1 Tainted: G W 5.13.0-rc3-syzkaller #0 [ 269.857350][T14773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.867414][T14773] RIP: 0010:isolate_lru_page+0x360/0x370 [ 269.873043][T14773] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 6e 1e f2 ff 48 c7 c7 53 1c 3b 83 31 c0 e8 90 58 da ff <0f> 0b e9 01 fd ff ff e8 54 1e f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 269.892672][T14773] RSP: 0018:ffffc9000028bb08 EFLAGS: 00010246 [ 269.898787][T14773] RAX: b3b2c34a8a005400 RBX: 0000000000000001 RCX: 0000000000040000 [ 269.906768][T14773] RDX: ffffc900005e2000 RSI: 000000000003ffff RDI: 0000000000040000 [ 269.914823][T14773] RBP: ffffea000422c000 R08: ffffffff8129ab8c R09: 0001c9000028b8b7 [ 269.922930][T14773] R10: 0000000000000002 R11: ffff888107567000 R12: ffffea000422c0c0 [ 269.930948][T14773] R13: ffff888124961018 R14: ffffea000422c0c8 R15: 0000000020003000 [ 269.938956][T14773] FS: 00007f501580a700(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 269.947970][T14773] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 269.954626][T14773] CR2: 0000001b32222000 CR3: 0000000130e77000 CR4: 00000000001506f0 [ 269.962584][T14773] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 269.970589][T14773] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 269.978626][T14773] Call Trace: [ 269.981900][T14773] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 269.988229][T14773] ? swapin_walk_pmd_entry+0x320/0x320 [ 269.993765][T14773] __walk_page_range+0x93f/0x10e0 [ 269.998816][T14773] walk_page_range+0x111/0x2e0 [ 270.003650][T14773] do_madvise+0x84e/0x1050 [ 270.008147][T14773] ? __schedule+0x427/0x5b0 [ 270.012649][T14773] ? __fpregs_load_activate+0x103/0x1b0 [ 270.018299][T14773] __x64_sys_madvise+0x5d/0x70 [ 270.023152][T14773] do_syscall_64+0x4a/0x90 [ 270.027637][T14773] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 270.033534][T14773] RIP: 0033:0x4665d9 [ 270.037415][T14773] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 270.057026][T14773] RSP: 002b:00007f501580a188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 270.065459][T14773] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 270.073501][T14773] RDX: 0000000000000015 RSI: 0000000000600003 RDI: 0000000020000000 [ 270.081492][T14773] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 270.089464][T14773] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 270.097458][T14773] R13: 00007ffc5bcd76af R14: 00007f501580a300 R15: 0000000000022000 [ 270.105441][T14773] ---[ end trace 53ed414deca314c7 ]--- [ 270.110920][T14773] ------------[ cut here ]------------ [ 270.116371][T14773] trying to isolate tail page [ 270.116531][T14773] WARNING: CPU: 0 PID: 14773 at mm/vmscan.c:1960 isolate_lru_page+0x360/0x370 [ 270.121614][ T25] audit: type=1326 audit(1621915000.056:410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14775 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 270.130097][T14773] Modules linked in: [ 270.130105][T14773] CPU: 0 PID: 14773 Comm: syz-executor.1 Tainted: G W 5.13.0-rc3-syzkaller #0 [ 270.130122][T14773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.130129][T14773] RIP: 0010:isolate_lru_page+0x360/0x370 [ 270.130150][T14773] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 6e 1e f2 ff 48 c7 c7 53 1c 3b 83 31 c0 e8 90 58 da ff <0f> 0b e9 01 fd ff ff e8 54 1e f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 270.130163][T14773] RSP: 0018:ffffc9000028bb08 EFLAGS: 00010246 [ 270.130174][T14773] RAX: b3b2c34a8a005400 RBX: 0000000000000001 RCX: 0000000000040000 [ 270.217112][T14773] RDX: ffffc900005e2000 RSI: 000000000003ffff RDI: 0000000000040000 [ 270.225084][T14773] RBP: ffffea000422c000 R08: ffffffff8129ab8c R09: 0001c9000028b8b7 [ 270.233078][T14773] R10: 0000000000000002 R11: ffff888107567000 R12: ffffea000422c100 [ 270.241197][T14773] R13: ffff888124961020 R14: ffffea000422c108 R15: 0000000020004000 [ 270.249192][T14773] FS: 00007f501580a700(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 270.258131][T14773] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 270.264768][T14773] CR2: 0000001b32222000 CR3: 0000000130e77000 CR4: 00000000001506f0 [ 270.272743][T14773] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 270.280726][T14773] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 270.288718][T14773] Call Trace: [ 270.291991][T14773] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 270.298322][T14773] ? swapin_walk_pmd_entry+0x320/0x320 [ 270.303791][T14773] __walk_page_range+0x93f/0x10e0 [ 270.308906][T14773] walk_page_range+0x111/0x2e0 [ 270.313661][T14773] do_madvise+0x84e/0x1050 [ 270.318090][T14773] ? __schedule+0x427/0x5b0 [ 270.322565][T14773] ? __fpregs_load_activate+0x103/0x1b0 [ 270.328241][T14773] __x64_sys_madvise+0x5d/0x70 [ 270.333013][T14773] do_syscall_64+0x4a/0x90 [ 270.337424][T14773] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 270.343336][T14773] RIP: 0033:0x4665d9 [ 270.347217][T14773] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 270.367047][T14773] RSP: 002b:00007f501580a188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 270.375594][T14773] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 270.383584][T14773] RDX: 0000000000000015 RSI: 0000000000600003 RDI: 0000000020000000 [ 270.391575][T14773] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 270.399552][T14773] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 270.407540][T14773] R13: 00007ffc5bcd76af R14: 00007f501580a300 R15: 0000000000022000 [ 270.415575][T14773] ---[ end trace 53ed414deca314c8 ]--- [ 270.421009][T14773] ------------[ cut here ]------------ [ 270.426453][T14773] trying to isolate tail page [ 270.426548][T14773] WARNING: CPU: 0 PID: 14773 at mm/vmscan.c:1960 isolate_lru_page+0x360/0x370 [ 270.440061][T14773] Modules linked in: [ 270.443955][T14773] CPU: 0 PID: 14773 Comm: syz-executor.1 Tainted: G W 5.13.0-rc3-syzkaller #0 [ 270.454160][T14773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.464293][T14773] RIP: 0010:isolate_lru_page+0x360/0x370 [ 270.469921][T14773] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 6e 1e f2 ff 48 c7 c7 53 1c 3b 83 31 c0 e8 90 58 da ff <0f> 0b e9 01 fd ff ff e8 54 1e f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 270.489591][T14773] RSP: 0018:ffffc9000028bb08 EFLAGS: 00010246 [ 270.495665][T14773] RAX: b3b2c34a8a005400 RBX: 0000000000000001 RCX: 0000000000040000 [ 270.503646][T14773] RDX: ffffc900005e2000 RSI: 000000000003ffff RDI: 0000000000040000 [ 270.511623][T14773] RBP: ffffea000422c000 R08: ffffffff8129ab8c R09: 0001c9000028b8b7 [ 270.519599][T14773] R10: 0000000000000002 R11: ffff888107567000 R12: ffffea000422c140 [ 270.527584][T14773] R13: ffff888124961028 R14: ffffea000422c148 R15: 0000000020005000 [ 270.535645][T14773] FS: 00007f501580a700(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 270.544597][T14773] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 270.551212][T14773] CR2: 0000001b32222000 CR3: 0000000130e77000 CR4: 00000000001506f0 [ 270.559188][T14773] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 270.567249][T14773] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 270.575263][T14773] Call Trace: [ 270.578588][T14773] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 270.584916][T14773] ? swapin_walk_pmd_entry+0x320/0x320 [ 270.590365][T14773] __walk_page_range+0x93f/0x10e0 [ 270.595521][T14773] walk_page_range+0x111/0x2e0 [ 270.600306][T14773] do_madvise+0x84e/0x1050 [ 270.604742][T14773] ? __schedule+0x427/0x5b0 [ 270.609231][T14773] ? __fpregs_load_activate+0x103/0x1b0 [ 270.614783][T14773] __x64_sys_madvise+0x5d/0x70 [ 270.619546][T14773] do_syscall_64+0x4a/0x90 [ 270.623980][T14773] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 270.629868][T14773] RIP: 0033:0x4665d9 [ 270.633755][T14773] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 270.653432][T14773] RSP: 002b:00007f501580a188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 270.661824][T14773] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 270.669794][T14773] RDX: 0000000000000015 RSI: 0000000000600003 RDI: 0000000020000000 [ 270.677778][T14773] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 270.685766][T14773] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 270.693745][T14773] R13: 00007ffc5bcd76af R14: 00007f501580a300 R15: 0000000000022000 [ 270.701767][T14773] ---[ end trace 53ed414deca314c9 ]--- [ 270.707216][T14773] ------------[ cut here ]------------ [ 270.712654][T14773] trying to isolate tail page [ 270.712829][T14773] WARNING: CPU: 0 PID: 14773 at mm/vmscan.c:1960 isolate_lru_page+0x360/0x370 [ 270.726382][T14773] Modules linked in: [ 270.730311][T14773] CPU: 0 PID: 14773 Comm: syz-executor.1 Tainted: G W 5.13.0-rc3-syzkaller #0 [ 270.740890][T14773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.751013][T14773] RIP: 0010:isolate_lru_page+0x360/0x370 [ 270.756668][T14773] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 6e 1e f2 ff 48 c7 c7 53 1c 3b 83 31 c0 e8 90 58 da ff <0f> 0b e9 01 fd ff ff e8 54 1e f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 270.776277][T14773] RSP: 0018:ffffc9000028bb08 EFLAGS: 00010246 [ 270.782363][T14773] RAX: b3b2c34a8a005400 RBX: 0000000000000001 RCX: 0000000000040000 [ 270.790350][T14773] RDX: ffffc900005e2000 RSI: 000000000003ffff RDI: 0000000000040000 [ 270.798331][T14773] RBP: ffffea000422c000 R08: ffffffff8129ab8c R09: 0001c9000028b8b7 [ 270.806300][T14773] R10: 0000000000000002 R11: ffff888107567000 R12: ffffea000422c180 [ 270.814280][T14773] R13: ffff888124961030 R14: ffffea000422c188 R15: 0000000020006000 [ 270.822250][T14773] FS: 00007f501580a700(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 270.831184][T14773] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 270.837895][T14773] CR2: 0000001b32222000 CR3: 0000000130e77000 CR4: 00000000001506f0 [ 270.845944][T14773] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 270.853922][T14773] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 270.861881][T14773] Call Trace: [ 270.865157][T14773] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 270.871567][T14773] ? swapin_walk_pmd_entry+0x320/0x320 [ 270.877074][T14773] __walk_page_range+0x93f/0x10e0 [ 270.882163][T14773] walk_page_range+0x111/0x2e0 [ 270.886927][T14773] do_madvise+0x84e/0x1050 [ 270.891451][T14773] ? __schedule+0x427/0x5b0 [ 270.895997][T14773] ? __fpregs_load_activate+0x103/0x1b0 [ 270.901546][T14773] __x64_sys_madvise+0x5d/0x70 [ 270.906316][T14773] do_syscall_64+0x4a/0x90 [ 270.910724][T14773] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 270.916789][T14773] RIP: 0033:0x4665d9 [ 270.920667][T14773] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 270.940287][T14773] RSP: 002b:00007f501580a188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 270.948706][T14773] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 270.956730][T14773] RDX: 0000000000000015 RSI: 0000000000600003 RDI: 0000000020000000 [ 270.964715][T14773] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 270.972766][T14773] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 270.980738][T14773] R13: 00007ffc5bcd76af R14: 00007f501580a300 R15: 0000000000022000 [ 270.988714][T14773] ---[ end trace 53ed414deca314ca ]--- [ 270.994228][T14773] ------------[ cut here ]------------ [ 270.999657][T14773] trying to isolate tail page [ 270.999737][T14773] WARNING: CPU: 0 PID: 14773 at mm/vmscan.c:1960 isolate_lru_page+0x360/0x370 [ 271.013515][T14773] Modules linked in: [ 271.017390][T14773] CPU: 0 PID: 14773 Comm: syz-executor.1 Tainted: G W 5.13.0-rc3-syzkaller #0 [ 271.027540][T14773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.037677][T14773] RIP: 0010:isolate_lru_page+0x360/0x370 [ 271.043317][T14773] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 6e 1e f2 ff 48 c7 c7 53 1c 3b 83 31 c0 e8 90 58 da ff <0f> 0b e9 01 fd ff ff e8 54 1e f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 271.062988][T14773] RSP: 0018:ffffc9000028bb08 EFLAGS: 00010246 [ 271.069155][T14773] RAX: b3b2c34a8a005400 RBX: 0000000000000001 RCX: 0000000000040000 [ 271.077159][T14773] RDX: ffffc900005e2000 RSI: 000000000003ffff RDI: 0000000000040000 [ 271.085137][T14773] RBP: ffffea000422c000 R08: ffffffff8129ab8c R09: 0001c9000028b8b7 [ 271.093147][T14773] R10: 0000000000000002 R11: ffff888107567000 R12: ffffea000422c1c0 [ 271.101148][T14773] R13: ffff888124961038 R14: ffffea000422c1c8 R15: 0000000020007000 [ 271.109116][T14773] FS: 00007f501580a700(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 271.118123][T14773] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 271.124720][T14773] CR2: 0000001b32222000 CR3: 0000000130e77000 CR4: 00000000001506f0 [ 271.132681][T14773] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 271.140795][T14773] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 271.148797][T14773] Call Trace: [ 271.152119][T14773] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 271.158457][T14773] ? swapin_walk_pmd_entry+0x320/0x320 [ 271.163937][T14773] __walk_page_range+0x93f/0x10e0 [ 271.168956][T14773] walk_page_range+0x111/0x2e0 [ 271.173715][T14773] do_madvise+0x84e/0x1050 [ 271.178340][T14773] ? __schedule+0x427/0x5b0 [ 271.182840][T14773] ? __fpregs_load_activate+0x103/0x1b0 [ 271.188396][T14773] __x64_sys_madvise+0x5d/0x70 [ 271.193231][T14773] do_syscall_64+0x4a/0x90 [ 271.197637][T14773] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 271.203541][T14773] RIP: 0033:0x4665d9 [ 271.207420][T14773] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 271.227029][T14773] RSP: 002b:00007f501580a188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 271.235635][T14773] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 271.243609][T14773] RDX: 0000000000000015 RSI: 0000000000600003 RDI: 0000000020000000 [ 271.251669][T14773] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 271.259691][T14773] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 271.267679][T14773] R13: 00007ffc5bcd76af R14: 00007f501580a300 R15: 0000000000022000 [ 271.275665][T14773] ---[ end trace 53ed414deca314cb ]--- [ 271.281107][T14773] ------------[ cut here ]------------ [ 271.286553][T14773] trying to isolate tail page [ 271.286712][T14773] WARNING: CPU: 0 PID: 14773 at mm/vmscan.c:1960 isolate_lru_page+0x360/0x370 [ 271.300215][T14773] Modules linked in: [ 271.304232][T14773] CPU: 0 PID: 14773 Comm: syz-executor.1 Tainted: G W 5.13.0-rc3-syzkaller #0 [ 271.314374][T14773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.324550][T14773] RIP: 0010:isolate_lru_page+0x360/0x370 [ 271.330240][T14773] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 6e 1e f2 ff 48 c7 c7 53 1c 3b 83 31 c0 e8 90 58 da ff <0f> 0b e9 01 fd ff ff e8 54 1e f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 271.350016][T14773] RSP: 0018:ffffc9000028bb08 EFLAGS: 00010246 [ 271.356107][T14773] RAX: b3b2c34a8a005400 RBX: 0000000000000001 RCX: 0000000000040000 [ 271.364100][T14773] RDX: ffffc900005e2000 RSI: 000000000003ffff RDI: 0000000000040000 [ 271.372060][T14773] RBP: ffffea0004c3a000 R08: ffffffff8129ab8c R09: 0001c9000028b8b7 [ 271.380026][T14773] R10: 0000000000000002 R11: ffff888107567000 R12: ffffea0004c3a040 [ 271.388001][T14773] R13: ffff888124961048 R14: ffffea0004c3a048 R15: 0000000020009000 [ 271.396017][T14773] FS: 00007f501580a700(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 271.404952][T14773] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 271.411527][T14773] CR2: 0000001b32222000 CR3: 0000000130e77000 CR4: 00000000001506f0 [ 271.419494][T14773] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 271.427591][T14773] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 271.435675][T14773] Call Trace: [ 271.438949][T14773] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 271.445279][T14773] ? swapin_walk_pmd_entry+0x320/0x320 [ 271.450735][T14773] __walk_page_range+0x93f/0x10e0 [ 271.455805][T14773] walk_page_range+0x111/0x2e0 [ 271.460584][T14773] do_madvise+0x84e/0x1050 [ 271.465022][T14773] ? __schedule+0x427/0x5b0 [ 271.469519][T14773] ? __fpregs_load_activate+0x103/0x1b0 [ 271.475104][T14773] __x64_sys_madvise+0x5d/0x70 [ 271.479892][T14773] do_syscall_64+0x4a/0x90 [ 271.484322][T14773] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 271.490225][T14773] RIP: 0033:0x4665d9 [ 271.494119][T14773] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 271.513736][T14773] RSP: 002b:00007f501580a188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 271.522133][T14773] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 271.530215][T14773] RDX: 0000000000000015 RSI: 0000000000600003 RDI: 0000000020000000 [ 271.538307][T14773] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 271.546329][T14773] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 271.554316][T14773] R13: 00007ffc5bcd76af R14: 00007f501580a300 R15: 0000000000022000 [ 271.562288][T14773] ---[ end trace 53ed414deca314cc ]--- [ 271.567751][T14773] ------------[ cut here ]------------ [ 271.573209][T14773] trying to isolate tail page [ 271.573314][T14773] WARNING: CPU: 0 PID: 14773 at mm/vmscan.c:1960 isolate_lru_page+0x360/0x370 [ 271.586894][T14773] Modules linked in: [ 271.590774][T14773] CPU: 0 PID: 14773 Comm: syz-executor.1 Tainted: G W 5.13.0-rc3-syzkaller #0 [ 271.600985][T14773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.611086][T14773] RIP: 0010:isolate_lru_page+0x360/0x370 [ 271.616729][T14773] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 6e 1e f2 ff 48 c7 c7 53 1c 3b 83 31 c0 e8 90 58 da ff <0f> 0b e9 01 fd ff ff e8 54 1e f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 271.636535][T14773] RSP: 0018:ffffc9000028bb08 EFLAGS: 00010246 [ 271.642589][T14773] RAX: b3b2c34a8a005400 RBX: 0000000000000001 RCX: 0000000000040000 [ 271.650571][T14773] RDX: ffffc900005e2000 RSI: 000000000003ffff RDI: 0000000000040000 [ 271.658560][T14773] RBP: ffffea0004c3a000 R08: ffffffff8129ab8c R09: 0001c9000028b8b7 [ 271.666558][T14773] R10: 0000000000000002 R11: ffff888107567000 R12: ffffea0004c3a080 [ 271.674538][T14773] R13: ffff888124961050 R14: ffffea0004c3a088 R15: 000000002000a000 [ 271.682522][T14773] FS: 00007f501580a700(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 271.691445][T14773] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 271.698054][T14773] CR2: 0000001b32222000 CR3: 0000000130e77000 CR4: 00000000001506f0 [ 271.706036][T14773] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 271.714020][T14773] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 271.721978][T14773] Call Trace: [ 271.725255][T14773] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 271.731611][T14773] ? swapin_walk_pmd_entry+0x320/0x320 [ 271.737082][T14773] __walk_page_range+0x93f/0x10e0 [ 271.742100][T14773] walk_page_range+0x111/0x2e0 [ 271.746865][T14773] do_madvise+0x84e/0x1050 [ 271.751308][T14773] ? __schedule+0x427/0x5b0 [ 271.755919][T14773] ? __fpregs_load_activate+0x103/0x1b0 [ 271.761569][T14773] __x64_sys_madvise+0x5d/0x70 [ 271.766349][T14773] do_syscall_64+0x4a/0x90 [ 271.770768][T14773] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 271.776661][T14773] RIP: 0033:0x4665d9 [ 271.780543][T14773] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 271.800146][T14773] RSP: 002b:00007f501580a188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 271.808564][T14773] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 271.816549][T14773] RDX: 0000000000000015 RSI: 0000000000600003 RDI: 0000000020000000 [ 271.824527][T14773] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 271.832489][T14773] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 271.840533][T14773] R13: 00007ffc5bcd76af R14: 00007f501580a300 R15: 0000000000022000 [ 271.848532][T14773] ---[ end trace 53ed414deca314cd ]--- [ 271.853994][T14773] ------------[ cut here ]------------ [ 271.859431][T14773] trying to isolate tail page [ 271.859515][T14773] WARNING: CPU: 0 PID: 14773 at mm/vmscan.c:1960 isolate_lru_page+0x360/0x370 [ 271.873120][T14773] Modules linked in: [ 271.876988][T14773] CPU: 0 PID: 14773 Comm: syz-executor.1 Tainted: G W 5.13.0-rc3-syzkaller #0 [ 271.887128][T14773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.897197][T14773] RIP: 0010:isolate_lru_page+0x360/0x370 [ 271.902881][T14773] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 6e 1e f2 ff 48 c7 c7 53 1c 3b 83 31 c0 e8 90 58 da ff <0f> 0b e9 01 fd ff ff e8 54 1e f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 271.922501][T14773] RSP: 0018:ffffc9000028bb08 EFLAGS: 00010246 [ 271.928583][T14773] RAX: b3b2c34a8a005400 RBX: 0000000000000001 RCX: 0000000000040000 [ 271.936670][T14773] RDX: ffffc900005e2000 RSI: 000000000003ffff RDI: 0000000000040000 [ 271.944693][T14773] RBP: ffffea0004c3a000 R08: ffffffff8129ab8c R09: 0001c9000028b8b7 [ 271.952658][T14773] R10: 0000000000000002 R11: ffff888107567000 R12: ffffea0004c3a0c0 [ 271.960630][T14773] R13: ffff888124961058 R14: ffffea0004c3a0c8 R15: 000000002000b000 [ 271.968650][T14773] FS: 00007f501580a700(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 271.977589][T14773] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 271.984268][T14773] CR2: 0000001b32222000 CR3: 0000000130e77000 CR4: 00000000001506f0 [ 271.992229][T14773] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 272.000276][T14773] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 272.008309][T14773] Call Trace: [ 272.011594][T14773] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 272.017938][T14773] ? swapin_walk_pmd_entry+0x320/0x320 [ 272.023424][T14773] __walk_page_range+0x93f/0x10e0 [ 272.028441][T14773] walk_page_range+0x111/0x2e0 [ 272.033214][T14773] do_madvise+0x84e/0x1050 [ 272.037625][T14773] ? __schedule+0x427/0x5b0 [ 272.042290][T14773] ? __fpregs_load_activate+0x103/0x1b0 [ 272.047840][T14773] __x64_sys_madvise+0x5d/0x70 [ 272.052620][T14773] do_syscall_64+0x4a/0x90 [ 272.057044][T14773] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 272.062943][T14773] RIP: 0033:0x4665d9 [ 272.066834][T14773] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 272.086449][T14773] RSP: 002b:00007f501580a188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 272.094958][T14773] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 272.102988][T14773] RDX: 0000000000000015 RSI: 0000000000600003 RDI: 0000000020000000 [ 272.110987][T14773] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 272.118990][T14773] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 272.126994][T14773] R13: 00007ffc5bcd76af R14: 00007f501580a300 R15: 0000000000022000 03:56:42 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71ae2000000922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) write$binfmt_elf32(r1, &(0x7f0000000180)=ANY=[], 0x58) 03:56:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=""/46, 0x2e}, 0x0) sendmsg$netlink(r0, &(0x7f0000001f00)={0x0, 0x0, &(0x7f0000001dc0)=[{&(0x7f00000087c0)={0x28, 0x26, 0x11d58d2ce6a3315f, 0x0, 0x0, "", [@typed={0x15, 0x0, 0x0, 0x0, @binary="e655c1b47b6c4142eb22f18a346444baaf"}]}, 0x28}], 0x1}, 0x0) 03:56:42 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000080)=0xffffffff, 0x4) 03:56:42 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x24}, {0x2c}, {0x6}]}, 0x10) writev(r0, &(0x7f0000000040)=[{&(0x7f00000001c0)='4', 0x1}], 0x1) 03:56:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8953, &(0x7f0000000200)={{}, {0x0, @random="4146b7e8ec21"}, 0x0, {0x2, 0x0, @empty}, 'lo\x00'}) 03:56:42 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x54041bc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = gettid() tkill(r1, 0x14) ptrace(0x4206, r0) ptrace$poke(0x7, r0, 0x0, 0x5) [ 272.135028][T14773] ---[ end trace 53ed414deca314ce ]--- 03:56:42 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000140)={0x1c, r1, 0x981, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4, 0x5}]}]}, 0x1c}}, 0x0) 03:56:42 executing program 2: ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) io_setup(0x9, &(0x7f0000000040)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000540), 0x7, 0x440) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001640)) syz_genetlink_get_family_id$team(&(0x7f00000007c0), r0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)={[{@errors_remount}]}) 03:56:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8953, &(0x7f0000000200)={{}, {0x0, @random="4146b7e8ec21"}, 0x0, {0x2, 0x0, @empty}, 'lo\x00'}) 03:56:42 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000003dc0), 0x300, 0x0) r2 = socket$inet(0x10, 0x80003, 0x0) sendfile(r2, r1, 0x0, 0xd6) [ 272.244985][T14816] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 272.254636][T14818] loop2: detected capacity change from 0 to 1051 [ 272.264636][T14818] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 272.280013][T14800] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 03:56:42 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000a80), 0x0, 0x0) lseek(r0, 0x9, 0x2) 03:56:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=""/46, 0x2e}, 0x0) sendmsg$netlink(r0, &(0x7f0000001f00)={0x0, 0x0, &(0x7f0000001dc0)=[{&(0x7f00000087c0)={0x28, 0x26, 0x11d58d2ce6a3315f, 0x0, 0x0, "", [@typed={0x15, 0x0, 0x0, 0x0, @binary="e655c1b47b6c4142eb22f18a346444baaf"}]}, 0x28}], 0x1}, 0x0) [ 272.290474][T14818] EXT4-fs (loop2): orphan cleanup on readonly fs [ 272.305160][T14818] EXT4-fs error (device loop2): ext4_quota_enable:6432: comm syz-executor.2: Bad quota inode # 3 [ 272.338675][T14818] EXT4-fs (loop2): Remounting filesystem read-only [ 272.345234][T14818] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 272.359284][T14818] EXT4-fs (loop2): Cannot turn on quotas: error -116 [ 272.366045][T14818] EXT4-fs (loop2): mounted filesystem without journal. Opts: errors=remount-ro,. Quota mode: writeback. [ 272.401661][T14846] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 272.410988][T14841] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 03:56:42 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71ae2000000922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) write$binfmt_elf32(r1, &(0x7f0000000180)=ANY=[], 0x58) 03:56:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8953, &(0x7f0000000200)={{}, {0x0, @random="4146b7e8ec21"}, 0x0, {0x2, 0x0, @empty}, 'lo\x00'}) 03:56:42 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x165, &(0x7f0000000440)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 03:56:42 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x6fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1) 03:56:42 executing program 2: ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) io_setup(0x9, &(0x7f0000000040)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000540), 0x7, 0x440) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001640)) syz_genetlink_get_family_id$team(&(0x7f00000007c0), r0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)={[{@errors_remount}]}) [ 273.068815][T14856] loop2: detected capacity change from 0 to 1051 [ 273.086664][T14856] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 273.099576][T14856] EXT4-fs (loop2): orphan cleanup on readonly fs [ 273.106869][T14856] EXT4-fs error (device loop2): ext4_quota_enable:6432: comm syz-executor.2: Bad quota inode # 3 [ 273.117883][T14856] EXT4-fs (loop2): Remounting filesystem read-only [ 273.124469][T14856] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 273.138463][T14856] EXT4-fs (loop2): Cannot turn on quotas: error -116 [ 273.145344][T14856] EXT4-fs (loop2): mounted filesystem without journal. Opts: errors=remount-ro,. Quota mode: writeback. 03:56:45 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x6fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1) 03:56:45 executing program 0: unshare(0x24000400) r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000240)={0x0, 0x0, 0x0}) 03:56:45 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000001400)={0x1, &(0x7f00000013c0)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mincore(&(0x7f00006dd000/0x2000)=nil, 0x2000, &(0x7f0000000080)=""/81) 03:56:45 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x6fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1) 03:56:45 executing program 2: ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) io_setup(0x9, &(0x7f0000000040)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000540), 0x7, 0x440) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001640)) syz_genetlink_get_family_id$team(&(0x7f00000007c0), r0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)={[{@errors_remount}]}) 03:56:45 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71ae2000000922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) write$binfmt_elf32(r1, &(0x7f0000000180)=ANY=[], 0x58) 03:56:45 executing program 4: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000180)={0x4000}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000440)={0x1c, 0x16, 0xa01, 0x0, 0x0, {0xa}, [@nested={0x4}, @nested={0x4, 0x2}]}, 0x1c}}, 0x0) 03:56:45 executing program 0: r0 = semget$private(0x0, 0x5, 0x0) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000f00)=""/4096) 03:56:45 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x6fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1) 03:56:45 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x6fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1) [ 275.260560][T14889] loop2: detected capacity change from 0 to 1051 [ 275.275220][T14889] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 275.300736][T14889] EXT4-fs (loop2): orphan cleanup on readonly fs 03:56:45 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x6fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1) 03:56:45 executing program 4: clone(0x41fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f00000001c0)) ptrace(0x10, r0) ptrace$poke(0x420f, r0, &(0x7f0000000040), 0xc04a01) [ 275.320452][T14889] EXT4-fs error (device loop2): ext4_quota_enable:6432: comm syz-executor.2: Bad quota inode # 3 [ 275.339139][T14889] EXT4-fs (loop2): Remounting filesystem read-only [ 275.345715][T14889] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 275.359811][T14889] EXT4-fs (loop2): Cannot turn on quotas: error -116 03:56:45 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x6fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1) 03:56:45 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000000)={0x9, 0x100000001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0xfffffe58) lsetxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) [ 275.366524][T14889] EXT4-fs (loop2): mounted filesystem without journal. Opts: errors=remount-ro,. Quota mode: writeback. 03:56:45 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000100)={[0xfffffffffffe]}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000180)={0x0, 0x17, 0x4, @tid=r0}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x3938700}, {0x0, 0xe4c}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040), 0x0) ppoll(0x0, 0x0, &(0x7f0000000140)={0x0, 0x3938700}, &(0x7f0000000280), 0x8) 03:56:45 executing program 2: ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) io_setup(0x9, &(0x7f0000000040)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000540), 0x7, 0x440) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001640)) syz_genetlink_get_family_id$team(&(0x7f00000007c0), r0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)={[{@errors_remount}]}) 03:56:45 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, 0x0) [ 275.559789][T14945] loop2: detected capacity change from 0 to 1051 [ 275.583198][T14945] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 275.594435][T14945] EXT4-fs (loop2): orphan cleanup on readonly fs [ 275.600848][T14945] EXT4-fs error (device loop2): ext4_quota_enable:6432: comm syz-executor.2: Bad quota inode # 3 [ 275.611687][T14945] EXT4-fs (loop2): Remounting filesystem read-only [ 275.618323][T14945] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 275.632372][T14945] EXT4-fs (loop2): Cannot turn on quotas: error -116 [ 275.639087][T14945] EXT4-fs (loop2): mounted filesystem without journal. Opts: errors=remount-ro,. Quota mode: writeback. 03:56:46 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000000)={0x9, 0x100000001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0xfffffe58) lsetxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) 03:56:46 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, 0x0) 03:56:46 executing program 1: r0 = epoll_create(0x3ff) r1 = syz_io_uring_setup(0x2d40, &(0x7f0000000080), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000180)) r2 = socket$unix(0x1, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) r3 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000040)) 03:56:46 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000000)={0x9, 0x100000001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0xfffffe58) lsetxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) 03:56:46 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffff7}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="66530700ae897094e71b0fb1f147a8378f364602812c66538d750f6e9fb045703260af3160df0d610b5da6bdf2d1eaa302ab6c2fef230d003ea1315b9532f3af2f5e153eb78020fa00eb298802d8f6c1f3b18d6d352507f7018b31a53bad1ec3", 0x60}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x5) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 03:56:46 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, 0x0) 03:56:46 executing program 4: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8)={[0xfffffffffffffffe]}, 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r0, &(0x7f00000002c0)=""/386, 0x182) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x43c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa7000be2) open(&(0x7f0000000080)='./control\x00', 0x0, 0x0) 03:56:46 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000340), &(0x7f0000000380)=0x4) 03:56:46 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="5500000018007f5f00fe01b2a4a2909302", 0x11}], 0x1}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setuid(0x0) socket(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) 03:56:46 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, 0x0) 03:56:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000000)='\x85bfi@\x8bSxd\"cr\x0f\x87x\r %\t:3\x97h\x8d\x7f\x90\xb4\xffV\x9c\x87\xef\xe2\xf3\xe4\xc4\x18\x8bd\xc4h\xa55\x9aT[\xd6\x8eJ\x83;\xa2.\xc0\x15#v\xea\xa2@K', 0x0) ftruncate(r1, 0x40001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[], 0x78) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000e4effc)=0x4, 0x4) sendfile(r0, r1, 0x0, 0x100000000002) 03:56:46 executing program 5: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000040), &(0x7f0000000080)='system_u:object_r:lost_found_t:s0\x00', 0x22, 0x0) [ 276.324518][ T25] audit: type=1400 audit(1621915006.266:411): avc: denied { associate } for pid=14999 comm="syz-executor.5" name="vcsu" dev="devtmpfs" ino=14 scontext=system_u:object_r:lost_found_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=filesystem permissive=1 [ 276.335629][T15002] netlink: 57 bytes leftover after parsing attributes in process `syz-executor.1'. 03:56:46 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000000)={0x9, 0x100000001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0xfffffe58) lsetxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) 03:56:46 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$lock(r0, 0x5, &(0x7f0000000440)={0x0, 0x2, 0xfffffffffffffb32}) 03:56:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000003340)={0x0, 0x0, &(0x7f00000032c0)=[{&(0x7f0000000740)={0x14, 0x43, 0x1a51, 0x0, 0x0, "", [@nested={0x4}]}, 0x14}], 0x1}, 0x0) 03:56:46 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000000)={0x9, 0x100000001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0xfffffe58) lsetxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) 03:56:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_io_uring_setup(0x5c1c, &(0x7f0000000080)={0x0, 0x2e8, 0x8}, &(0x7f0000771000/0x4000)=nil, &(0x7f0000347000/0x2000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 03:56:46 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFCONF(r0, 0x4020940d, 0x0) 03:56:46 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x10) unlink(&(0x7f0000000040)='./file0\x00') 03:56:46 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f00000032c0)=[{{&(0x7f0000000380)={0x2, 0x4e22}, 0x10, 0x0}}, {{&(0x7f0000000080)={0x2, 0x4e22}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x10, 0x0, 0x8}}], 0x28}}], 0x2, 0x0) 03:56:47 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0x8929, &(0x7f0000061d00)={0x63a, [], 0x0, "ab03f1c9ec0bcb"}) 03:56:47 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001500)=@newpolicy={0xc4, 0x13, 0x1, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}}, [@sec_ctx={0xc, 0x8, {0x9, 0x8, 0x0, 0x0, 0x2}}]}, 0xc4}}, 0x0) 03:56:47 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0x3, 0x6) r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f0000000100)) 03:56:47 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mknodat(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) renameat(r0, &(0x7f00000001c0)='./file0\x00', r0, &(0x7f0000000200)='./file0\x00') 03:56:47 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000000)={0x9, 0x100000001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0xfffffe58) lsetxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) 03:56:47 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000000)={0x9, 0x100000001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0xfffffe58) lsetxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) 03:56:47 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='cpuset\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2c) wait4(0x0, 0x0, 0x0, 0x0) 03:56:47 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x0, r1}) exit(0x0) close(r0) 03:56:47 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mknodat(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) renameat(r0, &(0x7f00000001c0)='./file0\x00', r0, &(0x7f0000000200)='./file0\x00') [ 277.145455][ T25] audit: type=1326 audit(1621915007.086:412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15044 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 03:56:47 executing program 1: syz_open_dev$tty20(0xc, 0x4, 0x1) 03:56:47 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mknodat(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) renameat(r0, &(0x7f00000001c0)='./file0\x00', r0, &(0x7f0000000200)='./file0\x00') [ 277.217375][T15067] new mount options do not match the existing superblock, will be ignored [ 277.227018][ T25] audit: type=1326 audit(1621915007.106:413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15044 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=428 compat=0 ip=0x4665d9 code=0x7ffc0000 03:56:47 executing program 3: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r0, &(0x7f0000000140)="2400000052001f0014def407000904000a00fb75100006807e07580c12a300feffffff08", 0x24) 03:56:47 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mknodat(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) renameat(r0, &(0x7f00000001c0)='./file0\x00', r0, &(0x7f0000000200)='./file0\x00') [ 277.294718][T15071] new mount options do not match the existing superblock, will be ignored [ 277.310173][ T25] audit: type=1326 audit(1621915007.106:414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15044 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 03:56:47 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7, 0x8f}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000007240)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) sendmsg$inet(r1, &(0x7f0000000700)={&(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10, &(0x7f0000000600)=[{&(0x7f00000002c0)="b698396c0a4f9da0f4fd9d964ebcb6cb7ba852e1583b481ff856970fe5ee13477be212176663167e201826d536edda851f5bb158c66b201f33a6665d97073d53c77f81840fe42643326ea66f9786ce057199b70b34bd0da0f11a8d38e62d43f4c11c565451414e8a194e5e07c7b4c1cb74fbde8ffe59ccd7edc7fb58fdb3ffb408d94df7756494709d73c06df1263223c700bb750823aed5a56846574c621d25424770b17769cf971e", 0xa9}, {&(0x7f0000000380)="5b41a8d62b5df8809ec1e41e9484c786af845b9b818946d0f8158d19b0e92feb543b5d148fa1e90729fe4ef3aac34c83041105e2b9fe6b8919fdaf2cc05c785eaa7a869e2bad34fc532772770f242e95cb1b5bc3981ea224536acdd182f11377a9c3cfc99b39ecc29ab507650fdec97be3ac6f8af7d0e89fbf3cea5959814a42415c7265b797f0e68ca87ede12b9d323f4de6a24f6ff7933d98e74eca0dc72bc8a61ce8f6b3ed4a9c3ecf60eaf64cf02bc484bb0df92a86c40064ceae8e2a901827051b46e45d3b2b8221c91236ab11b0c0c832f33fe864bbd2cc0ac99247ea7b6f0812c3a290f8a7f82e7fcc561", 0xee}, {&(0x7f0000000140)="bce3fcb0807e083d8bf1a9dc6f3b5390f23ee3b9b4e40dadabf3e2ac3af11ff83e647a36f87e613429d1e91189cb5c", 0x2f}, {0x0}, {&(0x7f00000004c0)="2b41e13087ff", 0x6}, {&(0x7f0000000500)="c945e17110e4e60a3ab063f3b55e83d929e84fe155b0f3c66adcaf3db523cd0c740aa55ccc6d84db82e2b96361e4ae6ac605f1f24b0faf5bcdadbc974c6794b35ce535b8d4edcd3b1a6babc4c8fd3d5e957b300ccad87e757ebbf7825838d4d5be720b8427a4abdff8618ceb0b4cfa1ebe7213c758317300a8", 0x79}], 0x6, &(0x7f0000000680)=[@ip_retopts={{0x28, 0x0, 0x7, {[@cipso={0x86, 0x8, 0x1, [{0x0, 0x2}]}, @ssrr={0x89, 0xf, 0xac, [@private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010100]}]}}}, @ip_retopts={{0x24, 0x0, 0x7, {[@timestamp_addr={0x44, 0x14, 0x57, 0x1, 0x9, [{@empty, 0x8}, {@local}]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}], 0x68}, 0x40800) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000180)={0x38, 0x1, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8b3e}, 0x0) prlimit64(0x0, 0x2, &(0x7f0000000480)={0x3866, 0x5}, &(0x7f0000000580)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r4 = creat(&(0x7f0000000240)='./bus\x00', 0x6066f8b037950f23) ftruncate(r4, 0x800) lseek(r4, 0x0, 0x2) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) r5 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8400fffffffa) creat(&(0x7f00000001c0)='./bus\x00', 0x0) 03:56:47 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000280), 0x24, 0x0) [ 277.374730][ T25] audit: type=1326 audit(1621915007.106:415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15044 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=259 compat=0 ip=0x4665d9 code=0x7ffc0000 03:56:47 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x136f, &(0x7f0000000080), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000340)) io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) [ 277.502893][ T25] audit: type=1326 audit(1621915007.106:416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15044 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 277.604649][ T25] audit: type=1326 audit(1621915007.116:417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15044 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=264 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 277.647297][ T25] audit: type=1326 audit(1621915007.116:418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15044 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 03:56:47 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000280), 0x24, 0x0) [ 277.682394][ T25] audit: type=1326 audit(1621915007.116:419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15044 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=157 compat=0 ip=0x4665d9 code=0x7ffc0000 03:56:47 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7", 0x9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x8) 03:56:47 executing program 2: r0 = epoll_create1(0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000100)=[{r0}, {r2}], 0x2, 0x0, 0x0, 0x0) [ 277.749701][ T25] audit: type=1326 audit(1621915007.116:420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15044 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 03:56:48 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x8042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="67eb"], 0xe) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4052, r0, 0x0) 03:56:48 executing program 0: futex(0x0, 0xdc11e2d91e5d7d18, 0x0, 0x0, 0x0, 0x0) 03:56:48 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000280), 0x24, 0x0) 03:56:48 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000001ac0)='setgroups\x00') write$selinux_attr(r0, 0x0, 0x0) 03:56:48 executing program 0: mq_open(&(0x7f0000000040)='.^\xc5\x15\xe0\x14\x8f\xf6 \x10\xdf\x9c\xb1\xb8\xa7\xdf\xb8\xe9\xa9D\fX\x12\xafa\rD\x1a\xeeW\xc3\xcdj2\x83\xec\rB\x1aFZ`\xcd\x9f\xbdn@\xb2\x8aD\x8e}\xaf\xec\x85\x03\x00\xda\xef\xe25\x18x\x9f]r6\xf2\xa8\xb6\x97z=\x11\x9d\xe3~?*\x92\xdf\xacS\x92\xbc\xc2l>]\x9e\xb9G\x019\xe1\xca\x02\x812\xa6\x14\xc2\x83\xf1\xb1\xf9lx\xdd\xe8\x1a\xdc-\xd7w\xab\xb2\xaf\x9eZE\x80B\xb0\x97\xef\x0e9\xcb\x8a\a0\x16\xc4;\xcb\xfdt\x8b\xf8\xdb\x12\xd2\xfd\x87JzN\xb2\xd4\x18\xeb\x06|\x05\xe1U$;\xb4#\xe4fk\\\x80\xea_{\xccy\x15J\\3z\xffm\x1d\xbb\x03=|\xc4\x02\xa4\'\xf1\xc5\xcdr\x82\x98\x8f\xf81\"\xee\xedtc\x04\xfe\x00\xa6\x16\x8e\xde\xe9<#{^\x16\xa5\x14\x84\xf7\xe4\x85\x8d2\xc4*\x8b\xdf\xafD\xdf3\xec\x96W\xe4\xc9\x069AZ\x93\x83\xd1e\xa8\x8bx*$\x11\xcc\x9f\xe1m8_P1\xadRa', 0x0, 0x0, 0x0) 03:56:48 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x101}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f00000001c0)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) poll(0x0, 0x0, 0x201) pselect6(0x40, &(0x7f00000002c0), 0x0, &(0x7f0000000380)={0x3}, &(0x7f00000003c0)={0x0, 0x989680}, 0x0) 03:56:48 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000280), 0x24, 0x0) 03:56:48 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r3 = socket(0x400000000000010, 0x3, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r2, 0x0, 0x10, &(0x7f00000006c0)={@empty, @empty}, 0xc) 03:56:48 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7, 0x8f}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000007240)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) sendmsg$inet(r1, &(0x7f0000000700)={&(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10, &(0x7f0000000600)=[{&(0x7f00000002c0)="b698396c0a4f9da0f4fd9d964ebcb6cb7ba852e1583b481ff856970fe5ee13477be212176663167e201826d536edda851f5bb158c66b201f33a6665d97073d53c77f81840fe42643326ea66f9786ce057199b70b34bd0da0f11a8d38e62d43f4c11c565451414e8a194e5e07c7b4c1cb74fbde8ffe59ccd7edc7fb58fdb3ffb408d94df7756494709d73c06df1263223c700bb750823aed5a56846574c621d25424770b17769cf971e", 0xa9}, {&(0x7f0000000380)="5b41a8d62b5df8809ec1e41e9484c786af845b9b818946d0f8158d19b0e92feb543b5d148fa1e90729fe4ef3aac34c83041105e2b9fe6b8919fdaf2cc05c785eaa7a869e2bad34fc532772770f242e95cb1b5bc3981ea224536acdd182f11377a9c3cfc99b39ecc29ab507650fdec97be3ac6f8af7d0e89fbf3cea5959814a42415c7265b797f0e68ca87ede12b9d323f4de6a24f6ff7933d98e74eca0dc72bc8a61ce8f6b3ed4a9c3ecf60eaf64cf02bc484bb0df92a86c40064ceae8e2a901827051b46e45d3b2b8221c91236ab11b0c0c832f33fe864bbd2cc0ac99247ea7b6f0812c3a290f8a7f82e7fcc561", 0xee}, {&(0x7f0000000140)="bce3fcb0807e083d8bf1a9dc6f3b5390f23ee3b9b4e40dadabf3e2ac3af11ff83e647a36f87e613429d1e91189cb5c", 0x2f}, {0x0}, {&(0x7f00000004c0)="2b41e13087ff", 0x6}, {&(0x7f0000000500)="c945e17110e4e60a3ab063f3b55e83d929e84fe155b0f3c66adcaf3db523cd0c740aa55ccc6d84db82e2b96361e4ae6ac605f1f24b0faf5bcdadbc974c6794b35ce535b8d4edcd3b1a6babc4c8fd3d5e957b300ccad87e757ebbf7825838d4d5be720b8427a4abdff8618ceb0b4cfa1ebe7213c758317300a8", 0x79}], 0x6, &(0x7f0000000680)=[@ip_retopts={{0x28, 0x0, 0x7, {[@cipso={0x86, 0x8, 0x1, [{0x0, 0x2}]}, @ssrr={0x89, 0xf, 0xac, [@private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010100]}]}}}, @ip_retopts={{0x24, 0x0, 0x7, {[@timestamp_addr={0x44, 0x14, 0x57, 0x1, 0x9, [{@empty, 0x8}, {@local}]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}], 0x68}, 0x40800) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000180)={0x38, 0x1, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8b3e}, 0x0) prlimit64(0x0, 0x2, &(0x7f0000000480)={0x3866, 0x5}, &(0x7f0000000580)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r4 = creat(&(0x7f0000000240)='./bus\x00', 0x6066f8b037950f23) ftruncate(r4, 0x800) lseek(r4, 0x0, 0x2) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) r5 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8400fffffffa) creat(&(0x7f00000001c0)='./bus\x00', 0x0) 03:56:48 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644157684e3dae491", 0x5b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:56:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001100034700bb65e1c3e4ffff0600030001000000450000002500000019001c000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 278.420127][T15167] netlink: 'syz-executor.4': attribute type 28 has an invalid length. 03:56:48 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/timers\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000240)=""/185, 0xb9}], 0x1, 0x0, 0x0) 03:56:48 executing program 0: r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000140)=[{}], 0x1, 0x10001, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r2, &(0x7f0000000000)={0x200c}) 03:56:48 executing program 4: clone(0x200964065fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='uid_map\x00') ppoll(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe9c) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tcp_mem(r0, &(0x7f0000002180)={0x0, 0x20, 0x0, 0x20, 0x0, 0x4}, 0x48) 03:56:48 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000002400), 0x0, 0x0) r2 = dup3(r0, r1, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r0, &(0x7f0000000080)) 03:56:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f0000000c40)={&(0x7f0000000300)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, 0x0, 0xffffffffffffffcc}, 0x0) 03:56:48 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) ioctl$FIONREAD(r0, 0x5423, &(0x7f0000000000)) 03:56:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/221, 0xdd}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)=""/155, 0x9b}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000140)=""/127, 0x7f}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r1, 0x0) mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) recvmsg(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)=""/95, 0x5f}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r4, 0x0) open$dir(&(0x7f0000001240)='./file0\x00', 0x0, 0x0) shutdown(r5, 0x0) shutdown(r2, 0x0) open(&(0x7f0000002880)='./file0\x00', 0x615, 0x0) 03:56:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x7, 0x1, 0x5}, 0x14}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2e5) splice(r1, 0x0, r3, 0x0, 0x447fe7, 0x0) 03:56:48 executing program 2: open(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0) unlink(&(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') 03:56:49 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7, 0x8f}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000007240)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) sendmsg$inet(r1, &(0x7f0000000700)={&(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10, &(0x7f0000000600)=[{&(0x7f00000002c0)="b698396c0a4f9da0f4fd9d964ebcb6cb7ba852e1583b481ff856970fe5ee13477be212176663167e201826d536edda851f5bb158c66b201f33a6665d97073d53c77f81840fe42643326ea66f9786ce057199b70b34bd0da0f11a8d38e62d43f4c11c565451414e8a194e5e07c7b4c1cb74fbde8ffe59ccd7edc7fb58fdb3ffb408d94df7756494709d73c06df1263223c700bb750823aed5a56846574c621d25424770b17769cf971e", 0xa9}, {&(0x7f0000000380)="5b41a8d62b5df8809ec1e41e9484c786af845b9b818946d0f8158d19b0e92feb543b5d148fa1e90729fe4ef3aac34c83041105e2b9fe6b8919fdaf2cc05c785eaa7a869e2bad34fc532772770f242e95cb1b5bc3981ea224536acdd182f11377a9c3cfc99b39ecc29ab507650fdec97be3ac6f8af7d0e89fbf3cea5959814a42415c7265b797f0e68ca87ede12b9d323f4de6a24f6ff7933d98e74eca0dc72bc8a61ce8f6b3ed4a9c3ecf60eaf64cf02bc484bb0df92a86c40064ceae8e2a901827051b46e45d3b2b8221c91236ab11b0c0c832f33fe864bbd2cc0ac99247ea7b6f0812c3a290f8a7f82e7fcc561", 0xee}, {&(0x7f0000000140)="bce3fcb0807e083d8bf1a9dc6f3b5390f23ee3b9b4e40dadabf3e2ac3af11ff83e647a36f87e613429d1e91189cb5c", 0x2f}, {0x0}, {&(0x7f00000004c0)="2b41e13087ff", 0x6}, {&(0x7f0000000500)="c945e17110e4e60a3ab063f3b55e83d929e84fe155b0f3c66adcaf3db523cd0c740aa55ccc6d84db82e2b96361e4ae6ac605f1f24b0faf5bcdadbc974c6794b35ce535b8d4edcd3b1a6babc4c8fd3d5e957b300ccad87e757ebbf7825838d4d5be720b8427a4abdff8618ceb0b4cfa1ebe7213c758317300a8", 0x79}], 0x6, &(0x7f0000000680)=[@ip_retopts={{0x28, 0x0, 0x7, {[@cipso={0x86, 0x8, 0x1, [{0x0, 0x2}]}, @ssrr={0x89, 0xf, 0xac, [@private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010100]}]}}}, @ip_retopts={{0x24, 0x0, 0x7, {[@timestamp_addr={0x44, 0x14, 0x57, 0x1, 0x9, [{@empty, 0x8}, {@local}]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}], 0x68}, 0x40800) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000180)={0x38, 0x1, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8b3e}, 0x0) prlimit64(0x0, 0x2, &(0x7f0000000480)={0x3866, 0x5}, &(0x7f0000000580)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r4 = creat(&(0x7f0000000240)='./bus\x00', 0x6066f8b037950f23) ftruncate(r4, 0x800) lseek(r4, 0x0, 0x2) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) r5 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8400fffffffa) creat(&(0x7f00000001c0)='./bus\x00', 0x0) 03:56:49 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) ioctl$FIONREAD(r0, 0x5423, &(0x7f0000000000)) 03:56:49 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000140)) 03:56:49 executing program 2: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000, 0x7, &(0x7f0000ffe000/0x1000)=nil) 03:56:49 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) ioctl$FIONREAD(r0, 0x5423, &(0x7f0000000000)) 03:56:49 executing program 4: clone(0x66100d00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_netdev_private(r0, 0x89a0, 0x0) 03:56:49 executing program 2: clock_nanosleep(0xfffffdfc, 0x0, &(0x7f0000000140), 0x0) 03:56:49 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) ioctl$FIONREAD(r0, 0x5423, &(0x7f0000000000)) 03:56:49 executing program 0: r0 = memfd_create(&(0x7f0000000200)='#\tP\x81\xcbXE\x00'/19, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x800) splice(r1, 0x0, r0, 0x0, 0x7, 0x0) 03:56:49 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='devices.list\x00', 0x275a, 0x0) fallocate(r0, 0x0, 0x0, 0x7fff) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) write$P9_RREADLINK(r0, &(0x7f0000000100)=ANY=[], 0x10) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0xc, r1}) r4 = open(&(0x7f0000000780)='./bus\x00', 0x14117e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r4, 0x0) 03:56:49 executing program 2: clock_nanosleep(0xfffffdfc, 0x0, &(0x7f0000000140), 0x0) 03:56:49 executing program 4: clone(0x66100d00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_netdev_private(r0, 0x89a0, 0x0) 03:56:50 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7, 0x8f}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000007240)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) sendmsg$inet(r1, &(0x7f0000000700)={&(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10, &(0x7f0000000600)=[{&(0x7f00000002c0)="b698396c0a4f9da0f4fd9d964ebcb6cb7ba852e1583b481ff856970fe5ee13477be212176663167e201826d536edda851f5bb158c66b201f33a6665d97073d53c77f81840fe42643326ea66f9786ce057199b70b34bd0da0f11a8d38e62d43f4c11c565451414e8a194e5e07c7b4c1cb74fbde8ffe59ccd7edc7fb58fdb3ffb408d94df7756494709d73c06df1263223c700bb750823aed5a56846574c621d25424770b17769cf971e", 0xa9}, {&(0x7f0000000380)="5b41a8d62b5df8809ec1e41e9484c786af845b9b818946d0f8158d19b0e92feb543b5d148fa1e90729fe4ef3aac34c83041105e2b9fe6b8919fdaf2cc05c785eaa7a869e2bad34fc532772770f242e95cb1b5bc3981ea224536acdd182f11377a9c3cfc99b39ecc29ab507650fdec97be3ac6f8af7d0e89fbf3cea5959814a42415c7265b797f0e68ca87ede12b9d323f4de6a24f6ff7933d98e74eca0dc72bc8a61ce8f6b3ed4a9c3ecf60eaf64cf02bc484bb0df92a86c40064ceae8e2a901827051b46e45d3b2b8221c91236ab11b0c0c832f33fe864bbd2cc0ac99247ea7b6f0812c3a290f8a7f82e7fcc561", 0xee}, {&(0x7f0000000140)="bce3fcb0807e083d8bf1a9dc6f3b5390f23ee3b9b4e40dadabf3e2ac3af11ff83e647a36f87e613429d1e91189cb5c", 0x2f}, {0x0}, {&(0x7f00000004c0)="2b41e13087ff", 0x6}, {&(0x7f0000000500)="c945e17110e4e60a3ab063f3b55e83d929e84fe155b0f3c66adcaf3db523cd0c740aa55ccc6d84db82e2b96361e4ae6ac605f1f24b0faf5bcdadbc974c6794b35ce535b8d4edcd3b1a6babc4c8fd3d5e957b300ccad87e757ebbf7825838d4d5be720b8427a4abdff8618ceb0b4cfa1ebe7213c758317300a8", 0x79}], 0x6, &(0x7f0000000680)=[@ip_retopts={{0x28, 0x0, 0x7, {[@cipso={0x86, 0x8, 0x1, [{0x0, 0x2}]}, @ssrr={0x89, 0xf, 0xac, [@private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010100]}]}}}, @ip_retopts={{0x24, 0x0, 0x7, {[@timestamp_addr={0x44, 0x14, 0x57, 0x1, 0x9, [{@empty, 0x8}, {@local}]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}], 0x68}, 0x40800) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000180)={0x38, 0x1, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8b3e}, 0x0) prlimit64(0x0, 0x2, &(0x7f0000000480)={0x3866, 0x5}, &(0x7f0000000580)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r4 = creat(&(0x7f0000000240)='./bus\x00', 0x6066f8b037950f23) ftruncate(r4, 0x800) lseek(r4, 0x0, 0x2) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) r5 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8400fffffffa) creat(&(0x7f00000001c0)='./bus\x00', 0x0) 03:56:50 executing program 0: clone(0x66100d00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_netdev_private(r0, 0x89a0, 0x0) 03:56:50 executing program 5: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x4d, &(0x7f0000000280)="000000000000b50cec00050000000000000094bd9d45b0000000000000077d150801428a6a79940c9c0689bf74257a994a5cd7efad5175d8b454438488090804f443aa7ef6ee20c76b47e963c3"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:56:50 executing program 2: clock_nanosleep(0xfffffdfc, 0x0, &(0x7f0000000140), 0x0) 03:56:50 executing program 4: clone(0x66100d00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_netdev_private(r0, 0x89a0, 0x0) 03:56:50 executing program 3: creat(&(0x7f0000000280)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000140)={[{@mpol={'mpol', 0x3d, {'prefer', '=relative', @val={0x3a, [0x2d]}}}, 0x4e}], [], 0x2f}) 03:56:50 executing program 4: clone(0x66100d00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_netdev_private(r0, 0x89a0, 0x0) [ 280.368068][T15295] tmpfs: Bad value for 'mpol' 03:56:50 executing program 2: clock_nanosleep(0xfffffdfc, 0x0, &(0x7f0000000140), 0x0) 03:56:50 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010003000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 280.394173][T15314] tmpfs: Bad value for 'mpol' 03:56:50 executing program 4: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x19) write$binfmt_script(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="2321092f273e9878bbe8e94b5d923aff9fc787c44e08391ad3729593249c090a"], 0x191) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 03:56:50 executing program 0: clone(0x66100d00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_netdev_private(r0, 0x89a0, 0x0) [ 280.445245][T15326] loop3: detected capacity change from 0 to 1051 [ 280.454565][T15326] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 03:56:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x280000e, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x55, 0xd9f, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) write(r1, &(0x7f0000000140)="ae34e56c33d3716cf2894986f57995a9f2953a03d67d61ce6a5b81bace0d1a52451203fe3969d72655101ca8d730dc6df7611ec7131f0729c36fb0a5ef987f0d5ff3bd9f367436d05ef7e57d6cfe9278c9bfa04cb2840937ebacb2e4b092520e9b67a9bab770128bae63901d777a234ebe6816f63893be5f5d0712022d96d1cb0c432a283932872e4287bd73c83bc333d75f767b739dbc49652c6de40ddfd30c1d65567b132811461aed102f4e0978d0463b3f2e477d8fa4c0f53d07fce303942a638e2cad0507daf6b314a5f172e49a93", 0xd1) [ 280.493317][T15326] EXT4-fs (loop3): orphan cleanup on readonly fs [ 280.499760][T15326] EXT4-fs error (device loop3): ext4_orphan_get:1413: comm syz-executor.3: bad orphan inode 33554432 [ 280.510627][T15326] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 03:56:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x280000e, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x55, 0xd9f, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) write(r1, &(0x7f0000000140)="ae34e56c33d3716cf2894986f57995a9f2953a03d67d61ce6a5b81bace0d1a52451203fe3969d72655101ca8d730dc6df7611ec7131f0729c36fb0a5ef987f0d5ff3bd9f367436d05ef7e57d6cfe9278c9bfa04cb2840937ebacb2e4b092520e9b67a9bab770128bae63901d777a234ebe6816f63893be5f5d0712022d96d1cb0c432a283932872e4287bd73c83bc333d75f767b739dbc49652c6de40ddfd30c1d65567b132811461aed102f4e0978d0463b3f2e477d8fa4c0f53d07fce303942a638e2cad0507daf6b314a5f172e49a93", 0xd1) 03:56:51 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x3, &(0x7f00000000c0)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x24}, {0x6}]}, 0x10) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[], 0x3def) 03:56:53 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x2c}, {0x14}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, 0x0) 03:56:53 executing program 4: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/221, 0xdd) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x305, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc08c5332, &(0x7f00000003c0)={{}, 'port1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0xc08c5334, &(0x7f0000000180)) tkill(r0, 0x7) 03:56:53 executing program 0: clone(0x66100d00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_netdev_private(r0, 0x89a0, 0x0) 03:56:53 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000cab000)=0x7) setuid(r2) ioctl$SNAPSHOT_UNFREEZE(r0, 0x3304) 03:56:53 executing program 3: r0 = syz_io_uring_setup(0x2de1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, r3, 0x0, 0x0, 0x0, 0x100000}, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) 03:56:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x280000e, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x55, 0xd9f, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) write(r1, &(0x7f0000000140)="ae34e56c33d3716cf2894986f57995a9f2953a03d67d61ce6a5b81bace0d1a52451203fe3969d72655101ca8d730dc6df7611ec7131f0729c36fb0a5ef987f0d5ff3bd9f367436d05ef7e57d6cfe9278c9bfa04cb2840937ebacb2e4b092520e9b67a9bab770128bae63901d777a234ebe6816f63893be5f5d0712022d96d1cb0c432a283932872e4287bd73c83bc333d75f767b739dbc49652c6de40ddfd30c1d65567b132811461aed102f4e0978d0463b3f2e477d8fa4c0f53d07fce303942a638e2cad0507daf6b314a5f172e49a93", 0xd1) 03:56:53 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEV(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x200003c8}, 0x0) 03:56:53 executing program 0: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x5000) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) 03:56:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x280000e, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x55, 0xd9f, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) write(r1, &(0x7f0000000140)="ae34e56c33d3716cf2894986f57995a9f2953a03d67d61ce6a5b81bace0d1a52451203fe3969d72655101ca8d730dc6df7611ec7131f0729c36fb0a5ef987f0d5ff3bd9f367436d05ef7e57d6cfe9278c9bfa04cb2840937ebacb2e4b092520e9b67a9bab770128bae63901d777a234ebe6816f63893be5f5d0712022d96d1cb0c432a283932872e4287bd73c83bc333d75f767b739dbc49652c6de40ddfd30c1d65567b132811461aed102f4e0978d0463b3f2e477d8fa4c0f53d07fce303942a638e2cad0507daf6b314a5f172e49a93", 0xd1) 03:56:53 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x6, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {0x0, 0x0, 0x1}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x2b, &(0x7f0000001340)="c4c691019919da078a0098d1e0a59320ff79b040f762910016775a8454cc16dc38f06ee04fa4ea57ff22ea"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 03:56:53 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) eventfd(0x0) creat(&(0x7f0000000240)='./file0\x00', 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="1c00000007ffff", @ANYRES16=r0, @ANYRESOCT], 0x52) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@noextend}]}}) 03:56:53 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x1200) [ 283.387579][ T25] kauditd_printk_skb: 28 callbacks suppressed [ 283.387590][ T25] audit: type=1326 audit(1621915013.327:449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15396 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 283.462613][ T4801] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=4801 comm=kworker/0:3 [ 283.480600][T15422] 9pnet: p9_errstr2errno: server reported unknown error 017777777 03:56:54 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="4401000010000100000021ed45a900000000000000009d6dee21f473626d00000000000000000000000000000000290000002000"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fc000000000000000000000000000000000000006c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a0000000000000000000000480003"], 0x144}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x80000010009, 0x0) 03:56:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32}, [], {0x14}}, 0x28}}, 0x0) 03:56:54 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x6, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {0x0, 0x0, 0x1}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x2b, &(0x7f0000001340)="c4c691019919da078a0098d1e0a59320ff79b040f762910016775a8454cc16dc38f06ee04fa4ea57ff22ea"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 03:56:54 executing program 4: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_setup(0xfe4, &(0x7f0000000380)={0x0, 0x47c8, 0x1, 0x2, 0x95, 0x0, r0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000002000/0x2000)=nil, &(0x7f0000000040), &(0x7f0000000400)) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x5}, 0x0) io_uring_enter(r0, 0x2ff, 0x0, 0x0, 0x0, 0x0) write$nbd(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="6744669800000000000000000000df62941ed0b0e4fbd8429b000000005936e5a58e346bb946638d00000000f357727752bb0f09e58687c804c57a2ec28d0cca3c819055d0916f0e127be52cc6e948b7272cf61b2e6fa38245275956fd2439cdf4d38cad8988a3d1010409890063e4ad30122eac93224e240c00"/133], 0xffffffd5) shutdown(r3, 0x0) 03:56:54 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_int(r0, 0x1, 0x2d, &(0x7f0000001280), &(0x7f0000000000)=0x4) 03:56:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000580)=[{0x30, 0x0, 0x0, 0xfffff018}, {0x6}]}, 0x10) [ 284.197173][ T25] audit: type=1326 audit(1621915014.137:450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15396 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 03:56:54 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x6, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {0x0, 0x0, 0x1}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x2b, &(0x7f0000001340)="c4c691019919da078a0098d1e0a59320ff79b040f762910016775a8454cc16dc38f06ee04fa4ea57ff22ea"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 03:56:54 executing program 1: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000002, 0x200000005c831, 0xffffffffffffffff, 0x0) mlockall(0x1) mbind(&(0x7f00003b5000/0x800000)=nil, 0x801100, 0x0, 0x0, 0x0, 0x2) 03:56:54 executing program 0: set_mempolicy(0x3, &(0x7f0000000040)=0x80000001, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}, 0x0, 0x2, [{{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @multicast1}}]}, 0x190) 03:56:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32}, [], {0x14}}, 0x28}}, 0x0) 03:56:54 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x6, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {0x0, 0x0, 0x1}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x2b, &(0x7f0000001340)="c4c691019919da078a0098d1e0a59320ff79b040f762910016775a8454cc16dc38f06ee04fa4ea57ff22ea"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 03:56:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={{0x14, 0x32}, [], {0x14}}, 0x28}}, 0x0) [ 284.333967][T15463] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 03:56:55 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="4401000010000100000021ed45a900000000000000009d6dee21f473626d00000000000000000000000000000000290000002000"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fc000000000000000000000000000000000000006c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a0000000000000000000000480003"], 0x144}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x80000010009, 0x0) 03:56:55 executing program 0: r0 = syz_io_uring_setup(0x70c4, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000400000/0xc00000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0xa89a1c1bd660819, 0x0, 0x0, 0x0, &(0x7f0000000140)}, 0x0) r3 = dup(r0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000080)=@IORING_OP_READ=@pass_buffer={0x16, 0x5, 0x0, @fd, 0x0, 0x0}, 0xff) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_enter(r3, 0x6708, 0x0, 0x0, 0x0, 0x0) 03:56:55 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="44010000000101"], 0x144}}, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x3020) 03:56:55 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\xff\x00l\x1e\xa00x0, &(0x7f0000000000)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0xa89a1c1bd660819, 0x0, 0x0, 0x0, &(0x7f0000000140)}, 0x0) r3 = dup(r0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000080)=@IORING_OP_READ=@pass_buffer={0x16, 0x5, 0x0, @fd, 0x0, 0x0}, 0xff) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_enter(r3, 0x6708, 0x0, 0x0, 0x0, 0x0) [ 285.115325][ T25] audit: type=1400 audit(1621915015.057:451): avc: denied { module_load } for pid=15481 comm="syz-executor.3" path=2F6D656D66643AFF202864656C6574656429 dev="hugetlbfs" ino=36385 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:hugetlbfs_t:s0 tclass=system permissive=1 [ 285.143743][T15489] netlink: 304 bytes leftover after parsing attributes in process `syz-executor.4'. [ 285.145138][T15484] Module has invalid ELF structures 03:56:55 executing program 2: set_mempolicy(0x1, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0x30000004}) [ 285.164418][T15489] netlink: 304 bytes leftover after parsing attributes in process `syz-executor.4'. [ 285.183353][T15497] Module has invalid ELF structures 03:56:55 executing program 4: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa40000ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) clone(0x0, &(0x7f0000000080)="7f2bf77e2fbeff4f63d2b0e328b0b79291798aeafb7152a2f637ba64c754cef5fe3d63d3079f00000000", 0x0, 0x0, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x10b, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x10) 03:56:55 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8d, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) r1 = gettid() r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/238, 0xee) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000300)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc0505350, &(0x7f0000000180)={{0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r2, 0x40505331, &(0x7f00000003c0)) tkill(r1, 0x7) 03:56:55 executing program 0: r0 = syz_io_uring_setup(0x70c4, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000400000/0xc00000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0xa89a1c1bd660819, 0x0, 0x0, 0x0, &(0x7f0000000140)}, 0x0) r3 = dup(r0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000080)=@IORING_OP_READ=@pass_buffer={0x16, 0x5, 0x0, @fd, 0x0, 0x0}, 0xff) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_enter(r3, 0x6708, 0x0, 0x0, 0x0, 0x0) [ 285.213584][T15500] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 03:56:55 executing program 0: r0 = syz_io_uring_setup(0x70c4, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000400000/0xc00000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0xa89a1c1bd660819, 0x0, 0x0, 0x0, &(0x7f0000000140)}, 0x0) r3 = dup(r0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000080)=@IORING_OP_READ=@pass_buffer={0x16, 0x5, 0x0, @fd, 0x0, 0x0}, 0xff) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_enter(r3, 0x6708, 0x0, 0x0, 0x0, 0x0) [ 285.252808][ T25] audit: type=1400 audit(1621915015.197:452): avc: denied { block_suspend } for pid=15502 comm="syz-executor.2" capability=36 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 03:56:55 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="4401000010000100000021ed45a900000000000000009d6dee21f473626d00000000000000000000000000000000290000002000"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fc000000000000000000000000000000000000006c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a0000000000000000000000480003"], 0x144}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x80000010009, 0x0) 03:56:55 executing program 2: clone(0x66000d00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:56:55 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f00000004c0), 0x0, 0x0) clone(0x8100, 0x0, 0x0, 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x4018920a, &(0x7f0000000140)={0x0, 0x0}) 03:56:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000100)=[{0x80}, {0x30}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000001e00), 0x3fffffffffffe36, 0x0) 03:56:55 executing program 1: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000002, 0x200000005c831, 0xffffffffffffffff, 0x0) mlockall(0x1) mbind(&(0x7f00003b5000/0x800000)=nil, 0x801100, 0x0, 0x0, 0x0, 0x2) 03:56:55 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8d, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) r1 = gettid() r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/238, 0xee) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000300)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc0505350, &(0x7f0000000180)={{0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r2, 0x40505331, &(0x7f00000003c0)) tkill(r1, 0x7) 03:56:55 executing program 2: r0 = syz_io_uring_setup(0x187, &(0x7f0000000200), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000033000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CLOSE={0x13, 0x4}, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) syz_io_uring_submit(r1, r2, &(0x7f0000000680)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={0x0, r3+10000000}}, 0x4004) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) 03:56:55 executing program 4: open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r0 = syz_io_uring_setup(0x2de5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x2007, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) 03:56:55 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000000c0)="a2e699f9", 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) bind$packet(r0, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_aout(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2981"], 0xa54a) 03:56:56 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x11c, &(0x7f00000002c0)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x36) 03:56:56 executing program 0: set_mempolicy(0x1, &(0x7f0000000180)=0x100000001, 0x7) syz_open_dev$tty20(0xc, 0x4, 0x1) 03:56:56 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$SO_COOKIE(r1, 0x1, 0x38, 0x0, &(0x7f0000004040)) [ 286.076117][T15578] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 03:56:56 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="4401000010000100000021ed45a900000000000000009d6dee21f473626d00000000000000000000000000000000290000002000"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fc000000000000000000000000000000000000006c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a0000000000000000000000480003"], 0x144}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x80000010009, 0x0) 03:56:56 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r3, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff7f, 0x0, 0x0, 0x0) recvfrom$inet6(r3, &(0x7f0000000000)=""/47, 0xffffffab, 0x0, 0x0, 0x14) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000000)="480500001400", 0x6}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x200000000e26a, 0x0) 03:56:56 executing program 0: prlimit64(0x0, 0x9, &(0x7f0000000040), 0x0) mremap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000, 0x7, &(0x7f0000fff000/0x1000)=nil) 03:56:56 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8d, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) r1 = gettid() r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/238, 0xee) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000300)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc0505350, &(0x7f0000000180)={{0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r2, 0x40505331, &(0x7f00000003c0)) tkill(r1, 0x7) 03:56:56 executing program 1: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000002, 0x200000005c831, 0xffffffffffffffff, 0x0) mlockall(0x1) mbind(&(0x7f00003b5000/0x800000)=nil, 0x801100, 0x0, 0x0, 0x0, 0x2) 03:56:56 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x11c, &(0x7f00000002c0)="08ac20080dd966953b67480f3a62007c4fab98a907010100d6eca02cdc108ce69afe31c026d5190eb8a104ce5f19cd2ed75fcd792d92ad8696ca0688b72e34c4504ebda2000000000000003305603895940fd837a00b5901f87c656f6f8e7b11f24ca0a35332dc5bd3da36595c2715ccc2fd056f2d6f0730fd8eb8d20f26321594a7353c7862d40622b2872bbd8e486e5703202cb615bf15b04e67a2029422c4c100b8fff984be125eb48a2283c62466e7d6777460be4f428fa7f1709c9b9c68b53793fe9f6756173ce126393992ad1bb4dddacfbba7bbd484d77c1f37e98bc4961aa5d1e28436574c175e062e15dd69d036c7e1a5728df2c38d851134e724b8cf2906bda19f6f6f96c13c99006749e202e1b9dc45c62da54b1f4b89"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x36) 03:56:56 executing program 0: set_mempolicy(0x3, &(0x7f0000000000)=0x8001, 0x43ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x3, 0x1, 0x101, 0x0, 0x0, {0xc}}, 0x14}}, 0x0) 03:56:56 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x11c, &(0x7f00000002c0)="08ac20080dd966953b67480f3a62007c4fab98a907010100d6eca02cdc108ce69afe31c026d5190eb8a104ce5f19cd2ed75fcd792d92ad8696ca0688b72e34c4504ebda2000000000000003305603895940fd837a00b5901f87c656f6f8e7b11f24ca0a35332dc5bd3da36595c2715ccc2fd056f2d6f0730fd8eb8d20f26321594a7353c7862d40622b2872bbd8e486e5703202cb615bf15b04e67a2029422c4c100b8fff984be125eb48a2283c62466e7d6777460be4f428fa7f1709c9b9c68b53793fe9f6756173ce126393992ad1bb4dddacfbba7bbd484d77c1f37e98bc4961aa5d1e28436574c175e062e15dd69d036c7e1a5728df2c38d851134e724b8cf2906bda19f6f6f96c13c99006749e202e1b9dc45c62da54b1f4b89"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x36) 03:56:56 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x11c, &(0x7f00000002c0)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x36) 03:56:56 executing program 0: r0 = io_uring_setup(0x4024, &(0x7f0000000000)) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/slabinfo\x00', 0x0, 0x0) poll(&(0x7f0000000200)=[{r0}, {r1}], 0x2, 0x3) [ 286.940472][T15627] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 286.948114][T15629] netlink: 1120 bytes leftover after parsing attributes in process `syz-executor.2'. 03:56:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket(0x2, 0x803, 0xff) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x41, &(0x7f0000000080)=0x4b6, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) r3 = dup(r2) sendfile(r3, r1, 0x0, 0x4000000000000081) 03:56:57 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa6000800000000000000024000ffffff81000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:56:57 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="66530700ae897094e71b0fa1f107000000364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb298802d8f6c1f3b18d6d352507f7018b31a53bad323b0a40d8e1935b25081ec3533c791a753a1fef2c", 0x6e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x3) [ 287.081019][T15651] loop0: detected capacity change from 0 to 1 [ 287.125264][T15651] loop0: p1 p2 p3 p4 [ 287.136391][T15651] loop0: p1 start 10 is beyond EOD, truncated [ 287.142601][T15651] loop0: p2 size 1073872896 extends beyond EOD, truncated [ 287.157809][T15651] loop0: p3 start 225 is beyond EOD, truncated [ 287.164104][T15651] loop0: p4 size 3657465856 extends beyond EOD, truncated 03:56:57 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(r0, 0x4b4e, 0x0) 03:56:57 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r3, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff7f, 0x0, 0x0, 0x0) recvfrom$inet6(r3, &(0x7f0000000000)=""/47, 0xffffffab, 0x0, 0x0, 0x14) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000000)="480500001400", 0x6}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x200000000e26a, 0x0) 03:56:57 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)={0x4000000c}) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) 03:56:57 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8d, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) r1 = gettid() r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/238, 0xee) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000300)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc0505350, &(0x7f0000000180)={{0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r2, 0x40505331, &(0x7f00000003c0)) tkill(r1, 0x7) 03:56:57 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000080), 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x1000}, 0x4) r3 = socket$inet_udp(0x2, 0x2, 0x0) socket(0x0, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000200)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x2ffff, 0x0) 03:56:57 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, "00d9db170eb48b238bce520d760ab3d25b03a83a0ead903e65c133ec7e56ab210e7c71a5f0f147387a2725492114384b2d4ac0a0548f384d1fd21ef56efd9d69"}, 0x48, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f00000001c0)={r0}, &(0x7f0000000200)=ANY=[], 0x0, 0x0) clone(0x4000, &(0x7f00000005c0), 0x0, 0x0, 0x0) 03:56:57 executing program 0: r0 = socket$inet(0x2, 0x3, 0x8) setsockopt$inet_int(r0, 0x0, 0x2, &(0x7f0000000000)=0x4, 0x4) sendmsg$inet(r0, &(0x7f0000000600)={&(0x7f0000000100)={0x2, 0x0, @empty}, 0x10, 0x0}, 0x0) 03:56:57 executing program 0: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000380)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000180)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000280)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000000c0)={[{@map_off}]}) open_tree(r0, &(0x7f0000000140)='./file1\x00', 0x0) 03:56:57 executing program 1: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000000)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) 03:56:57 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) vmsplice(r0, &(0x7f00000002c0)=[{0x0, 0xf0ff7f00000000}], 0x1, 0x0) 03:56:57 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000000)=0x81, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @empty}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) 03:56:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="66530700ae897094e71b0fa1f147a8378f364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb298802d8f6c1f3b18d6d352507f7018b31a53bad1ec3533c791a753a1fef2c560001000000000000fb8005128e7e4d939955f8ac396203784000400f573fbf000000000000000761f35e959f130dec95128ce7ec033dc0a3", 0x9d}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x1e) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 03:56:57 executing program 5: r0 = socket(0x10, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000080)={0x7ff}, 0x3f4) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000000400000000", 0x32) [ 287.803194][T15699] loop0: detected capacity change from 0 to 224 [ 287.820864][T15708] netlink: 1120 bytes leftover after parsing attributes in process `syz-executor.2'. 03:56:58 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r3, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff7f, 0x0, 0x0, 0x0) recvfrom$inet6(r3, &(0x7f0000000000)=""/47, 0xffffffab, 0x0, 0x0, 0x14) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000000)="480500001400", 0x6}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x200000000e26a, 0x0) 03:56:58 executing program 1: syz_mount_image$tmpfs(&(0x7f00000020c0), &(0x7f0000002100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002440)) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1101430, &(0x7f0000000580)=ANY=[]) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x21, &(0x7f00000004c0)) 03:56:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet(0x2, 0x3, 0x2) getsockopt(r2, 0x0, 0xce, &(0x7f00000012c0)=""/203, &(0x7f0000000040)=0xcb) 03:56:58 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x33, &(0x7f00000002c0)) 03:56:58 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='tmpfs\x00', 0xa08007, 0x0) mount_setattr(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000180)={0x9}, 0x20) 03:56:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x9, &(0x7f0000000040)=0xa, 0x4) getsockopt$inet_tcp_int(r1, 0x6, 0x9, 0x0, &(0x7f0000d12ffc)) 03:56:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000000)={'nat\x00', 0x1000014e, [{}, {}, {}]}, 0x58) 03:56:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet(0x2, 0x3, 0x2) getsockopt(r2, 0x0, 0xce, &(0x7f00000012c0)=""/203, &(0x7f0000000040)=0xcb) 03:56:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x6b52, &(0x7f0000000240)={0x0, 0x0, 0x1}, &(0x7f0000000000/0x11000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000040)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x10c, &(0x7f0000000180), 0x0, 0x4) io_uring_enter(r1, 0x6417, 0x0, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, 0x0, 0x8000880) io_uring_enter(r1, 0x0, 0x0, 0x1, 0x0, 0x0) 03:56:58 executing program 1: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x4000}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x24, 0x16, 0xd785ab268586148d, 0x0, 0x0, {0xa}, [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x9, 0x0, 0x0, @str=']nodev{\x00'}]}]}, 0x24}}, 0x0) 03:56:58 executing program 0: r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) write$9p(r0, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db8d2db7f5c76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706", 0x200) lsetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="73656375726974792e8fbd12aeeb858819ec07"], 0x0, 0x0, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000) 03:56:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$system_posix_acl(r0, 0x0, 0x0, 0x0, 0x4) [ 288.763448][T15779] netlink: 1120 bytes leftover after parsing attributes in process `syz-executor.2'. 03:56:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet(0x2, 0x3, 0x2) getsockopt(r2, 0x0, 0xce, &(0x7f00000012c0)=""/203, &(0x7f0000000040)=0xcb) 03:56:59 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000bc0)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0xb8}}, 0x0) 03:56:59 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x105}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 03:56:59 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x1, 0x42300) fcntl$setstatus(r0, 0x4, 0x0) 03:56:59 executing program 1: futex(&(0x7f0000000000), 0x5, 0x0, 0x0, &(0x7f0000000140), 0xb3000001) 03:56:59 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r3, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff7f, 0x0, 0x0, 0x0) recvfrom$inet6(r3, &(0x7f0000000000)=""/47, 0xffffffab, 0x0, 0x0, 0x14) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000000)="480500001400", 0x6}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x200000000e26a, 0x0) 03:56:59 executing program 1: unshare(0x40000400) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201) ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201) 03:56:59 executing program 3: unshare(0x20000600) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000001480), 0x4) 03:56:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet(0x2, 0x3, 0x2) getsockopt(r2, 0x0, 0xce, &(0x7f00000012c0)=""/203, &(0x7f0000000040)=0xcb) 03:56:59 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000bc0)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0xb8}}, 0x0) 03:56:59 executing program 4: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000180)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x14b, &(0x7f00000002c0)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:56:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001d40)=[{&(0x7f0000000140)={0x18, 0x12, 0x592a34b9b76d5a51, 0x0, 0x0, "", [@nested={0x7, 0x0, 0x0, 0x1, [@generic="b85b6d"]}]}, 0x18}], 0x1}, 0x0) 03:56:59 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000bc0)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0xb8}}, 0x0) [ 289.592787][T15817] netlink: 1120 bytes leftover after parsing attributes in process `syz-executor.2'. [ 289.626756][T15830] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 03:57:00 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f0000000180)="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") 03:57:00 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@rand_addr=' \x01\x00'}, {@in6=@mcast2, 0x0, 0x32}, @in6=@rand_addr=' \x01\x00', {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in=@multicast1}}]}, 0x154}}, 0x0) 03:57:00 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x7e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x100000005) 03:57:00 executing program 4: r0 = syz_io_uring_setup(0x667a, &(0x7f0000001140), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000011c0), &(0x7f0000001200)) io_uring_setup(0x3fc3, &(0x7f0000000080)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, r0}) 03:57:00 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000bc0)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0xb8}}, 0x0) 03:57:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/netlink\x00') preadv(r2, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x9, 0x0) 03:57:00 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f0000000180)="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") 03:57:00 executing program 0: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="260000002200470508d258002b1f00eb0101c7033500b000"/38, 0x26) setsockopt$sock_int(r0, 0x1, 0x20800000000008, &(0x7f0000000280), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000040)={0x20000000, 0x4000000000003, 0x2, @tid=0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f00000000c0)=0x48e5, 0x4) 03:57:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) unshare(0x40200) 03:57:00 executing program 2: syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCGPGRP(r0, 0x560a, &(0x7f00000000c0)) 03:57:00 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/cgroups\x00', 0x0, 0x0) 03:57:00 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) 03:57:00 executing program 4: futex(&(0x7f0000000000), 0x5, 0x0, 0x0, &(0x7f0000000040), 0x80000003) 03:57:00 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f0000000180)="acb8cbbd55f6d543807328e8276cdba4ef5258290b09b82b2e8bf38fdcf7a432546cbc1d7e79d350aad26528d7d56b9949dbc8490f91a65e48c4d5fd577c23a3c445ec2cb6dfea0039dd06bde5bf03fa13b76af0577deb206312e0e876b63d7f7000f53d5cf36889af5daa2c9f2934f83d6ca2a3d1444aaa72431a49d0fd4c8ef6f5fd32185880eff629060d80bfba09f8e0f84a476fe7418e2c06258ff8d0f4d7137310658f48e2412baa25c3a71696c6473c91b4b11cc9e22b12789f7aa3d132f9575cfab302ecd6e2fa302873d8370e312735f1712f2af0b697a43c02fb4b2ce968e8e28e57ba1580f7c7e359866a5d6cbdb17bc53ff965d71c6b6b952592") 03:57:00 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_io_uring_setup(0x15b4, &(0x7f0000000040), &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f00000002c0)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) r4 = syz_io_uring_setup(0x15b4, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r4, 0x15a9, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r1, 0x6deb, 0x0, 0x0, 0x0, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "8003e581b62e7c18"}) 03:57:00 executing program 2: socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) 03:57:00 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) 03:57:00 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f0000000180)="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") 03:57:00 executing program 4: futex(&(0x7f0000000000), 0x5, 0x0, 0x0, &(0x7f0000000040), 0x80000003) 03:57:01 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendmsg$netlink(r0, &(0x7f0000001f40)={0x0, 0x0, &(0x7f0000001ec0)=[{&(0x7f0000000040)=ANY=[@ANYBLOB="280000006d000100020000000000000008000000", @ANYRES32, @ANYBLOB="0600000024000000080003"], 0x28}], 0x1}, 0x0) 03:57:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, "80000002c76060e500"}) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="805c817324c68eca99b1ad815fbd4f47f53a533022fe756358ee98d519b791c6326fe682a2d5ffa68a564fbe2ff8ab70762abe4e3ce2e5e21e667d1a35f6c9cf18ddaa4210d23a8205acdf711b1155435a00e3d8310e3d7dda6055dd8d90707780c22092a8267609f2e519b7081d83e452f2b910f716fbf016ff0922a63970b1ba6b0f499886758d408a394e16"], 0x8d) ioctl$TCSETA(r1, 0x5406, &(0x7f00000004c0)={0xfff9, 0x0, 0x0, 0xbffa, 0x0, "078cf0251c0e00"}) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "000000000000000000090010000000001000"}) 03:57:01 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) unshare(0x40600) pwrite64(r1, &(0x7f0000000180)="aa", 0x1, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000080)={0x2, 0x0, 0x0, 0x6}) 03:57:01 executing program 4: futex(&(0x7f0000000000), 0x5, 0x0, 0x0, &(0x7f0000000040), 0x80000003) 03:57:01 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) 03:57:01 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_io_uring_setup(0x15b4, &(0x7f0000000040), &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f00000002c0)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) r4 = syz_io_uring_setup(0x15b4, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r4, 0x15a9, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r1, 0x6deb, 0x0, 0x0, 0x0, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "8003e581b62e7c18"}) 03:57:01 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@loopback}, 0x20) 03:57:01 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_io_uring_setup(0x15b4, &(0x7f0000000040), &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f00000002c0)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) r4 = syz_io_uring_setup(0x15b4, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r4, 0x15a9, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r1, 0x6deb, 0x0, 0x0, 0x0, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "8003e581b62e7c18"}) 03:57:01 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffffdc1}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) eventfd(0x0) 03:57:01 executing program 4: futex(&(0x7f0000000000), 0x5, 0x0, 0x0, &(0x7f0000000040), 0x80000003) 03:57:01 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) 03:57:01 executing program 4: clone(0x1000500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="66530700ae897094e71b0fa1f107000000364603812c66538d750f6ee1d001f43f05f2d1eaa3", 0x26}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) tkill(r0, 0x4) ptrace$cont(0x9, r0, 0x0, 0x4) 03:57:01 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d0a0b49ff70880000800328000400010001010200bc71176a36ede498534108e58342fa94a235a2a441f9", 0xfcae) 03:57:01 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x16}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000000)) 03:57:01 executing program 1: syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[]) 03:57:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0xc, &(0x7f0000000640)=0x4, 0x4) sendmsg$netlink(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000680)={0x2c, 0x12, 0x1, 0x0, 0x0, "", [@nested={0x10, 0x0, 0x0, 0x0, [@typed={0xc, 0x0, 0x0, 0x0, @u64}]}, @typed={0xc, 0x2, 0x0, 0x0, @u64}]}, 0x2c}], 0x1}, 0x0) 03:57:01 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_io_uring_setup(0x15b4, &(0x7f0000000040), &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f00000002c0)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) r4 = syz_io_uring_setup(0x15b4, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r4, 0x15a9, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r1, 0x6deb, 0x0, 0x0, 0x0, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "8003e581b62e7c18"}) [ 291.497626][T15950] syz-executor.4 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 291.509153][T15955] netlink: 4864 bytes leftover after parsing attributes in process `syz-executor.2'. [ 291.523401][ T25] audit: type=1326 audit(1621915021.468:453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15949 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 03:57:01 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x4, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000002c0)={0x1, 0x0, 0x11, &(0x7f0000000200)="7957905986aa656188da3705714f19d30e"}) 03:57:01 executing program 4: r0 = epoll_create(0x1) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) r2 = epoll_create(0x1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000000)={0x30000000}) r4 = dup(r0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r4, &(0x7f0000000080)={0x60000001}) 03:57:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)="3900000013000f0468fe0700000000000000ff3f02000000480100010000000019002b000a0001000000000000007200248f0a0f2473a0ac8e", 0x39}], 0x1) [ 291.527247][T15965] loop1: detected capacity change from 0 to 264192 03:57:01 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000000)={{0xe, 0x9b, 0x8, 0x7, 0x0, 0x0, 0x0, 0x37, 0x465, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 03:57:01 executing program 5: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x8d, 0x4000000090}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x8}, 0x0) r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r0, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) connect$netlink(r0, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:57:01 executing program 0: io_setup(0x2, &(0x7f0000000100)=0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001ac0), 0x0, 0x0) r2 = eventfd(0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x7, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1, r2}]) 03:57:01 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000100)="8e0e9b4b", 0x4}], 0x1) 03:57:01 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='[\xdbX\xae[\x1a\xa9\xfd\xfe\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x90\x93\x12l\xb6Z\x95\xab\x00{\xe9\xc2Y\xd1c\x81\x9eG\xf9,\xe2\xc6a\x8b\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x8a\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf3:\x99\x1e\xac`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\x95\xd2q#\xc6\xca\x97!*\x886Ka\x13\xf9\x0fSe\x9c.\xf1\xcd\xd7\xdf< K\\\xb7\xa0\xfbf', 0x1) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='#!'], 0x9) execveat(r0, &(0x7f0000000240)='\x00', 0x0, 0x0, 0x1000) [ 291.675303][T15994] device sit0 entered promiscuous mode [ 291.681279][T15994] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 291.689384][T15994] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.2'. 03:57:02 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20802) ioctl$SCSI_IOCTL_SYNC(r0, 0x541b) 03:57:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)="3900000013000f0468fe0700000000000000ff3f02000000480100010000000019002b000a0001000000000000007200248f0a0f2473a0ac8e", 0x39}], 0x1) 03:57:02 executing program 4: clone(0x2000000080204500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000000)) ptrace(0x10, r0) ptrace$poke(0x1, r0, &(0x7f0000000080), 0x544000) 03:57:02 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c02, &(0x7f0000000080)) 03:57:02 executing program 5: getpriority(0x1, 0xffffffffffffffff) 03:57:02 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prctl$PR_SET_MM_EXE_FILE(0x25, 0x20000000, 0xffffffffffffffff) [ 292.328748][ T25] audit: type=1326 audit(1621915022.268:454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15949 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 03:57:02 executing program 1: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000018940)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 03:57:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xa1, &(0x7f00000000c0)={[{@mode}]}) 03:57:02 executing program 3: r0 = semget$private(0x0, 0x1, 0x0) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000000)=""/206) 03:57:02 executing program 1: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000018940)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 03:57:02 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="755cd8e8649b0e9b08073136003b5d"], 0x40) [ 292.425803][T16018] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 292.433906][T16018] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.2'. 03:57:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)="3900000013000f0468fe0700000000000000ff3f02000000480100010000000019002b000a0001000000000000007200248f0a0f2473a0ac8e", 0x39}], 0x1) 03:57:02 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, 0x13, 0x1}, 0x14}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 03:57:02 executing program 1: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000018940)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) [ 292.553046][T16051] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 292.561161][T16051] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.2'. 03:57:03 executing program 4: futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000)=0x2b52, 0x0) 03:57:03 executing program 0: prctl$PR_SET_MM_AUXV(0x35, 0xc, &(0x7f0000000200)="c9", 0x1) 03:57:03 executing program 5: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x8) setsockopt$sock_timeval(r1, 0x1, 0x43, &(0x7f0000000180)={0x77359400}, 0x10) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) dup2(r1, r0) 03:57:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)="3900000013000f0468fe0700000000000000ff3f02000000480100010000000019002b000a0001000000000000007200248f0a0f2473a0ac8e", 0x39}], 0x1) 03:57:03 executing program 1: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000018940)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 03:57:03 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="b06f21ffec3f96a4ca0535"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 03:57:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000040)=0x2, 0x4) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) 03:57:03 executing program 0: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='map=off']) [ 293.278082][T16068] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 293.286183][T16068] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.2'. 03:57:03 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_adj\x00') pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000140)='y', 0x1}], 0x1, 0x0, 0x0, 0x12) 03:57:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001580)={0x34, 0x0, 0x2, 0x401, 0x0, 0x0, {0x2}, [@CTA_EXPECT_TUPLE={0x18, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}]}, @CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_MASTER={0x4}]}, 0x34}}, 0x0) 03:57:03 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)) fchmodat(0xffffffffffffff9c, &(0x7f0000000780)='./file0\x00', 0x0) 03:57:03 executing program 0: syz_mount_image$msdos(&(0x7f0000000a80), &(0x7f0000000ac0)='./file0\x00', 0x0, 0x0, &(0x7f0000001c00), 0x0, &(0x7f0000001c40)={[{@fat=@uid={'uid', 0x3d, 0xffffffffffffffff}, 0x31}]}) [ 293.381138][T16093] ISOFS: Unable to identify CD-ROM format. [ 293.448693][T16109] FAT-fs (loop0): bogus number of reserved sectors [ 293.455243][T16109] FAT-fs (loop0): Can't find a valid FAT filesystem [ 293.492749][T16109] FAT-fs (loop0): bogus number of reserved sectors [ 293.499283][T16109] FAT-fs (loop0): Can't find a valid FAT filesystem 03:57:04 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000003700), 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x7001, 0x0) 03:57:04 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_adj\x00') pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000140)='y', 0x1}], 0x1, 0x0, 0x0, 0x12) 03:57:04 executing program 3: mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000003000/0x1000)=nil) setrlimit(0x9, &(0x7f0000000000)) mremap(&(0x7f0000250000/0x4000)=nil, 0x4000, 0x3000, 0x0, &(0x7f0000008000/0x3000)=nil) syz_io_uring_setup(0x2757, &(0x7f0000000040), &(0x7f0000004000/0x2000)=nil, &(0x7f0000253000/0x1000)=nil, &(0x7f00000003c0), &(0x7f0000000400)) 03:57:04 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x5452, &(0x7f0000000240)={'sit0\x00'}) syz_genetlink_get_family_id$team(&(0x7f0000000040), r0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_GET(r0, &(0x7f0000006f00)={0x0, 0x0, &(0x7f0000006ec0)={&(0x7f0000006e80)={0x20, r1, 0x711, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x20}}, 0x0) 03:57:04 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001a40)="66530700ae897094e7b126b097eaa769be6d28c41bd34e677d114b655ef5f0166391c68f70e44e260f82e8a9bfc92b1055f69a37237647e947e4df739526ecbb3987b178b1ead5a678216d5d3568dab9af7a4d5cc06f3eb349fd086c22e3fc56d2b0cae5170871c145045174ad6edb6b0a183dd660ef94af2121945b0d79bb5efadeaad6ea", 0x85}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x18) 03:57:06 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000022c0)={0x2c, r1, 0x1, 0x0, 0x0, {0xa}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}]}]}, 0x2c}}, 0x0) 03:57:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_adj\x00') pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000140)='y', 0x1}], 0x1, 0x0, 0x0, 0x12) 03:57:06 executing program 3: unshare(0x42020000) unshare(0x42000000) 03:57:06 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x2007fff) sendfile(r0, r3, 0x0, 0x201000) 03:57:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setrlimit(0x0, &(0x7f0000000040)={0x7fffffff}) 03:57:06 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000000c0)="a2e619f9", 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="040428009dfd6dc139dcff03d5cb6c182f0c53581167ba1c962c393d5aa0ec94dbf38d39f874a8f4763f442b7918d77f272c55"], 0xfdef) 03:57:06 executing program 5: socket$packet(0x11, 0x0, 0x300) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r1, 0x107, 0xf, &(0x7f00000001c0)="a2e6999b", 0x4) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r1, &(0x7f00000003c0)={{0x102, 0x0, 0x0, 0x17, 0x0, 0x0, 0x0, 0x0, 0x5865, 0x4}, "ee0605000000ffff06000000b93f97020000008b8e03c76ce2", ['\x00']}, 0x139) 03:57:06 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) 03:57:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_adj\x00') pwritev2(r0, &(0x7f00000003c0)=[{&(0x7f0000000140)='y', 0x1}], 0x1, 0x0, 0x0, 0x12) 03:57:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x4d, 0x2}, @cond}) r1 = syz_open_dev$evdev(&(0x7f00000000c0), 0x2, 0x822b01) write$char_usb(r1, &(0x7f0000000040)="e2", 0x990) 03:57:06 executing program 3: unshare(0x42020000) unshare(0x42000000) 03:57:06 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r3, 0x0) preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_user}], [], 0x6b}}) [ 296.442075][T16184] loop0: detected capacity change from 0 to 4096 03:57:06 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000040)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid}, {@dfltuid={'dfltuid', 0x3d, 0xffffffffffffffff}}, {@mmap}], [], 0x6b}}) 03:57:06 executing program 5: socket$packet(0x11, 0x0, 0x300) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r1, 0x107, 0xf, &(0x7f00000001c0)="a2e6999b", 0x4) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r1, &(0x7f00000003c0)={{0x102, 0x0, 0x0, 0x17, 0x0, 0x0, 0x0, 0x0, 0x5865, 0x4}, "ee0605000000ffff06000000b93f97020000008b8e03c76ce2", ['\x00']}, 0x139) 03:57:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x4d, 0x2}, @cond}) r1 = syz_open_dev$evdev(&(0x7f00000000c0), 0x2, 0x822b01) write$char_usb(r1, &(0x7f0000000040)="e2", 0x990) 03:57:06 executing program 3: unshare(0x42020000) unshare(0x42000000) 03:57:06 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r1) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, 0x0, 0x0) [ 296.526881][T16184] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 03:57:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x4d, 0x2}, @cond}) r1 = syz_open_dev$evdev(&(0x7f00000000c0), 0x2, 0x822b01) write$char_usb(r1, &(0x7f0000000040)="e2", 0x990) 03:57:06 executing program 5: socket$packet(0x11, 0x0, 0x300) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r1, 0x107, 0xf, &(0x7f00000001c0)="a2e6999b", 0x4) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r1, &(0x7f00000003c0)={{0x102, 0x0, 0x0, 0x17, 0x0, 0x0, 0x0, 0x0, 0x5865, 0x4}, "ee0605000000ffff06000000b93f97020000008b8e03c76ce2", ['\x00']}, 0x139) 03:57:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mremap(&(0x7f000004b000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f000021d000/0x2000)=nil) 03:57:06 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r3, 0x0) preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_user}], [], 0x6b}}) 03:57:06 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)='fS\a\x00', 0x4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) waitid(0x0, 0x0, 0x0, 0x4, 0x0) exit_group(0x0) 03:57:06 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r3, 0x0) preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_user}], [], 0x6b}}) 03:57:06 executing program 5: socket$packet(0x11, 0x0, 0x300) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r1, 0x107, 0xf, &(0x7f00000001c0)="a2e6999b", 0x4) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r1, &(0x7f00000003c0)={{0x102, 0x0, 0x0, 0x17, 0x0, 0x0, 0x0, 0x0, 0x5865, 0x4}, "ee0605000000ffff06000000b93f97020000008b8e03c76ce2", ['\x00']}, 0x139) 03:57:06 executing program 3: unshare(0x42020000) unshare(0x42000000) 03:57:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000180)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x4d, 0x2}, @cond}) r1 = syz_open_dev$evdev(&(0x7f00000000c0), 0x2, 0x822b01) write$char_usb(r1, &(0x7f0000000040)="e2", 0x990) 03:57:06 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae897094e7b126b097eaa769be6d28c41bd34e677d114b655ef5f0166391c68f72e44e260f82e8a9bfc92b1055f69a37237647e947e4df739526ecbb3987b178b1ead5a678216d5d3568dab9af7a4d5cc06f3eb349fd086c22e3fc56d2b0cae5170871c145045174ad6edb6b0a183dd660ef94af2121945b0d79bb5efadeaad6eaaf0ebc8ae15948eb13fe714f32449bb5e2bdfe6c86cc1d507694a8d504f1144634b26cafc25714cf7fdc166f16fa0d74cd1164f949d143aa7692731ed21fb541b7a2cc83eb76be0952aea033", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 03:57:06 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="b624e0010020e752396ca8"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 03:57:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x2) preadv(r0, 0x0, 0x0, 0x0, 0x0) 03:57:06 executing program 4: io_setup(0x7, &(0x7f0000000280)=0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) io_submit(r0, 0x1, &(0x7f0000000400)=[&(0x7f0000000040)={0xfffffffffffffdef, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) ppoll(&(0x7f0000000080)=[{r1}], 0x1, 0x0, 0x0, 0x0) signalfd(r1, &(0x7f0000000100), 0x8) signalfd(r1, &(0x7f0000000140), 0x8) 03:57:06 executing program 0: r0 = memfd_create(&(0x7f0000000040)='4\xacXrcO\x00\xc4ut\xaa^ve\xa5\xa1m\x1e\x12\x8ai,\xbeTnt#/', 0x0) write$binfmt_elf64(r0, &(0x7f0000000600)=ANY=[@ANYBLOB="7f454c46000000d2000000000001000003003e0000001000000006000000001e40000000000000000000000000008b000000001000003800020000000000000003"], 0x44) write$P9_RGETATTR(r0, &(0x7f0000000080)={0xa0, 0x19, 0x0, {0x0, {}, 0x125}}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 03:57:06 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r3, 0x0) preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_user}], [], 0x6b}}) 03:57:06 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) read$char_usb(r0, 0x0, 0xd9e1402c) 03:57:06 executing program 3: mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x42202, 0x0) splice(r0, 0x0, r2, 0x0, 0x100000000, 0x0) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) dup2(r3, r2) writev(r3, &(0x7f0000000640)=[{&(0x7f00000006c0)='_', 0x1}], 0x1) 03:57:06 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6(0xa, 0x801, 0x0) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f00000001c0)=0xfc, 0x4) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x43, 0xd9c, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r3 = open(&(0x7f0000000100)='./file0\x00', 0x143042, 0x0) ftruncate(r3, 0x2007fff) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x14}, 0x14}}, 0x0) sendfile(r0, r3, 0x0, 0x201000) 03:57:06 executing program 5: r0 = io_uring_setup(0x687c, &(0x7f0000000340)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)}], 0x1) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1) 03:57:06 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYBLOB="b06f97f8370a3b6e45202d"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 03:57:06 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x2343a726) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mmap(&(0x7f0000882000/0x4000)=nil, 0x4000, 0x1000010, 0x10, 0xffffffffffffffff, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 03:57:06 executing program 0: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000040)="1c0000001a009b8a14e5f4070009042400000000ff00000000000000", 0x5a) 03:57:06 executing program 5: mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4) mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mprotect(&(0x7f0000ff9000/0x7000)=nil, 0x7000, 0x6) 03:57:06 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6(0xa, 0x801, 0x0) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f00000001c0)=0xfc, 0x4) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x43, 0xd9c, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r3 = open(&(0x7f0000000100)='./file0\x00', 0x143042, 0x0) ftruncate(r3, 0x2007fff) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x14}, 0x14}}, 0x0) sendfile(r0, r3, 0x0, 0x201000) 03:57:07 executing program 4: syz_io_uring_setup(0x2ac1, &(0x7f0000000640)={0x0, 0x0, 0x4}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000006c0), &(0x7f0000000700)) 03:57:07 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0x80404518, 0x0) 03:57:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = epoll_create1(0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000000380)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r1, &(0x7f0000000080)={0x0, 0x97ffffff00000000}) 03:57:07 executing program 5: r0 = io_uring_setup(0x44d0, &(0x7f0000000180)) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x11, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001480)=""/60, 0x3c}], 0x1) 03:57:07 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6(0xa, 0x801, 0x0) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f00000001c0)=0xfc, 0x4) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x43, 0xd9c, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r3 = open(&(0x7f0000000100)='./file0\x00', 0x143042, 0x0) ftruncate(r3, 0x2007fff) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x14}, 0x14}}, 0x0) sendfile(r0, r3, 0x0, 0x201000) 03:57:07 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x2343a726) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mmap(&(0x7f0000882000/0x4000)=nil, 0x4000, 0x1000010, 0x10, 0xffffffffffffffff, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 03:57:07 executing program 0: perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000010100)="000000090000000000000000c20d000000000000000000b8017737c54836ecaaf8ffff00f0ff", 0x26, 0x1e0}, {&(0x7f0000000180)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000c1e770325132510000e770325103", 0x5b, 0x600}, {&(0x7f0000010500)="0d202020202020202020201000c1e770325132510000e7703251f1ff000000002e2e20202020202020282010", 0x2c, 0x10e00}], 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='check=strict,iocharset=cp437']) mknodat(r0, &(0x7f0000000080)='./file0/file1\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000040)='./file0/file1\x00', 0x400, 0xb15f) 03:57:07 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f00000001c0)='./file0\x00', 0xffc00807, 0x2, &(0x7f0000000240)=[{&(0x7f0000000000)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000280)={[{@dots}]}) 03:57:07 executing program 5: unshare(0x8000400) mkdir(0x0, 0x0) gettid() r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000003c0)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, 0x0, 0x5a0) sendto(r0, &(0x7f00000002c0)="ba0a9b494b243fcd643c4508461ec1550bf3de69463abda9ee", 0x19, 0x24008000, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c46ddae000000000000000000000000000000000000000004000000000000004000000000000000000000000000000000000000000038000000000000000000000000000000000000000000000000000000000000000000000000000000000000000410000000000000000000000000000000000000000080e071a64318642122f6b3c3b96d9742130b3f284271a1ddfe36d2f022a55d336b2f403d9012765f98177ba8a1bb9af67337f52db1f95cf8d854b45349bd3b529b74c161aac8"], 0x78) mount(0x0, &(0x7f0000000580)='./file0\x00', 0x0, 0x2000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000000), 0xa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000280)={'ip6gre0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth0_to_hsr\x00'}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 03:57:07 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x68, &(0x7f0000000000), 0x4) 03:57:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fsopen(&(0x7f0000000080)='bdev\x00', 0x0) 03:57:07 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:57:07 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6(0xa, 0x801, 0x0) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f00000001c0)=0xfc, 0x4) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x43, 0xd9c, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r3 = open(&(0x7f0000000100)='./file0\x00', 0x143042, 0x0) ftruncate(r3, 0x2007fff) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x14}, 0x14}}, 0x0) sendfile(r0, r3, 0x0, 0x201000) 03:57:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net\x00') getdents64(r1, &(0x7f0000000000)=""/147, 0x93) getdents64(r1, &(0x7f0000000240)=""/198, 0xc6) 03:57:07 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x29, 0x7, &(0x7f0000000040), 0x4) 03:57:07 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000080)={0xffffffff000, 0x3}) 03:57:07 executing program 5: unshare(0x8000400) mkdir(0x0, 0x0) gettid() r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000003c0)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, 0x0, 0x5a0) sendto(r0, &(0x7f00000002c0)="ba0a9b494b243fcd643c4508461ec1550bf3de69463abda9ee", 0x19, 0x24008000, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c46ddae000000000000000000000000000000000000000004000000000000004000000000000000000000000000000000000000000038000000000000000000000000000000000000000000000000000000000000000000000000000000000000000410000000000000000000000000000000000000000080e071a64318642122f6b3c3b96d9742130b3f284271a1ddfe36d2f022a55d336b2f403d9012765f98177ba8a1bb9af67337f52db1f95cf8d854b45349bd3b529b74c161aac8"], 0x78) mount(0x0, &(0x7f0000000580)='./file0\x00', 0x0, 0x2000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000000), 0xa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000280)={'ip6gre0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth0_to_hsr\x00'}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) [ 297.951403][T16388] loop3: detected capacity change from 0 to 264192 [ 297.968480][T16388] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:57:08 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x2343a726) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mmap(&(0x7f0000882000/0x4000)=nil, 0x4000, 0x1000010, 0x10, 0xffffffffffffffff, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 03:57:08 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000004fc0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x5) sendmmsg$unix(r1, &(0x7f00000bd000), 0x492492492492846, 0x0) ppoll(&(0x7f0000000080)=[{r1}], 0x1, 0x0, 0x0, 0x0) connect$unix(r0, &(0x7f00000002c0)=@file={0x0, './file0\x00'}, 0x6e) 03:57:08 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000002) 03:57:08 executing program 4: mlockall(0x1) fork() fork() mlockall(0x1) 03:57:08 executing program 2: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3a, 0x0, 0x0) 03:57:08 executing program 5: unshare(0x8000400) mkdir(0x0, 0x0) gettid() r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000003c0)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, 0x0, 0x5a0) sendto(r0, &(0x7f00000002c0)="ba0a9b494b243fcd643c4508461ec1550bf3de69463abda9ee", 0x19, 0x24008000, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c46ddae000000000000000000000000000000000000000004000000000000004000000000000000000000000000000000000000000038000000000000000000000000000000000000000000000000000000000000000000000000000000000000000410000000000000000000000000000000000000000080e071a64318642122f6b3c3b96d9742130b3f284271a1ddfe36d2f022a55d336b2f403d9012765f98177ba8a1bb9af67337f52db1f95cf8d854b45349bd3b529b74c161aac8"], 0x78) mount(0x0, &(0x7f0000000580)='./file0\x00', 0x0, 0x2000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000000), 0xa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000280)={'ip6gre0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth0_to_hsr\x00'}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 03:57:08 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000440)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x106e, 0x40}, [{}]}, 0x78) 03:57:08 executing program 2: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155cf0) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000740)=ANY=[], 0x1c) truncate(&(0x7f0000000040)='./bus\x00', 0x0) 03:57:08 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000002) 03:57:08 executing program 5: unshare(0x8000400) mkdir(0x0, 0x0) gettid() r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000003c0)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, 0x0, 0x5a0) sendto(r0, &(0x7f00000002c0)="ba0a9b494b243fcd643c4508461ec1550bf3de69463abda9ee", 0x19, 0x24008000, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c46ddae000000000000000000000000000000000000000004000000000000004000000000000000000000000000000000000000000038000000000000000000000000000000000000000000000000000000000000000000000000000000000000000410000000000000000000000000000000000000000080e071a64318642122f6b3c3b96d9742130b3f284271a1ddfe36d2f022a55d336b2f403d9012765f98177ba8a1bb9af67337f52db1f95cf8d854b45349bd3b529b74c161aac8"], 0x78) mount(0x0, &(0x7f0000000580)='./file0\x00', 0x0, 0x2000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000000), 0xa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000280)={'ip6gre0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth0_to_hsr\x00'}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 03:57:08 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x6) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000280)=0x59ee, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 03:57:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='.'], &(0x7f0000000140)='./file0\x00', 0x0, 0x201000, 0x0) chroot(&(0x7f00000000c0)='./file0/file0\x00') mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0/../file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00') 03:57:08 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x2343a726) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mmap(&(0x7f0000882000/0x4000)=nil, 0x4000, 0x1000010, 0x10, 0xffffffffffffffff, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 03:57:08 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x18bf02, 0x0) read$char_raw(r0, &(0x7f0000000200)={""/4477}, 0x1200) 03:57:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(r0, &(0x7f0000000f40)={0x2, 0x4e20, @multicast2}, 0x10) connect(r0, &(0x7f0000000000)=@un=@file={0x0, './file0\x00'}, 0x80) 03:57:08 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000002) 03:57:08 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x6) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000280)=0x59ee, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 03:57:08 executing program 1: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x560f, &(0x7f0000000100)) 03:57:08 executing program 4: r0 = fsopen(&(0x7f0000000000)='sockfs\x00', 0x0) fsmount(r0, 0x0, 0x0) 03:57:09 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000600), 0x10) 03:57:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r1, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) 03:57:09 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x24, r1, 0x17e7c6c974a05bd9, 0x0, 0x0, {{}, {@val={0x8, 0x11a}, @val={0x8}, @void}}}, 0x24}}, 0x0) 03:57:09 executing program 3: r0 = socket$inet6(0xa, 0x80803, 0x87) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in=@loopback, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x1}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x2b}, 0x0, @in6=@private1}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0), 0x1c) 03:57:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x3, &(0x7f0000000080), &(0x7f0000001140)=0x4) 03:57:09 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x6) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000280)=0x59ee, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 03:57:09 executing program 4: r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) [ 299.135717][T16526] netlink: 'syz-executor.5': attribute type 282 has an invalid length. 03:57:09 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) r2 = memfd_create(&(0x7f0000000200)='#\tP\x81\xcbXE\x00'/19, 0x0) dup3(r2, r1, 0x0) 03:57:09 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000002) 03:57:09 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000080)=0x5, 0x11) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8cffffff00000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:57:09 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000000d000/0x2000)=nil, 0xfffffffffffffe74, 0x1000, 0x0, &(0x7f0000007000/0x1000)=nil) [ 299.183609][T16526] netlink: 'syz-executor.5': attribute type 282 has an invalid length. 03:57:09 executing program 5: r0 = openat$ttyS3(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSF2(r0, 0x5407, &(0x7f0000000040)={0x0, 0xfdfdffff, 0x0, 0x0, 0x0, "f37e9d6894d280ad39858b18578a2cb0e46b53"}) 03:57:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:57:09 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x6) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000280)=0x59ee, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 03:57:09 executing program 3: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x4}, 0x10) write(r0, &(0x7f0000000280)="2400000016005f0814f9f407000904080a000000000000050900050008001100fffff000", 0x24) [ 299.239875][T16545] new mount options do not match the existing superblock, will be ignored [ 299.259953][T16545] new mount options do not match the existing superblock, will be ignored 03:57:09 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000000d000/0x2000)=nil, 0xfffffffffffffe74, 0x1000, 0x0, &(0x7f0000007000/0x1000)=nil) 03:57:09 executing program 5: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000002ac0), 0x0, 0x0) preadv(r0, &(0x7f0000002d40)=[{0x0, 0x2}, {&(0x7f0000002b80)=""/154, 0x9a}], 0x2, 0x0, 0x0) 03:57:09 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) shutdown(r0, 0x9a633ff31b3a99d2) 03:57:09 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000840)="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", 0x118, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000002c0)={[{@shortname_lower}]}) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) r1 = socket$netlink(0x10, 0x3, 0xc) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000002380), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000002480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000002440)={&(0x7f0000000980)=ANY=[@ANYBLOB="580000000b8d8c37bdec62cac9acfa8b7ffe34c16c6973b6ab54279c98f142573af65dd1c8a3b2d85903c54bf918228bdb8fb5068800b7a19b01462e935e4f59dd4ebd709edb0853b85ed523f6f38d49387afb2f7799dcdd9d0ccd892bb908d39ab8b6c9bf155dda6a0f75fb0450d1830ebf679c1d9cc659f379b6891def4ef7f3541ce0b11c48837cecf2d82ef6515546760e3e5933965a", @ANYRES16, @ANYBLOB="00032dbd7000fedbdf250e00000008000b000008000008000600525767e6ba43d78a3e96427bef0779c48150fcbd540d7b8e4a5dfb3cd395d07d3fa3d2937290636a9251db5562941f7926e3b6aeb2e85a73960373a7981191dd78403f5640f33762eabafc3f4167d17a49e459fe9afe51ff865ee68f2622bbcfa3094e8c444ade0db2c51d3159facdd1211c8e28fcfaa21e45400362ad886be78abed7b6e7d4d408499515de977d0636803c336e0986", @ANYRES32=0x0, @ANYBLOB="06002800030000000a0009009bd12cba30e10000080034000200000008000b000008000008002b000100000005002f00010000"], 0x58}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000001c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x1c, r2, 0x200, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpid() sendmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@cred={{0x18, 0x1, 0x2, {r4}}}], 0x18}, 0x0) 03:57:09 executing program 2: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00') r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000001c0)=0x20000008) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdirat(r0, &(0x7f0000000180)='./file0/file0\x00', 0x0) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f0000001580)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', 0x2) 03:57:09 executing program 5: syz_open_dev$evdev(&(0x7f00000016c0), 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) r0 = syz_io_uring_setup(0x6ad4, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x2b66, 0x0, 0x0, 0x0, 0x5e) 03:57:09 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000000d000/0x2000)=nil, 0xfffffffffffffe74, 0x1000, 0x0, &(0x7f0000007000/0x1000)=nil) 03:57:09 executing program 0: msgsnd(0x0, &(0x7f0000000080)={0x3, "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"}, 0x2000, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) 03:57:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000000740)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) close(r0) 03:57:09 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x80041285, &(0x7f0000000080)) 03:57:09 executing program 2: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00') r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000001c0)=0x20000008) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdirat(r0, &(0x7f0000000180)='./file0/file0\x00', 0x0) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f0000001580)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', 0x2) 03:57:09 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000000d000/0x2000)=nil, 0xfffffffffffffe74, 0x1000, 0x0, &(0x7f0000007000/0x1000)=nil) 03:57:09 executing program 0: set_mempolicy(0x3, &(0x7f0000000000)=0x3, 0x2) memfd_create(&(0x7f0000001840)='\xbb\x02\xb1\xed\x97\xcb\xb1,\x116\xe0\x89]\xad\x01\xc3r%;\x99\xbck\xe7=\xfa\xf6HB\x00\x9e\xc0\xa9\xc9\x88\xc7\x82\x9a\x94g\xda\xa6q\x15\xf5\xe1\x86\x8e\x1d\xdf\x9d+,\x00\xd7h\xa4\x06jtl\x00\x00\x00\x00!\xf8\xac\xdc\x00\x00\x00\xd5\\\x01g\xfd\x92\x06\xb9|\x9d\xec\xdb\x9d\x94i`8t\xbd\xe8\xbfj~NO\xb2\x1a\xfc\xff\xff\xff\xff\xff\xff\xff\x1a\xed\xaaqE\xa8\x01\x05\x00\x00\x00\x00\x00\x00\x00\x91l\x00\x00', 0x0) 03:57:09 executing program 5: syslog(0x3, &(0x7f0000000000)=""/35, 0x23) 03:57:09 executing program 3: pipe2$9p(&(0x7f0000000ac0)={0xffffffffffffffff}, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000940)='.\x00', &(0x7f0000000a80), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 03:57:09 executing program 2: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00') r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000001c0)=0x20000008) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdirat(r0, &(0x7f0000000180)='./file0/file0\x00', 0x0) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f0000001580)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', 0x2) 03:57:09 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) readv(r0, &(0x7f0000002200)=[{&(0x7f000001c2c0)=""/102400, 0x19000}, {0x0, 0x2}], 0x2) 03:57:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_int(r1, 0x11, 0x68, &(0x7f0000000040)=0x209bc, 0x4) 03:57:09 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000002c0), 0x61) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200006bd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) 03:57:09 executing program 2: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00') r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000001c0)=0x20000008) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdirat(r0, &(0x7f0000000180)='./file0/file0\x00', 0x0) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f0000001580)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', 0x2) 03:57:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = getpid() fork() setpriority(0x1, r1, 0x0) 03:57:09 executing program 1: prctl$PR_MCE_KILL(0x35, 0x1, 0x8) 03:57:09 executing program 3: mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000003, 0x4012031, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) mbind(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4002, &(0x7f0000000080)=0xbe, 0x3, 0x2) 03:57:09 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)) openat$cgroup_ro(r0, &(0x7f00000000c0)='cgroup.stat\x00', 0x0, 0x0) 03:57:09 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000001c0), 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000003c0)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000100)={0x0, 0x800000, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a357b6b140cbb6215dd33459"}}], 0xfffffee4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) 03:57:09 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x8042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="66bb"], 0xe) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4052, r0, 0x0) 03:57:09 executing program 1: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x4) preadv2(r0, &(0x7f0000001c80)=[{&(0x7f0000000240)=""/40, 0x28}], 0x1, 0x0, 0x0, 0x8) 03:57:09 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="66530700ae897094e71b0fb1f147a8378f364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb298802d8f6c1f3b18d6d352507f7018b31a53bad1ec3533c791a653a1fef2c560001000000000000fb8005128e7e4d939955f8ac396203784000400f573fbf000000000000000761f35e959f130dec95128c", 0x97}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 03:57:09 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000580)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 03:57:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x3) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r2, 0x0) openat2(0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x18) getsockopt$sock_buf(r1, 0x1, 0x1f, 0x0, &(0x7f0000000080)) 03:57:09 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) io_setup(0x7, &(0x7f0000000280)=0x0) io_submit(r1, 0x1, &(0x7f0000000040)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 03:57:09 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) r1 = socket(0xa, 0x2, 0x0) r2 = epoll_create1(0x0) r3 = dup3(r1, r2, 0x0) shutdown(r3, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r4}}) 03:57:09 executing program 2: setpriority(0x0, 0x0, 0x80000001) 03:57:09 executing program 3: mlock(&(0x7f0000400000/0xc00000)=nil, 0xc00000) mlockall(0x1) munmap(&(0x7f0000d4d000/0x1000)=nil, 0x1000) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, 0x0) [ 299.941154][ T25] audit: type=1326 audit(1621915029.879:455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16677 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 03:57:09 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x2b, &(0x7f0000000000), 0x4) 03:57:09 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r1, 0x2007ffc) r2 = dup(r0) bind$inet6(r0, &(0x7f0000000600)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet_tcp_int(r2, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x23) setsockopt$inet_tcp_int(r2, 0x6, 0x18, &(0x7f00000001c0), 0x4) r3 = open(&(0x7f00000003c0)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, 0x0, 0x8000fffffffe) connect$unix(r2, &(0x7f0000000000)=@abs, 0x6e) 03:57:10 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r1, 0x2007ffc) r2 = dup(r0) bind$inet6(r0, &(0x7f0000000600)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet_tcp_int(r2, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x23) setsockopt$inet_tcp_int(r2, 0x6, 0x18, &(0x7f00000001c0), 0x4) r3 = open(&(0x7f00000003c0)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, 0x0, 0x8000fffffffe) connect$unix(r2, &(0x7f0000000000)=@abs, 0x6e) 03:57:10 executing program 1: r0 = fork() ptrace(0x10, r0) waitid(0x0, 0x0, 0x0, 0x2, 0x0) ptrace$poke(0xffffffffffffffff, r0, 0x0, 0x0) [ 300.769743][ T25] audit: type=1326 audit(1621915030.709:456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16677 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 03:57:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x25, &(0x7f0000000080)=0x9, 0x4) 03:57:12 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r1, 0x2007ffc) r2 = dup(r0) bind$inet6(r0, &(0x7f0000000600)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet_tcp_int(r2, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x23) setsockopt$inet_tcp_int(r2, 0x6, 0x18, &(0x7f00000001c0), 0x4) r3 = open(&(0x7f00000003c0)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, 0x0, 0x8000fffffffe) connect$unix(r2, &(0x7f0000000000)=@abs, 0x6e) 03:57:12 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x9b) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000440)=ANY=[@ANYBLOB="020000000000000002000000e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000db00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000000020000000a01010100000000001700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b8d1e314d60279f4000000000000400000000000000000000000000000000083a40000000000000000000000000000000000020000f1ffffff000000000000000000000000000004cc19610000000000000000000000000000000000235b6c798b9aeceb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ac1e00010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003c540000000000000000000000000015000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e21ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220a01010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002"], 0x410) close(r0) 03:57:12 executing program 5: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000001300)) 03:57:12 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000580)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 03:57:12 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x101}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000500)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) recvmmsg(r1, &(0x7f0000001980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 03:57:12 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7c}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="040000b2a861d41e53ece3"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1000000000000024, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) [ 302.942834][T16746] TCP: TCP_TX_DELAY enabled 03:57:12 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r1, 0x2007ffc) r2 = dup(r0) bind$inet6(r0, &(0x7f0000000600)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet_tcp_int(r2, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x23) setsockopt$inet_tcp_int(r2, 0x6, 0x18, &(0x7f00000001c0), 0x4) r3 = open(&(0x7f00000003c0)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, 0x0, 0x8000fffffffe) connect$unix(r2, &(0x7f0000000000)=@abs, 0x6e) 03:57:12 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7c}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="040000b2a861d41e53ece3"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1000000000000024, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 03:57:12 executing program 0: r0 = memfd_create(&(0x7f0000000200)='\x06\n\x00\xfd\xbe\x00t\xc6m4Hx\n\xed\x19yS\xac\xbcN\xa5L\xf5\x01\xbe\x14\xb5\n>\xdd\a\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\xff\xfd*}\x81\xfac\n\xbf\x16\x82\xa3\x99LO%\x9cC\x9f\x1b\xcb\'\xa0\xeb\xc04\x97d\xf2\x93\xf5J\x95\x8a\x15\x02\xf4\xd3\x03\xa6\xe9\xbf\xe4H\x10\xb3JT\xf2]\xa1y\xa3\x9c\xdd\xbaVI6/\xa8G%\x88\xc2\xad\xebY\xef\xdf\xdcu{\x05EN\xd77$\xc1\x00\xc3\xdf<\x82\"\xeb\xa8l9\xabK\xa9\xf9\xc0>(\x9cjR\x0e*\xed\x9fVH\x1f\x8dr\xbe\r0\xff\xa5yA\x03\x02\xb8\xba8\xb0\x8a\x98(\xb2+4\x85\xfb\xc5fu\xb7\xae\x01n\xa5\xc4\xe4\xd8*ZY\xf9Bg\x97\'\xd8-yB\x1d79Yu\xb2\xd1\xb5s+\x14\xbd\x05\x8a\x0f\xf4\x18A\xb3P\x9f\x88\x17\xa6\x86M\xf6b\x93\xd9\xf6\x19\x8fr\x89\x93a\x992\x9d\x99\xe1\xb7\av\x88\x02\"\a\n\xbb\xc4L\x17*\xa7\xb0J\xfc\xaf\xc7\x8c\xadg\x94q\x10\x8aMx/P2\xc2{\xae\x05\xcb!k\xc7%\xd7!\xeev\xaf\x00\x18k\x9e\xb4\xc7\xfc\xe7\v\x9e\xe7\xe3\x15\x94\xe7\xc5\xcd\x92\xd9L|d\xedG^\xa8\x18\xd3\x9d\f\xe5\xa6]N\x94\xc3\x97h6\xf4\xe1\x97\xa5\xb5F\x9f[\x10\x03\\b\x90u \xc2,\xec}\'\x84\xdan\xf3\xe0kU\x8a\xe8\xd1\xf2\xa1\xa6s\xd4\xc7\\b\x8c\xeb\xc5\b\x8a\x9b\xd7\x01\xa2\xa4z\xcf\xe3\xcb\xabL\v\xb0\xc1=\xcc', 0x0) fallocate(r0, 0x0, 0x0, 0x44a) pwrite64(r0, &(0x7f0000000000)="cf", 0x1, 0xd020) lseek(r0, 0x0, 0x3) [ 302.974432][ T25] audit: type=1326 audit(1621915032.919:457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16749 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 03:57:13 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000002c0)={@local, @private2, @local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r3}) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000280)=ANY=[@ANYBLOB="84020000100008002dbd7000ffdbdf25ac141430000000000000000000000000fe8000000000000000000000000000bb4e2300004e2104000a00a0002f000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa000000000000000000000000000004d66c000000ac14143d0000000000000000000000000800000000000000ff07000000000000030000000000000001fcffffffffffffffffff7f0000000041cbffffffffffff000000000000000003000000000000000010000000000000a7690000000000000002000000000000010000000000000010280000ffffff7f0500000005000000ff340000020003ffc000000000000000ac000700ac1e0001000000000000000000000000fe8000000000000000000000000000bb4e230ab54e210000020080a089000000", @ANYRES32=r3, @ANYRES32=0x0, @ANYBLOB="7f000000000000000300000000000000000000000000000001800000000000000300000000000000010000000100000001800000000000000400000000000000ff7f00000000000003000000000000000000000000000000030000000000000021040000be6b6e0002000103000000002c00130000000000000000000000ffff7f00000100000000000000000000ffffac1414bb00000000020000006800120072666337353339286374722d63616d656c6c69612d6165736e692c626c616b6532732d3232342900000000000000000000000000000000000000000000000000e0000000600000001c361a2da3013bea50e0cd98306a2587707e45d18b315c1894aeef7c0c001c00", @ANYRES32=0x0, @ANYBLOB="00000000080016000200110008001600070000002400090009000000000000000300000000000000070000000000000004000000000000000a001000010000000000000008001800b8360000"], 0x284}}, 0x48018) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) setsockopt$inet6_int(r4, 0x29, 0xd0, &(0x7f0000000080)=0x7, 0x4) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e23, 0x3f, @mcast1, 0x800}, 0x1c) 03:57:13 executing program 0: r0 = memfd_create(&(0x7f0000000200)='\x06\n\x00\xfd\xbe\x00t\xc6m4Hx\n\xed\x19yS\xac\xbcN\xa5L\xf5\x01\xbe\x14\xb5\n>\xdd\a\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\xff\xfd*}\x81\xfac\n\xbf\x16\x82\xa3\x99LO%\x9cC\x9f\x1b\xcb\'\xa0\xeb\xc04\x97d\xf2\x93\xf5J\x95\x8a\x15\x02\xf4\xd3\x03\xa6\xe9\xbf\xe4H\x10\xb3JT\xf2]\xa1y\xa3\x9c\xdd\xbaVI6/\xa8G%\x88\xc2\xad\xebY\xef\xdf\xdcu{\x05EN\xd77$\xc1\x00\xc3\xdf<\x82\"\xeb\xa8l9\xabK\xa9\xf9\xc0>(\x9cjR\x0e*\xed\x9fVH\x1f\x8dr\xbe\r0\xff\xa5yA\x03\x02\xb8\xba8\xb0\x8a\x98(\xb2+4\x85\xfb\xc5fu\xb7\xae\x01n\xa5\xc4\xe4\xd8*ZY\xf9Bg\x97\'\xd8-yB\x1d79Yu\xb2\xd1\xb5s+\x14\xbd\x05\x8a\x0f\xf4\x18A\xb3P\x9f\x88\x17\xa6\x86M\xf6b\x93\xd9\xf6\x19\x8fr\x89\x93a\x992\x9d\x99\xe1\xb7\av\x88\x02\"\a\n\xbb\xc4L\x17*\xa7\xb0J\xfc\xaf\xc7\x8c\xadg\x94q\x10\x8aMx/P2\xc2{\xae\x05\xcb!k\xc7%\xd7!\xeev\xaf\x00\x18k\x9e\xb4\xc7\xfc\xe7\v\x9e\xe7\xe3\x15\x94\xe7\xc5\xcd\x92\xd9L|d\xedG^\xa8\x18\xd3\x9d\f\xe5\xa6]N\x94\xc3\x97h6\xf4\xe1\x97\xa5\xb5F\x9f[\x10\x03\\b\x90u \xc2,\xec}\'\x84\xdan\xf3\xe0kU\x8a\xe8\xd1\xf2\xa1\xa6s\xd4\xc7\\b\x8c\xeb\xc5\b\x8a\x9b\xd7\x01\xa2\xa4z\xcf\xe3\xcb\xabL\v\xb0\xc1=\xcc', 0x0) fallocate(r0, 0x0, 0x0, 0x44a) pwrite64(r0, &(0x7f0000000000)="cf", 0x1, 0xd020) lseek(r0, 0x0, 0x3) 03:57:13 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7c}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="040000b2a861d41e53ece3"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1000000000000024, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 03:57:13 executing program 0: r0 = memfd_create(&(0x7f0000000200)='\x06\n\x00\xfd\xbe\x00t\xc6m4Hx\n\xed\x19yS\xac\xbcN\xa5L\xf5\x01\xbe\x14\xb5\n>\xdd\a\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\xff\xfd*}\x81\xfac\n\xbf\x16\x82\xa3\x99LO%\x9cC\x9f\x1b\xcb\'\xa0\xeb\xc04\x97d\xf2\x93\xf5J\x95\x8a\x15\x02\xf4\xd3\x03\xa6\xe9\xbf\xe4H\x10\xb3JT\xf2]\xa1y\xa3\x9c\xdd\xbaVI6/\xa8G%\x88\xc2\xad\xebY\xef\xdf\xdcu{\x05EN\xd77$\xc1\x00\xc3\xdf<\x82\"\xeb\xa8l9\xabK\xa9\xf9\xc0>(\x9cjR\x0e*\xed\x9fVH\x1f\x8dr\xbe\r0\xff\xa5yA\x03\x02\xb8\xba8\xb0\x8a\x98(\xb2+4\x85\xfb\xc5fu\xb7\xae\x01n\xa5\xc4\xe4\xd8*ZY\xf9Bg\x97\'\xd8-yB\x1d79Yu\xb2\xd1\xb5s+\x14\xbd\x05\x8a\x0f\xf4\x18A\xb3P\x9f\x88\x17\xa6\x86M\xf6b\x93\xd9\xf6\x19\x8fr\x89\x93a\x992\x9d\x99\xe1\xb7\av\x88\x02\"\a\n\xbb\xc4L\x17*\xa7\xb0J\xfc\xaf\xc7\x8c\xadg\x94q\x10\x8aMx/P2\xc2{\xae\x05\xcb!k\xc7%\xd7!\xeev\xaf\x00\x18k\x9e\xb4\xc7\xfc\xe7\v\x9e\xe7\xe3\x15\x94\xe7\xc5\xcd\x92\xd9L|d\xedG^\xa8\x18\xd3\x9d\f\xe5\xa6]N\x94\xc3\x97h6\xf4\xe1\x97\xa5\xb5F\x9f[\x10\x03\\b\x90u \xc2,\xec}\'\x84\xdan\xf3\xe0kU\x8a\xe8\xd1\xf2\xa1\xa6s\xd4\xc7\\b\x8c\xeb\xc5\b\x8a\x9b\xd7\x01\xa2\xa4z\xcf\xe3\xcb\xabL\v\xb0\xc1=\xcc', 0x0) fallocate(r0, 0x0, 0x0, 0x44a) pwrite64(r0, &(0x7f0000000000)="cf", 0x1, 0xd020) lseek(r0, 0x0, 0x3) 03:57:13 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000002c0)={@local, @private2, @local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r3}) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000280)=ANY=[@ANYBLOB="84020000100008002dbd7000ffdbdf25ac141430000000000000000000000000fe8000000000000000000000000000bb4e2300004e2104000a00a0002f000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa000000000000000000000000000004d66c000000ac14143d0000000000000000000000000800000000000000ff07000000000000030000000000000001fcffffffffffffffffff7f0000000041cbffffffffffff000000000000000003000000000000000010000000000000a7690000000000000002000000000000010000000000000010280000ffffff7f0500000005000000ff340000020003ffc000000000000000ac000700ac1e0001000000000000000000000000fe8000000000000000000000000000bb4e230ab54e210000020080a089000000", @ANYRES32=r3, @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="00000000080016000200110008001600070000002400090009000000000000000300000000000000070000000000000004000000000000000a001000010000000000000008001800b8360000"], 0x284}}, 0x48018) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) setsockopt$inet6_int(r4, 0x29, 0xd0, &(0x7f0000000080)=0x7, 0x4) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e23, 0x3f, @mcast1, 0x800}, 0x1c) 03:57:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x6, &(0x7f0000000100)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) 03:57:13 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6000) io_setup(0x1, &(0x7f0000000080)=0x0) ftruncate(r1, 0x81fd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)=0x8) io_submit(r2, 0x3b, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x16000}]) 03:57:13 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7c}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="040000b2a861d41e53ece3"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1000000000000024, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 03:57:13 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000580)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendfile(r2, r1, 0x0, 0x100000002) [ 303.805890][ T25] audit: type=1326 audit(1621915033.749:458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16749 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 03:57:13 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000180)=0x0) io_submit(r2, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) lseek(r1, 0xff0f000000000000, 0x4) ftruncate(r1, 0x0) 03:57:13 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000002c0)={@local, @private2, @local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r3}) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000280)=ANY=[@ANYBLOB="84020000100008002dbd7000ffdbdf25ac141430000000000000000000000000fe8000000000000000000000000000bb4e2300004e2104000a00a0002f000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa000000000000000000000000000004d66c000000ac14143d0000000000000000000000000800000000000000ff07000000000000030000000000000001fcffffffffffffffffff7f0000000041cbffffffffffff000000000000000003000000000000000010000000000000a7690000000000000002000000000000010000000000000010280000ffffff7f0500000005000000ff340000020003ffc000000000000000ac000700ac1e0001000000000000000000000000fe8000000000000000000000000000bb4e230ab54e210000020080a089000000", @ANYRES32=r3, @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="00000000080016000200110008001600070000002400090009000000000000000300000000000000070000000000000004000000000000000a001000010000000000000008001800b8360000"], 0x284}}, 0x48018) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) setsockopt$inet6_int(r4, 0x29, 0xd0, &(0x7f0000000080)=0x7, 0x4) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e23, 0x3f, @mcast1, 0x800}, 0x1c) 03:57:13 executing program 0: r0 = memfd_create(&(0x7f0000000200)='\x06\n\x00\xfd\xbe\x00t\xc6m4Hx\n\xed\x19yS\xac\xbcN\xa5L\xf5\x01\xbe\x14\xb5\n>\xdd\a\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\xff\xfd*}\x81\xfac\n\xbf\x16\x82\xa3\x99LO%\x9cC\x9f\x1b\xcb\'\xa0\xeb\xc04\x97d\xf2\x93\xf5J\x95\x8a\x15\x02\xf4\xd3\x03\xa6\xe9\xbf\xe4H\x10\xb3JT\xf2]\xa1y\xa3\x9c\xdd\xbaVI6/\xa8G%\x88\xc2\xad\xebY\xef\xdf\xdcu{\x05EN\xd77$\xc1\x00\xc3\xdf<\x82\"\xeb\xa8l9\xabK\xa9\xf9\xc0>(\x9cjR\x0e*\xed\x9fVH\x1f\x8dr\xbe\r0\xff\xa5yA\x03\x02\xb8\xba8\xb0\x8a\x98(\xb2+4\x85\xfb\xc5fu\xb7\xae\x01n\xa5\xc4\xe4\xd8*ZY\xf9Bg\x97\'\xd8-yB\x1d79Yu\xb2\xd1\xb5s+\x14\xbd\x05\x8a\x0f\xf4\x18A\xb3P\x9f\x88\x17\xa6\x86M\xf6b\x93\xd9\xf6\x19\x8fr\x89\x93a\x992\x9d\x99\xe1\xb7\av\x88\x02\"\a\n\xbb\xc4L\x17*\xa7\xb0J\xfc\xaf\xc7\x8c\xadg\x94q\x10\x8aMx/P2\xc2{\xae\x05\xcb!k\xc7%\xd7!\xeev\xaf\x00\x18k\x9e\xb4\xc7\xfc\xe7\v\x9e\xe7\xe3\x15\x94\xe7\xc5\xcd\x92\xd9L|d\xedG^\xa8\x18\xd3\x9d\f\xe5\xa6]N\x94\xc3\x97h6\xf4\xe1\x97\xa5\xb5F\x9f[\x10\x03\\b\x90u \xc2,\xec}\'\x84\xdan\xf3\xe0kU\x8a\xe8\xd1\xf2\xa1\xa6s\xd4\xc7\\b\x8c\xeb\xc5\b\x8a\x9b\xd7\x01\xa2\xa4z\xcf\xe3\xcb\xabL\v\xb0\xc1=\xcc', 0x0) fallocate(r0, 0x0, 0x0, 0x44a) pwrite64(r0, &(0x7f0000000000)="cf", 0x1, 0xd020) lseek(r0, 0x0, 0x3) 03:57:13 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000002c0)={@local, @private2, @local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r3}) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000280)=ANY=[@ANYBLOB="84020000100008002dbd7000ffdbdf25ac141430000000000000000000000000fe8000000000000000000000000000bb4e2300004e2104000a00a0002f000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa000000000000000000000000000004d66c000000ac14143d0000000000000000000000000800000000000000ff07000000000000030000000000000001fcffffffffffffffffff7f0000000041cbffffffffffff000000000000000003000000000000000010000000000000a7690000000000000002000000000000010000000000000010280000ffffff7f0500000005000000ff340000020003ffc000000000000000ac000700ac1e0001000000000000000000000000fe8000000000000000000000000000bb4e230ab54e210000020080a089000000", @ANYRES32=r3, @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="00000000080016000200110008001600070000002400090009000000000000000300000000000000070000000000000004000000000000000a001000010000000000000008001800b8360000"], 0x284}}, 0x48018) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) setsockopt$inet6_int(r4, 0x29, 0xd0, &(0x7f0000000080)=0x7, 0x4) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e23, 0x3f, @mcast1, 0x800}, 0x1c) 03:57:13 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x2, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000001100)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x1}, 0x90) 03:57:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0x0, 0x0, 0xfffffffffffffffe) 03:57:13 executing program 5: r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0xee72) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380), 0x1000002, 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000000), 0x7) 03:57:13 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r0) lsetxattr$system_posix_acl(&(0x7f0000005500)='./file0\x00', &(0x7f0000005540)='system.posix_acl_default\x00', &(0x7f0000005840), 0x24, 0x0) 03:57:14 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x1006}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}, 0x10) 03:57:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@i_version}]}) 03:57:14 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000580)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 03:57:14 executing program 5: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x2801, 0x0) write$9p(r0, &(0x7f0000000080)="15cd", 0x2) [ 304.133753][T16851] loop2: detected capacity change from 0 to 512 [ 304.194512][T16851] EXT4-fs (loop2): mounted filesystem without journal. Opts: i_version,,errors=continue. Quota mode: none. 03:57:14 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000140)=ANY=[], 0x90) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:57:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x0, 0x0, @ipv4}}, 0x0, 0x1, 0x40, 0x0, "0000e0ffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @private0}}, 0x0, 0x0, 0x13, 0x0, "de6dce6dcfed291319edc2198d9fc2585e7a45dffc5f00c58e683f4dab8118769520f2aeae0211e035e8e9cfaa943680d3e798491a3ad52b7eced4542f5c3836f652dc79f0fc592d7c00fddf6f39de9b"}, 0xd8) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000040)={@in6={{0xa, 0x0, 0x0, @ipv4}}, 0x0, 0x0, 0x0, 0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0xd8) 03:57:14 executing program 5: r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c1e0309001a03a000", 0x33a) 03:57:14 executing program 1: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x131, &(0x7f00000005c0)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:57:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@i_version}]}) 03:57:14 executing program 4: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x1}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2c, 0x16, 0xa01, 0x0, 0x0, {0xa}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x14, 0x6, 0x0, 0x0, @binary="ce33de19a52cffc5b3a749fca5a6c2d7"}]}]}, 0x2c}}, 0x0) 03:57:14 executing program 5: r0 = socket$inet(0x2, 0x3, 0x9) setsockopt(r0, 0x0, 0x40, 0x0, 0x0) 03:57:14 executing program 4: r0 = signalfd(0xffffffffffffffff, &(0x7f00000001c0), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) close(r0) setresuid(r2, r2, 0x0) r3 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x2c00) fcntl$setown(r0, 0x8, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) inotify_add_watch(r3, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') 03:57:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mremap(&(0x7f0000010000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) 03:57:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002100190f00003fffffffda060200000000e80001dd0000040d001800ea1100000005000000", 0x29}], 0x1) 03:57:14 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000140)=ANY=[], 0x90) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:57:14 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000580)='asymmetric\x00', 0x0, &(0x7f0000000080)="3082", 0x71, r0) [ 304.504617][T16893] loop2: detected capacity change from 0 to 512 03:57:14 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000140)=ANY=[], 0x90) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:57:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@i_version}]}) 03:57:14 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f00000007c0)=[{{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000001000011f00000900000000000a2000000600010013"], 0x1c}}, 0x0) [ 304.546287][T16893] EXT4-fs (loop2): mounted filesystem without journal. Opts: i_version,,errors=continue. Quota mode: none. [ 304.638902][T16929] loop2: detected capacity change from 0 to 512 [ 304.658609][T16929] EXT4-fs (loop2): mounted filesystem without journal. Opts: i_version,,errors=continue. Quota mode: none. 03:57:17 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x64, 0x0, 0x0, 0x203}]}, 0x10) 03:57:17 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000140)={0x20}) write$cgroup_int(r0, &(0x7f0000000000), 0xffffff6a) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r0, 0x1, 0x8, 0x7fff}) 03:57:17 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000140)=ANY=[], 0x90) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:57:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000040)={[{@i_version}]}) 03:57:17 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getpeername$packet(r1, 0x0, &(0x7f0000000040)) 03:57:17 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000000101ff0f0000000800000000010000000c0019800800010004000000040001"], 0x24}}, 0x0) 03:57:17 executing program 4: syz_mount_image$vfat(&(0x7f0000000440), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='check=strict']) chdir(&(0x7f00000001c0)='./file0\x00') open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file1\x00') 03:57:17 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000080), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)={0x48, r2, 0x9, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}, {0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x2}]}]}, 0x48}}, 0x0) 03:57:17 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000040)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r2, &(0x7f00000000c0)='\x00', r3, &(0x7f00000002c0)='./file1\x00', 0x1000) 03:57:17 executing program 0: set_mempolicy(0x3, &(0x7f0000000180)=0x80000001, 0x7fff) syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') [ 307.475055][T16953] loop2: detected capacity change from 0 to 512 03:57:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8e, &(0x7f0000000400)="c4c691019919da078a0098d1e0a59320ff79b040f762910016775a8454cc16dc38f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689bce0e2db60713a3a7eeba5c9c6a47312334c2a97a4837714569255344e22045dffbcd48a70502173d6efa56b60f48cf0c9d0989ecbbfc220bd2b39df9ad8d6b14910f4a869863009780dd6e673a02f7ed829"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 03:57:17 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1000000000022, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000300)={@in={{0x2, 0x0, @dev}}, 0x0, 0x0, 0x3b, 0x0, "21dc9977f65438c0cd0bd93e32863730228c8675dba1ce027dfbdfc7ec833acc27e94381bc45be787d039953ec3e44f83390cc3927366e3efcc2f06eddbfc7ca0f0627678b342b3604e7fcbfac7eaac8"}, 0xd8) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x0, @multicast1}}, 0x0, 0x0, 0x2d, 0x0, "8ad46d7d905e12bd0de0dd7f023a2950d702907771ba0fcf0bdf086087465b4a5d93117ba720aae310ef9f00cf6af3a499ba34f6d626b3af65c2d932f79b6fa60da87b36bd19892c47b5e8f38cea3b66"}, 0xd8) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000002a80)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)='\a', 0x1}], 0x1, 0x0, 0x0, 0x1000000}}], 0x1, 0x4044075) [ 307.523538][T16953] EXT4-fs (loop2): mounted filesystem without journal. Opts: i_version,,errors=continue. Quota mode: none. 03:57:17 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) close(r1) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 03:57:17 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000140)={0x20}) write$cgroup_int(r0, &(0x7f0000000000), 0xffffff6a) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r0, 0x1, 0x8, 0x7fff}) 03:57:17 executing program 3: setpgid(0xffffffffffffffff, 0x0) 03:57:17 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000840)={0x1, &(0x7f0000000800)=[{0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) select(0x40, &(0x7f0000000100)={0x9}, 0x0, 0x0, 0x0) 03:57:17 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000010c0)=@newsa={0xf0, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in=@multicast2}, {@in=@broadcast, 0x0, 0x2b}, @in6=@mcast2, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) 03:57:17 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x2) ioctl$SG_SET_RESERVED_SIZE(r1, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x11, r1, 0x0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000080), 0xfffffe58) 03:57:17 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x11f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:57:17 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x8914, &(0x7f0000000080)={'sit0\x00', 0x0}) 03:57:17 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 307.723683][ T25] audit: type=1326 audit(1621915037.669:459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17004 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 03:57:17 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="66531700ae897094e71b0fb1f147a8378f364602812c66538d754724230798637e582c7be8f6d3c020f30f6ee1af68e5b5725142ff6c2fef2308003ea1315baf2f5e153eb78020fa00eb298802d8f6c1f3b18d6d352507f7018b31a53bad1ec3533c608af363fe88975b88822cb488e8cf371ebee61adc5ff09ffed8f0340816f77e3c83607a02ffa2c72787e1affc8e88f6693746dc88d9e94a6fc63b431fadfb006449955525e02b77fe2e77292a9ffcebfe93529999fad6b752c5e10999b23c012f7ae99b11775d158b89efbd136a85cc911619c512f7faf70231f624de6f4f64355e0552f38793f0e72a1a243666738f00550f38016df58f8470bdcea3f08123066383fb19e575af7ff8491b1f16ea18b4848e89217200be7d8df9578f", 0x11f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:57:17 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x40401) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x280000e, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x55, 0xd9f, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, 0x0) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) tkill(0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c07, 0x0) 03:57:17 executing program 1: r0 = syz_io_uring_setup(0x35de, &(0x7f0000003180), &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040), &(0x7f0000003200)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) 03:57:17 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000140)={0x20}) write$cgroup_int(r0, &(0x7f0000000000), 0xffffff6a) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r0, 0x1, 0x8, 0x7fff}) 03:57:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[], 0xfdc4}}, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x1, &(0x7f000039a000)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001240)=[{0x0}, {0x0}, {&(0x7f00000000c0)=""/54, 0x36}], 0x3, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 03:57:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fsopen(&(0x7f0000000040)='devpts\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000340), 0x0) fsmount(r1, 0x0, 0x0) 03:57:18 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x0, @fd, 0x0, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x0) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x114, &(0x7f0000000140)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 03:57:18 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="00e17d7dbcf318b4abeeab"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 03:57:18 executing program 3: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000180)={0x4000}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x1c, 0x16, 0xa01, 0x0, 0x0, {}, [@nested={0x4}, @nested={0x4, 0x2}]}, 0x1c}}, 0x0) 03:57:18 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000140)={0x20}) write$cgroup_int(r0, &(0x7f0000000000), 0xffffff6a) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r0, 0x1, 0x8, 0x7fff}) 03:57:18 executing program 4: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) madvise(&(0x7f00003fd000/0xc00000)=nil, 0xc00000, 0x3) [ 308.554197][ T25] audit: type=1326 audit(1621915038.499:460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17004 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 03:57:18 executing program 0: r0 = fsopen(&(0x7f0000000040)='binfmt_misc\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000080)='silent\x00', 0x0, 0x0) read(r0, &(0x7f0000001080)=""/4097, 0x1001) [ 308.623327][T17066] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 308.654077][T17077] netlink: 'syz-executor.3': attribute type 2 has an invalid length. 03:57:20 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x11f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:57:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f00000004c0)={[], [{@permit_directio}]}) 03:57:20 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x21, 0x0, &(0x7f0000000100)) 03:57:20 executing program 3: r0 = socket(0x10, 0x803, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r1, r0) getsockopt$SO_BINDTODEVICE(r0, 0x6, 0x1c, &(0x7f0000000000), 0x20a154cc) 03:57:20 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x14c, &(0x7f0000000440)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689c9c6a47312334c2a97ac2b7f0fb4aabebae8dc5dffbcd48a70502173d6efa56b60f48cf0c9d0989ecbbfc220bd2b39df9ad8d6b14910f4a869863009780dd6e673a02f7ed829932929af9dffb1fa2cd7328202ac55f4f5dbb8494120f79d5f60958691a8a3fcf561c33f46ab89803f47d97e04f7bf9cafb006ae29480408c8380cf060dd72462ccc5b7d195a113bc539df6591cd574a02d4d9b9f3ebce31bd7582018ded8ceb71e75417dabc45f9fa0503befdcd0874ae979bc9581d6a854d4dfb7ffaed09bfcf330c365988c05e12ed069a42c964f79e16ad22f95ffaf5a1d4200b030d0b7b170051b850b78b196b00f0ffff72ac058a66ea2614ba81fdefa76b9b8df6a1203b820129976905984e26586931f700bbec30960449bf"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 03:57:20 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000fcb000)=0xa4ffffff, 0x4) 03:57:20 executing program 4: r0 = socket$inet(0x10, 0x80003, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="24000000210007041dfffd946f610500020000e8fe0208010001080008000600fe7f0000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 03:57:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x9) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0x2, 0x4) 03:57:20 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) set_mempolicy(0x1, &(0x7f0000000000)=0x3, 0x5) flock(r0, 0xc) 03:57:20 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1d, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6}]}) 03:57:20 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) [ 310.903187][T17115] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 310.922401][T17122] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 03:57:20 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @mcast2}, 0x80) [ 310.935399][ T25] audit: type=1400 audit(1621915040.879:461): avc: denied { audit_read } for pid=17112 comm="syz-executor.1" capability=37 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [ 310.975428][ T25] audit: type=1326 audit(1621915040.919:462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17118 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 311.014774][ T25] audit: type=1326 audit(1621915040.959:463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17118 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=3 compat=0 ip=0x4193eb code=0x0 03:57:23 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x11f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:57:23 executing program 3: pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000200)="090000000000868a1443fd0de689f0a700", 0x11}], 0x3, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x120, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:57:23 executing program 4: unshare(0x400) r0 = socket(0x2, 0x3, 0x1) getsockopt(r0, 0xff, 0x0, 0x0, 0x0) 03:57:23 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r3 = socket(0x400000000000010, 0x3, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r2, 0x0, 0xc, &(0x7f00000006c0)={@empty=0x8, @empty}, 0x4) 03:57:23 executing program 0: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) chmod(&(0x7f0000000940)='./control\x00', 0x0) 03:57:23 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0201a6ffffffc4c10100ff45ac0480ffffff828008000000000200000000000000ffa9000000e100000088770072003007006300000000040010008000da55aa", 0x40, 0x1c0}]) 03:57:23 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000002840), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000180)={0x80, 0x0, 0x0, 0x6}) 03:57:23 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000004, 0x11, r0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000fff000/0x1000)=nil, 0x3) 03:57:23 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x5460, &(0x7f0000000000)) 03:57:23 executing program 3: pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000200)="090000000000868a1443fd0de689f0a700", 0x11}], 0x3, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x120, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) [ 313.866139][T17146] loop5: detected capacity change from 0 to 1 [ 313.903438][T17146] loop5: p1 p3 p4 03:57:23 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000300), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x10, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x400300}]}]}]}, 0x3c}}, 0x0) 03:57:23 executing program 3: pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000200)="090000000000868a1443fd0de689f0a700", 0x11}], 0x3, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x120, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) [ 313.915193][T17146] loop5: p1 start 115140 is beyond EOD, truncated [ 313.922107][T17146] loop5: p3 start 225 is beyond EOD, truncated [ 313.928437][T17146] loop5: p4 start 268436480 is beyond EOD, truncated [ 313.993084][T17146] loop5: detected capacity change from 0 to 1 [ 314.022202][T17146] loop5: p1 p3 p4 [ 314.026039][T17146] loop5: p1 start 115140 is beyond EOD, truncated [ 314.032522][T17146] loop5: p3 start 225 is beyond EOD, truncated [ 314.038666][T17146] loop5: p4 start 268436480 is beyond EOD, truncated [ 314.141026][ T1034] loop5: p1 p3 p4 [ 314.144828][ T1034] loop5: p1 start 115140 is beyond EOD, truncated [ 314.151259][ T1034] loop5: p3 start 225 is beyond EOD, truncated [ 314.157397][ T1034] loop5: p4 start 268436480 is beyond EOD, truncated 03:57:26 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400, 0x100}}) 03:57:26 executing program 1: syz_genetlink_get_family_id$netlbl_cipso(0x0, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x2000000, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x20, &(0x7f0000000480)='cifs.spnego\x00') 03:57:26 executing program 0: r0 = signalfd(0xffffffffffffffff, &(0x7f00000001c0), 0x8) mkdir(&(0x7f0000000140)='./control\x00', 0x0) close(r0) r1 = inotify_init1(0x0) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000006000), 0x8, 0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f000001bff4)) fcntl$setstatus(r0, 0x4, 0x2c00) r4 = gettid() fcntl$setown(r0, 0x8, r4) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00000002c0)={[0xfffffffffffffff6]}, 0x0, 0x0, 0x8) inotify_add_watch(r1, &(0x7f00000000c0)='./control\x00', 0xa0000214) rmdir(&(0x7f0000000180)='./control\x00') 03:57:26 executing program 3: pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000200)="090000000000868a1443fd0de689f0a700", 0x11}], 0x3, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x120, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 03:57:26 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x134, &(0x7f0000000380)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 03:57:26 executing program 2: r0 = mq_open(&(0x7f0000001380)='eth0\x00', 0x42, 0x0, 0x0) close(r0) perf_event_open(&(0x7f00000000c0)={0x1000000002, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_unlink(&(0x7f0000000340)='eth0\x00') 03:57:26 executing program 1: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x11, 0x2, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) dup2(r0, r2) 03:57:26 executing program 4: unshare(0x400) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000021c0), 0x0, 0x0) waitid$P_PIDFD(0x3, r0, 0x0, 0x4, 0x0) 03:57:26 executing program 2: syz_open_procfs(0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x401}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x488e0000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) 03:57:26 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x88880, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @dev}, 0x1c) sendto$inet6(r0, &(0x7f00000009c0)="c7cfcaaa22e10542fca5c0195350f15147657e0bfc59d383a47190db88690e6fedc3040ab5809ae02a54cd429cc3338c5afa0c9dce3f91950d1f567f358ac21154159130e88cbb6c43197813b2f23f3e442f80877490b393408142ebcfea6821f543e5ee9e27032e2b75d78f1b79f5a6bb6f0645e267770ef7e8f3a92148091217450ce8581e54223eeb6486205a209bf1fe854d211c03f8c3140fc3979d824082990d119473d20e94f253c9621fac339560ae46cb24b88bf2d01559bb658e343257b90f233b81bc5c398be3bbddb23a1e", 0xffd6, 0xc001, 0x0, 0xffffffffffffff0c) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000080), 0x4) [ 316.891979][T17199] sysfs: Unknown parameter 'cifs.spnego' [ 316.910549][T17210] sysfs: Unknown parameter 'cifs.spnego' 03:57:26 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000002, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r1, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e918d324868e83f474d0c3549b712f00c51c638e6aea4a8dee825286b31a260e60482bb0b4179b315d", 0xff7c}], 0x1) 03:57:26 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r0, 0x0) syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x1, &(0x7f00000026c0)=[{0x0}], 0x0, 0x0) 03:57:26 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$RTC_UIE_ON(r0, 0x7005) 03:57:26 executing program 0: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r3 = add_key$keyring(&(0x7f0000000400), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r2) r5 = request_key(&(0x7f0000000180)='trusted\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, r4) keyctl$link(0x8, r1, r4) r6 = request_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='%9zR\x95\x04\xad\xbf\xa4\xc9\x15I\xca\xf1aM\xaaw \x00\xdd\x84\xc8M\x83R<\xc6\x9e-\x99\b\x91\xb7\xf4\x14<\xe9\xf8\x01\x00\x00\x00\x00\x00\x00\x00\xf9\xe6\xae\xc0\x906\x0f\xf0\xee\xff\x01\x00\x00z\x1eh', r5) keyctl$search(0xa, r2, &(0x7f0000000000)='rxrpc\x00', &(0x7f0000000200)={'syz', 0x0}, r6) keyctl$unlink(0x9, r0, r1) 03:57:26 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') creat(&(0x7f0000000080)='./bus\x00', 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r0, 0x0) read(r0, &(0x7f0000000040)=""/24, 0x18) 03:57:26 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000000)={0xf4da, 0x0, 0x0, 0x7, 0x0, "7842c4430f3cc2d4"}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000040)=0x1a) 03:57:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x11, 0x0, &(0x7f0000000040)) 03:57:27 executing program 1: r0 = syz_io_uring_setup(0x2de5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000400000/0xc00000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r4, &(0x7f00000002c0), 0x10) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0xa2, 0x0, 0x0, 0x0, 0x0) 03:57:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x1, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) 03:57:27 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000300)) [ 317.757738][ T25] audit: type=1326 audit(1621915047.699:464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17274 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 317.781677][T17278] new mount options do not match the existing superblock, will be ignored [ 317.791618][T17278] new mount options do not match the existing superblock, will be ignored [ 318.587833][ T25] audit: type=1326 audit(1621915048.529:465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17274 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 03:57:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088", 0xbc) sendfile(r0, r1, 0x0, 0x1c500) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 03:57:29 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x3fd, 0x7) r0 = epoll_create1(0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)={0xe0000019}) 03:57:29 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r2 = io_uring_setup(0x7680, &(0x7f0000000180)) io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) 03:57:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendto$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x11, 0x4, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) 03:57:29 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x1, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) 03:57:29 executing program 2: syz_open_procfs(0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x401}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x488e0000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) 03:57:29 executing program 3: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$selinux_attr(r0, &(0x7f0000000040)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2e) r2 = socket$inet(0x2, 0x3, 0x5) accept$inet(r2, 0x0, 0x0) 03:57:29 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setregid(0x0, 0x0) 03:57:29 executing program 3: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$selinux_attr(r0, &(0x7f0000000040)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2e) r2 = socket$inet(0x2, 0x3, 0x5) accept$inet(r2, 0x0, 0x0) 03:57:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendto$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x11, 0x4, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) [ 319.990410][T17293] new mount options do not match the existing superblock, will be ignored [ 320.011305][T17308] loop5: detected capacity change from 0 to 264192 03:57:30 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)={0x18, r1, 0xb83914dfef694b0b, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 03:57:30 executing program 3: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$selinux_attr(r0, &(0x7f0000000040)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2e) r2 = socket$inet(0x2, 0x3, 0x5) accept$inet(r2, 0x0, 0x0) 03:57:30 executing program 3: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$selinux_attr(r0, &(0x7f0000000040)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2e) r2 = socket$inet(0x2, 0x3, 0x5) accept$inet(r2, 0x0, 0x0) 03:57:30 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x1, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) 03:57:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendto$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x11, 0x4, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) 03:57:30 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x0, 0x20000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000100)=0x1, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) perf_event_open$cgroup(&(0x7f00000001c0)={0x3, 0x80, 0x5, 0x2, 0x1, 0x81, 0x0, 0x7ff, 0x20, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, 0x0, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r0, &(0x7f0000000000)="d8", 0x1, 0x480a5, 0x0, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000040)) 03:57:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088", 0xbc) sendfile(r0, r1, 0x0, 0x1c500) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 03:57:30 executing program 2: syz_open_procfs(0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x401}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x488e0000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) 03:57:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendto$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x11, 0x4, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) 03:57:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088", 0xbc) sendfile(r0, r1, 0x0, 0x1c500) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 03:57:30 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x30, 0x0, &(0x7f0000000600)=0x90) [ 320.397949][T17351] new mount options do not match the existing superblock, will be ignored 03:57:30 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x1, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) 03:57:30 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x33000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = dup(r1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x6628, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0x400c00) [ 320.470082][T17363] loop5: detected capacity change from 0 to 264192 [ 320.472270][T17368] loop3: detected capacity change from 0 to 264192 03:57:30 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) fadvise64(r0, 0x0, 0x0, 0x5) 03:57:30 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310101004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000000400)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000500)=ANY=[]) creat(&(0x7f0000000100)='./file0/bus\x00', 0x0) 03:57:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088", 0xbc) sendfile(r0, r1, 0x0, 0x1c500) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 320.808099][T17383] new mount options do not match the existing superblock, will be ignored 03:57:30 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000440)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)={r1}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000280)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000001580)={r2, 0x1, r0, 0x4}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f00000001c0)={r2}) 03:57:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088", 0xbc) sendfile(r0, r1, 0x0, 0x1c500) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 03:57:30 executing program 4: r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r0, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) connect$netlink(r0, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) r1 = syz_io_uring_setup(0xea4, &(0x7f0000000080), &(0x7f000003f000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_STATX={0x15, 0x58ff346b9ab41012, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) io_uring_enter(r1, 0x450c, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmmsg(r0, &(0x7f0000000780), 0x3ffffffffffff81, 0x0, 0x0) [ 320.950117][T17401] loop5: detected capacity change from 0 to 264192 [ 320.951146][T17402] loop3: detected capacity change from 0 to 264192 03:57:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088", 0xbc) sendfile(r0, r1, 0x0, 0x1c500) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 03:57:33 executing program 2: syz_open_procfs(0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x401}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x488e0000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) 03:57:33 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0x10, 0x2, 0x0) sendto$inet6(r3, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff7f, 0x0, 0x0, 0x0) recvfrom$inet6(r3, &(0x7f0000000000)=""/60, 0x3c, 0x0, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000040)='vlan0\x00') openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000000)="480500001400", 0x6}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x200000000e26a, 0x0) 03:57:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088", 0xbc) sendfile(r0, r1, 0x0, 0x1c500) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 03:57:33 executing program 4: r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r0, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) connect$netlink(r0, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) r1 = syz_io_uring_setup(0xea4, &(0x7f0000000080), &(0x7f000003f000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_STATX={0x15, 0x58ff346b9ab41012, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) io_uring_enter(r1, 0x450c, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmmsg(r0, &(0x7f0000000780), 0x3ffffffffffff81, 0x0, 0x0) 03:57:33 executing program 1: syz_io_uring_setup(0x2e15, &(0x7f0000000240)={0x0, 0x0, 0x6, 0x2}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000002c0), &(0x7f0000000300)) [ 323.422925][T17449] loop5: detected capacity change from 0 to 264192 [ 323.433473][T17450] loop3: detected capacity change from 0 to 264192 03:57:33 executing program 1: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) [ 323.586618][T17460] netlink: 1276 bytes leftover after parsing attributes in process `syz-executor.0'. 03:57:33 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)={0x2c, r1, 0x1, 0x0, 0x0, {0x1c}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}]}]}, 0x2c}}, 0x0) 03:57:33 executing program 1: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x40086607, 0x0) 03:57:33 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(r0, &(0x7f0000000100)="370000005e001f3814584707f9f4ffffff000000020000001ff80000", 0x37) 03:57:33 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(r0, &(0x7f0000000100)="370000005e001f3814584707f9f4ffffff000000020000001ff80000", 0x37) 03:57:33 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(r0, &(0x7f0000000100)="370000005e001f3814584707f9f4ffffff000000020000001ff80000", 0x37) 03:57:33 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(r0, &(0x7f0000000100)="370000005e001f3814584707f9f4ffffff000000020000001ff80000", 0x37) 03:57:34 executing program 4: r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r0, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) connect$netlink(r0, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) r1 = syz_io_uring_setup(0xea4, &(0x7f0000000080), &(0x7f000003f000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_STATX={0x15, 0x58ff346b9ab41012, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) io_uring_enter(r1, 0x450c, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmmsg(r0, &(0x7f0000000780), 0x3ffffffffffff81, 0x0, 0x0) 03:57:34 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0x10, 0x2, 0x0) sendto$inet6(r3, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff7f, 0x0, 0x0, 0x0) recvfrom$inet6(r3, &(0x7f0000000000)=""/60, 0x3c, 0x0, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000040)='vlan0\x00') openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000000)="480500001400", 0x6}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x200000000e26a, 0x0) [ 324.326236][T17527] netlink: 1276 bytes leftover after parsing attributes in process `syz-executor.0'. 03:57:35 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000001c0)) 03:57:35 executing program 5: r0 = openat$ttyS3(0xffffff9c, &(0x7f0000000140), 0x0, 0x0) ppoll(&(0x7f0000000180)=[{r0}], 0x1, 0x0, 0x0, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 03:57:35 executing program 1: creat(&(0x7f0000004c40)='./file0\x00', 0x0) utimes(&(0x7f0000000440)='./file0\x00', 0x0) 03:57:35 executing program 3: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x4e141, 0x0) ftruncate(r1, 0x200004) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) pwritev2(r1, &(0x7f0000000140)=[{&(0x7f0000000440)='x', 0x1}], 0x1, 0x0, 0x0, 0x12) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 03:57:35 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) set_mempolicy(0x1, &(0x7f0000000680)=0x9, 0x2) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000140), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000180)={0x44, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MLSCATLST={0x18, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_TAGLST={0x4}]}, 0x44}}, 0x0) 03:57:35 executing program 4: r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r0, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) connect$netlink(r0, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) r1 = syz_io_uring_setup(0xea4, &(0x7f0000000080), &(0x7f000003f000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_STATX={0x15, 0x58ff346b9ab41012, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) io_uring_enter(r1, 0x450c, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmmsg(r0, &(0x7f0000000780), 0x3ffffffffffff81, 0x0, 0x0) 03:57:35 executing program 2: clone(0x1000500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)='fS\a', 0x3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) tkill(r0, 0x4) ptrace$cont(0x9, r0, 0x0, 0x4) 03:57:35 executing program 3: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="12d3c0b4321b1607725de5"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 03:57:35 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0x10, 0x2, 0x0) sendto$inet6(r3, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff7f, 0x0, 0x0, 0x0) recvfrom$inet6(r3, &(0x7f0000000000)=""/60, 0x3c, 0x0, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000040)='vlan0\x00') openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000000)="480500001400", 0x6}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x200000000e26a, 0x0) 03:57:35 executing program 5: r0 = socket(0x400000000000010, 0x802, 0x0) write(r0, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080040002007f196be0", 0x24) 03:57:35 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x3, 0x2) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000180)={'raw\x00'}, 0x0) 03:57:35 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="66530700ae897094e71b0fb1f147a8378f364602812c66538d750f6ee1d001f43f0500bb9fb045f2", 0x28}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) syz_io_uring_setup(0x85, &(0x7f0000000080), &(0x7f0000ffc000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 03:57:35 executing program 2: clone(0x1000500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)='fS\a', 0x3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) tkill(r0, 0x4) ptrace$cont(0x9, r0, 0x0, 0x4) 03:57:35 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in=@local, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@private1, 0x0, 0x3c}, 0x0, @in=@local}}, 0xe8) sendmmsg$inet6(r0, &(0x7f0000004640)=[{{&(0x7f00000000c0)={0xa, 0x4e21, 0x0, @local}, 0x1c, 0x0}}], 0x1, 0x0) 03:57:35 executing program 1: creat(&(0x7f0000000380)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1e0}], 0x0, &(0x7f0000010d00)) [ 325.227181][T17583] netlink: 1276 bytes leftover after parsing attributes in process `syz-executor.0'. 03:57:35 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000040)=0x1, 0xfff0) sendto$inet(r0, 0x0, 0x0, 0x20020080, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000340)="8b", 0x1, 0x4048084, 0x0, 0x0) close(r0) 03:57:35 executing program 5: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg(r0, &(0x7f0000003600)=[{{0x0, 0x2, 0x0}}, {{0x0, 0x0, &(0x7f0000000780), 0x2f3}}], 0x400000000000316, 0x24008040) [ 325.274897][T17589] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 325.292696][T17599] loop1: detected capacity change from 0 to 1 [ 325.314581][T17599] FAT-fs (loop1): Directory bread(block 3) failed [ 325.333081][T17599] FAT-fs (loop1): Directory bread(block 4) failed [ 325.339626][T17599] FAT-fs (loop1): Directory bread(block 5) failed [ 325.346768][T17599] FAT-fs (loop1): Directory bread(block 6) failed 03:57:35 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000080)=@newsa={0x164, 0x10, 0x1, 0x0, 0x0, {{@in, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {@in6=@ipv4={'\x00', '\xff\xff', @multicast1}, 0x0, 0x32}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha512_mb\x00'}}}, @replay_esn_val={0x1c}, @sec_ctx={0xc, 0x8, {0x8}}]}, 0x164}}, 0x0) 03:57:35 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="66530700ae897094e71b0fa1f147a8378f3657cdcf86db93aa6ed9cbc6a9e00b9e626aa995d690c8a2372286677850ab8e9b75839f0715a567dafe306f0818fd861ff11495d58553d8c11c606e13da9b8d26a566833fe1f9c730a5704ad5e4d3e877b43dc81ebcc32bc42d2365cabb38e6e694fc2bccd7c1a54f3152ed3fe2991f3d709806c8956b46a1f73ce7eb627e3f51787f45388d6c069b3be76258a81832efc6c76db29e10a8ade1b42df1a890806954c0dca746da8158030525adbe4851a7ab01ea9ae1f3dbc472c1e04f1e4bb32bf3d87bd1e87050b109181718761eb30d2f65f59fb2064f65ecbdb948255e", 0xf0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:57:35 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0xd931d3864d39dcdb) write$binfmt_elf32(r0, &(0x7f00000005c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x21}, [{}]}, 0x58) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 03:57:35 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0x10, 0x2, 0x0) sendto$inet6(r3, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff7f, 0x0, 0x0, 0x0) recvfrom$inet6(r3, &(0x7f0000000000)=""/60, 0x3c, 0x0, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000040)='vlan0\x00') openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000000)="480500001400", 0x6}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x200000000e26a, 0x0) 03:57:35 executing program 5: clock_settime(0xa, 0x0) 03:57:36 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) 03:57:36 executing program 4: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) [ 326.075166][ T25] audit: type=1326 audit(1621915056.019:466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17645 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 326.099342][T17649] netlink: 1276 bytes leftover after parsing attributes in process `syz-executor.0'. [ 326.175569][ T25] audit: type=1326 audit(1621915056.119:467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17645 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 03:57:38 executing program 2: clone(0x1000500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)='fS\a', 0x3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) tkill(r0, 0x4) ptrace$cont(0x9, r0, 0x0, 0x4) 03:57:38 executing program 1: syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) r1 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file1\x00', 0x84842, 0x0) write(r1, &(0x7f0000004200)='t', 0xfff4) 03:57:38 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x15, 0x0, 0x0, 0xffffffa1}, {0x15, 0x0, 0x0, 0x7}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 03:57:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x2) write$evdev(r1, &(0x7f000004d000)=[{}], 0xfffffe82) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0xd5) ioctl$EVIOCGKEY(r1, 0x80404518, 0x0) 03:57:38 executing program 4: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) 03:57:38 executing program 0: ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000080)) mremap(&(0x7f0000000000/0x9000)=nil, 0x200000, 0x600000, 0x3, &(0x7f0000a00000/0x600000)=nil) 03:57:38 executing program 5: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000001500)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x5e1, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 03:57:38 executing program 4: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) 03:57:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}}, {{@in=@dev, 0x0, 0x2b}, 0x0, @in6=@mcast2}}, 0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) 03:57:38 executing program 0: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) [ 328.269477][ T25] audit: type=1326 audit(1621915058.209:468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17663 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 328.299294][T17673] loop1: detected capacity change from 0 to 16 03:57:38 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) r0 = socket$inet6(0x10, 0x2, 0x0) getsockname(r0, 0x0, &(0x7f0000000300)) 03:57:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}}, {{@in=@dev, 0x0, 0x2b}, 0x0, @in6=@mcast2}}, 0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) [ 328.379170][ T25] audit: type=1326 audit(1621915058.319:469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17687 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 328.475255][ T25] audit: type=1326 audit(1621915058.419:470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17698 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 328.515363][ T25] audit: type=1326 audit(1621915058.419:471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17698 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 328.554904][ T25] audit: type=1326 audit(1621915058.449:472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17698 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=41 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 328.578932][ T25] audit: type=1326 audit(1621915058.449:473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17698 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 328.603168][ T25] audit: type=1326 audit(1621915058.449:474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17698 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 328.627336][ T25] audit: type=1326 audit(1621915058.449:475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17698 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=51 compat=0 ip=0x4665d9 code=0x7ffc0000 03:57:41 executing program 2: clone(0x1000500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)='fS\a', 0x3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) tkill(r0, 0x4) ptrace$cont(0x9, r0, 0x0, 0x4) 03:57:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7a}]}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r1) 03:57:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}}, {{@in=@dev, 0x0, 0x2b}, 0x0, @in6=@mcast2}}, 0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) 03:57:41 executing program 4: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) 03:57:41 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x5b, &(0x7f0000000280)="000000000000b50cec00050000000000000094bd9d45b0000000000000077d150801428a6a79940c9c0689bf74257a994a5cd7efad5175d8b454438488090804f443aa7ef6ee20c76b47e963c3ffe77d5dea167f8acc64392966d2"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:57:41 executing program 5: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000001500)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x5e1, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 03:57:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}}, {{@in=@dev, 0x0, 0x2b}, 0x0, @in6=@mcast2}}, 0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) 03:57:41 executing program 4: r0 = memfd_create(&(0x7f0000000000)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\x7f\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x00\x00\x00\x00\xa1\xa2\xe0g\x98', 0x0) fallocate(r0, 0x0, 0x0, 0x400001) fallocate(r0, 0x0, 0x0, 0x100000) 03:57:41 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = dup(r0) lseek(r1, 0x101, 0x0) getdents(r0, 0x0, 0x2000) [ 331.303257][ T25] kauditd_printk_skb: 8 callbacks suppressed [ 331.303267][ T25] audit: type=1326 audit(1621915061.249:484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17715 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 03:57:41 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x8000) close(r0) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) listen(r2, 0x0) shutdown(r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0xfb384c570e8c81b5}) 03:57:41 executing program 3: kexec_load(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x11972a000, 0x3e0000}], 0x0) 03:57:41 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000040)=0x1, 0xfff0) sendto$inet(r0, 0x0, 0x0, 0x20020080, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000340)="8b", 0x1, 0x4048084, 0x0, 0x0) recvfrom$inet(r0, &(0x7f00000000c0)=""/165, 0xa5, 0x0, 0x0, 0x0) close(r0) 03:57:44 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000040)=0x1, 0xfff0) sendto$inet(r0, 0x0, 0x0, 0x20020080, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000340)="8b", 0x1, 0x4048084, 0x0, 0x0) recvfrom$inet(r0, &(0x7f00000000c0)=""/165, 0xa5, 0x0, 0x0, 0x0) close(r0) 03:57:44 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @remote}}, {{0xa, 0x0, 0x0, @remote}}]}, 0x190) 03:57:44 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000000)={'nat\x00', 0x0, 0x0, 0x0, [0x3c37, 0xffffffff8675aff2, 0x0, 0x2, 0x6, 0x80]}, &(0x7f0000000080)=0x78) ioctl$sock_inet_SIOCDELRT(r0, 0x890b, &(0x7f0000000140)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x4}) 03:57:44 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x101000, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) 03:57:44 executing program 5: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000001500)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x5e1, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 03:57:44 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x401ffc000) fallocate(r0, 0x100000010, 0x4000, 0xe579) 03:57:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0xb, 0x4) sendmsg$netlink(r0, &(0x7f0000003280)={&(0x7f0000000040)=@kern={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000003200)=[{&(0x7f0000000080)={0x10, 0x19}, 0x10}, {&(0x7f0000001400)={0x28, 0x2a, 0x1, 0x0, 0x0, "", [@generic="893dc1ad1cc467d825d4ebd34237300b358b04f214"]}, 0x28}, {&(0x7f00000014c0)={0x18, 0x1f, 0x3, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @ipv4=@multicast1}]}, 0x18}], 0x3}, 0x0) 03:57:44 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newae={0x48, 0x1e, 0x1, 0x0, 0x0, {{@in=@empty}, @in=@private}, [@etimer_thresh={0x8}]}, 0x48}}, 0x0) 03:57:44 executing program 4: r0 = syz_io_uring_setup(0x2de5, &(0x7f0000000200), &(0x7f0000002000/0x10000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x4, 0x0, 0x5, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_OPENAT={0x12, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x1d) io_uring_enter(r0, 0xa2, 0x0, 0x0, 0x0, 0x0) 03:57:44 executing program 0: unshare(0x6e040400) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x7fff, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x301, 0xffffffffffffffff) 03:57:44 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5427, 0x0) [ 334.403342][T17795] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31 sclass=netlink_route_socket pid=17795 comm=syz-executor.3 [ 334.417451][T17795] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 03:57:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000011c0)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000100000001000000000000000b00000000020000280200000284", 0x62, 0x400}], 0x0, &(0x7f0000013a00)) [ 334.476200][T17807] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31 sclass=netlink_route_socket pid=17807 comm=syz-executor.3 [ 334.492481][T17807] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 03:57:44 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000040)=0x1, 0xfff0) sendto$inet(r0, 0x0, 0x0, 0x20020080, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000340)="8b", 0x1, 0x4048084, 0x0, 0x0) recvfrom$inet(r0, &(0x7f00000000c0)=""/165, 0xa5, 0x0, 0x0, 0x0) close(r0) 03:57:44 executing program 3: recvmsg(0xffffffffffffffff, 0x0, 0x40000021) clone(0x5001100, 0x0, &(0x7f0000000000), 0x0, 0x0) add_key(&(0x7f0000001540)='logon\x00', &(0x7f0000001580)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)='/de\x00C\xbf\x15\x87\xa4C\x88\f+\xdc\xe2Cd\x92;\xe6\x06ZA\xf2)\x84\x9dp\xf0\xce\xe6\x11\xcc\x13\xbe\x19\xe1\xce\xfc\x03\x99\x05\xe1\x8b\xe0Q.\xd6\x01\xe5T\xd8', 0x0) keyctl$revoke(0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000240)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000340)=""/83, 0x53}, {&(0x7f00000003c0)=""/124, 0x7c}, {&(0x7f00000002c0)=""/33, 0x21}, {&(0x7f0000000440)=""/157, 0x9d}, {&(0x7f00000016c0)=""/4096, 0x1000}], 0x5, &(0x7f00000026c0)=""/4096, 0x1000}, 0x40012122) 03:57:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="66530700ae897094e71b0fa1f147a8378f364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef230800", 0x33}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x1e) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00000000000000000000670000000800010000001e0d19a16ccc", @ANYRES32=0x0, @ANYBLOB="0800c300000000000800c40000000000"], 0x34}}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 03:57:44 executing program 0: unshare(0x6e040400) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x7fff, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x301, 0xffffffffffffffff) 03:57:44 executing program 5: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000001500)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x5e1, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 03:57:44 executing program 2: unshare(0x6e040400) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x7fff, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x301, 0xffffffffffffffff) 03:57:44 executing program 4: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x19c, &(0x7f00000002c0)="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"}}], 0x1c) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000001400)={0x1, &(0x7f00000013c0)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 03:57:44 executing program 3: r0 = mq_open(&(0x7f0000000000)='eth0\x00', 0x842, 0x0, 0x0) mq_timedreceive(r0, 0x0, 0xed9fc23d, 0x0, 0x0) 03:57:44 executing program 0: unshare(0x6e040400) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x7fff, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x301, 0xffffffffffffffff) 03:57:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x40, 0x2, 0x2, 0x201, 0x0, 0x0, {0x2}, [@CTA_TUPLE_REPLY={0x2c, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x25}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @local}}}]}]}, 0x40}}, 0x0) 03:57:44 executing program 3: set_mempolicy(0x3, &(0x7f0000000080)=0x5, 0x2) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000180)={0x0, 0x0, 0x0, 'queue1\x00'}) 03:57:44 executing program 4: fork() fork() fork() fork() fork() [ 334.809952][T17868] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 03:57:44 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000040)=0x1, 0xfff0) sendto$inet(r0, 0x0, 0x0, 0x20020080, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000340)="8b", 0x1, 0x4048084, 0x0, 0x0) recvfrom$inet(r0, &(0x7f00000000c0)=""/165, 0xa5, 0x0, 0x0, 0x0) close(r0) 03:57:44 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)='9', 0x1}, {&(0x7f0000000000)="82bb7102cc65c286306ece03f12c2bafb100000000000000e1a868", 0x1b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 03:57:44 executing program 0: unshare(0x6e040400) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x7fff, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x301, 0xffffffffffffffff) 03:57:44 executing program 2: unshare(0x6e040400) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x7fff, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x301, 0xffffffffffffffff) 03:57:45 executing program 2: unshare(0x6e040400) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x7fff, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x301, 0xffffffffffffffff) 03:57:45 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x7, &(0x7f0000000280)) fcntl$lock(r0, 0x26, &(0x7f0000000100)={0x1}) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x40001, 0x0, 0x0, 0x2}) 03:57:45 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$unix(0x1, 0x2, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 03:57:45 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00') setgroups(0x0, 0x0) preadv(r0, &(0x7f00000006c0)=[{&(0x7f0000000980)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 03:57:45 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae897094e71b0fa1f147a8378f3657cdcf86db93aa6ed9cbc6a9e00b9e626aa995d690c8a2372286677850ab8e9b75839f0715a567dafe306f0818fd861ff11495d58553d8c11c606e13da9b8d26a566833fe1f9c73899301d879b51848164e7b988889c753ba801e880c49a91e7b9486916ea7a348947d85d038e1ac9522c11", 0x84}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x1e) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="02000000010004000000000002000100", @ANYRES32, @ANYBLOB="040500000000100000000004", @ANYRES32, @ANYBLOB="08000500", @ANYRES32, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0xee00, @ANYBLOB="01000000", @ANYRES32, @ANYBLOB="08000300", @ANYRES32, @ANYBLOB="08000500", @ANYRES32=0xee00, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB="08000400", @ANYRES32=0xee01, @ANYBLOB="08000500", @ANYRES32, @ANYBLOB="100002"], 0x7c, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 03:57:45 executing program 5: unshare(0x8000400) r0 = mq_open(&(0x7f0000000080)='m$\x00\xdc\xb7\xb8\xd0>,\xb0\x13\x8b3z>K\x84\x05\x00\x00\x00\x9c\x81\xed\xc2\x00', 0x6e93ebbbcc0884ee, 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000100)) 03:57:45 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00') setgroups(0x0, 0x0) preadv(r0, &(0x7f00000006c0)=[{&(0x7f0000000980)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 03:57:45 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00') setgroups(0x0, 0x0) preadv(r0, &(0x7f00000006c0)=[{&(0x7f0000000980)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 03:57:45 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x1000}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x1000}, 0x4) r2 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r2, &(0x7f0000000480), 0x2e9, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 03:57:45 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x3c3) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)=""/72, 0x48}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r1, 0x0, 0x8, &(0x7f00000005c0)=ANY=[@ANYBLOB='0'], 0x1) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000140)=0xc) bind$packet(r0, &(0x7f0000000100)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r0, &(0x7f0000000080)="03042a015c0060004003002cfff57b016d2763bd56373780398d537500e50602591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa0008016005c2fd08d49a47eff71bc4131fe4c1f99bf00a900000008d1843e770afd6e9ef5837dbd0000000053", 0x3287, 0x4000002, 0x0, 0x2ff) 03:57:45 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00') setgroups(0x0, 0x0) preadv(r0, &(0x7f00000006c0)=[{&(0x7f0000000980)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 03:57:45 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000040)=0x1, 0x4) sendto$inet(r0, 0x0, 0x0, 0x20020001, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) 03:57:45 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000040)=0x1, 0x4) sendto$inet(r0, 0x0, 0x0, 0x20020001, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) 03:57:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) 03:57:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x31, &(0x7f0000000040), &(0x7f0000000080)=0x4) 03:57:46 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x1000}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x1000}, 0x4) r2 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r2, &(0x7f0000000480), 0x2e9, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 03:57:46 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000040)=0x1, 0x4) sendto$inet(r0, 0x0, 0x0, 0x20020001, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) 03:57:46 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x101}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r0 = syz_io_uring_setup(0x6b52, &(0x7f0000000080), &(0x7f0000000000/0x11000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000000040)) io_uring_enter(r0, 0x0, 0x45c5, 0x3, 0x0, 0x0) syz_io_uring_setup(0x187, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) io_uring_enter(r0, 0x3f3, 0x0, 0x0, 0x0, 0x0) 03:57:46 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000300)=@acquire={0x128, 0x17, 0x1, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, @in=@private, {@in6=@local, @in=@loopback}, {{@in=@multicast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xc0}}}}, 0x128}}, 0x0) 03:57:46 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x4) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x13, 0x0, &(0x7f0000000080)) 03:57:46 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000040)=0x1, 0x4) sendto$inet(r0, 0x0, 0x0, 0x20020001, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) 03:57:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x31, &(0x7f0000000040), &(0x7f0000000080)=0x4) 03:57:46 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x138) close(r0) r2 = socket$inet(0x2, 0x1, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x8972, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f00009322c4)={0x2, 0x0, @broadcast}, 0x10) setsockopt$inet_tcp_int(r2, 0x6, 0x19, &(0x7f0000000000)=0x1, 0x4) ioctl$int_in(r2, 0x5452, &(0x7f0000000040)=0x10000) 03:57:46 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8903, &(0x7f0000000000)={'macvlan0\x00', @ifru_addrs=@ethernet={0x0, @local}}) 03:57:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x31, &(0x7f0000000040), &(0x7f0000000080)=0x4) 03:57:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) 03:57:46 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x1000}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x1000}, 0x4) r2 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r2, &(0x7f0000000480), 0x2e9, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 03:57:46 executing program 2: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x1}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x20, 0x22, 0xa01, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid}]}]}, 0x20}}, 0x0) 03:57:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x5) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22}, 0x6d) 03:57:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x31, &(0x7f0000000040), &(0x7f0000000080)=0x4) 03:57:46 executing program 0: perf_event_open(&(0x7f000025c000)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa5}}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) 03:57:46 executing program 5: r0 = syz_io_uring_setup(0xa7, &(0x7f0000000080), &(0x7f0000ee6000/0x2000)=nil, &(0x7f000022f000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0xf0ffffff) 03:57:47 executing program 2: set_mempolicy(0x2, &(0x7f0000000180)=0x43, 0x8) select(0x40, &(0x7f0000000040)={0x5, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x4, 0xffffffffffffffff}, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 03:57:47 executing program 0: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f00000002c0)={0x7ff9}, 0x10) write(r0, &(0x7f0000000080)="240000001a005f0214f9f407000904001f000000fe030001000200000800040001000000", 0x24) [ 337.033493][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:57:47 executing program 5: r0 = socket$inet(0x2, 0x2000000000003, 0x2) setsockopt$inet_int(r0, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) r1 = socket$inet(0x2, 0x2000000000003, 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet_int(r1, 0x1f00000000000000, 0xd4, &(0x7f0000000040)=0x3, 0x4) [ 337.085174][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:57:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x5) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22}, 0x6d) 03:57:47 executing program 0: mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000001c0)={0x0, 0x252a, 0x8ad6, 0x3000000, '\x00', [{0x0, 0x0, 0x1800100}, {0x801, 0x0, 0x80000001}]}) [ 337.218156][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:57:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) 03:57:47 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4dc3", 0x2}], 0x1}, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 03:57:47 executing program 5: prctl$PR_MCE_KILL(0x23, 0x4, 0x550000) 03:57:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x5) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22}, 0x6d) 03:57:47 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)=0x0) timer_settime(r1, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) readv(r2, &(0x7f0000000600)=[{&(0x7f00000001c0)=""/140, 0x8c}], 0x1) write$P9_RRENAMEAT(r3, &(0x7f00000000c0)={0x7}, 0x7) 03:57:47 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x1000}, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x1000}, 0x4) r2 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r2, &(0x7f0000000480), 0x2e9, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 03:57:47 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prctl$PR_SET_MM_MAP(0x34, 0xe, 0x0, 0x0) 03:57:47 executing program 2: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 337.942683][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:57:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x5) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22}, 0x6d) 03:57:47 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{}, {0x0, @random="4bfed62370e5"}, 0x38, {0x2, 0x0, @local}}) 03:57:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)={0x0, 0x0, 0x11}, 0x18) 03:57:48 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="66530700ae897094e71b0f7ebea5a907b6502646db45a0e1401d7c87c9407ab960679fcb636483a04ede4c4616c150ea383e936bd19e8623ea2b74d397371c5599e3f03594378df9a1897b88fcd23094223b63568bcaf00bcfb78ca9fffcde260d3cdd10cb03c2c58d17c37d0f5c349ea8dff6bf6fbc51a6", 0x78}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 338.084504][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:57:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) 03:57:48 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000080)=0x3, 0x2) 03:57:48 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, 0x0, 0x0) gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x38, 0x3e9, 0x100, 0x70bd27, 0x25dfdbfb, {0x57, 0x1, 0x0, r0, 0x1, 0x4d, 0xfffffff7, 0x0, 0x0, 0xe1}, ["", "", "", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x4004800}, 0x4048041) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000380)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(0xffffffffffffffff, &(0x7f0000000440)=[{0x9, 0x6, 0x7, 0xdd, @time={0x8, 0x425}, {0xc1, 0x3}, {0x40, 0x3}, @addr={0x81, 0x11}}, {0x80, 0x8, 0x0, 0x3f, @tick=0x84, {0x3, 0x7}, {0xff, 0x4e}, @addr={0x3, 0xff}}, {0x2, 0x3, 0x40, 0x7f, @tick=0x4, {0x9e, 0xd}, {0x3, 0x4}, @queue={0x40, {0x1f, 0x7}}}, {0x6, 0xf9, 0x40, 0x3f, @time={0x9, 0xc9}, {0x9, 0x7}, {0x7}, @time=@tick=0x4}, {0x0, 0x2, 0x3, 0x1, @time={0xfffffc01, 0x8001}, {0x1, 0x80}, {}, @connect={{0x1, 0x81}}}, {0xfd, 0x80, 0x1, 0x7, @time={0x10001, 0x1}, {0x4, 0x7f}, {0x3f, 0x1}, @raw32={[0x1, 0xa494, 0x81]}}], 0xa8) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000040)) sched_setattr(r0, &(0x7f00000001c0)={0x38, 0x0, 0x8, 0x0, 0x0, 0xc2e7, 0xffffffffac3d2e01, 0x6, 0x1, 0xb8000000}, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc08c5336, &(0x7f00000002c0)={0x0, 0x0, 'client1\x00', 0x0, "c64664423e88d1b9", "6128d5fd7aab303377810f35d107ad01f65b23bc65f5618f2ce68f878874b876"}) 03:57:48 executing program 4: syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x40) 03:57:48 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="66530700ae897094e71b0f7ebea5a907b6502646db45a0e1401d7c87c9407ab960679fcb636483a04ede4c4616c150ea383e936bd19e8623ea2b74d397371c5599e3f03594378df9a1897b88fcd23094223b63568bcaf00bcfb78ca9fffcde260d3cdd10cb03c2c58d17c37d0f5c349ea8dff6bf6fbc51a6", 0x78}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:57:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@nouser_xattr}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) 03:57:48 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000000)=0x3, 0x4) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000040)=0xfc, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) 03:57:48 executing program 0: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000040)) r1 = io_uring_setup(0x7680, &(0x7f0000000180)) dup2(r0, r1) r2 = epoll_create1(0x0) epoll_pwait(r2, &(0x7f00000001c0)=[{}], 0x1, 0x1d6, 0x0, 0x0) 03:57:48 executing program 2: r0 = syz_io_uring_setup(0x85, &(0x7f0000000080), &(0x7f0000ffc000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000000)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x4, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_FALLOCATE={0x11, 0xc26f3ed1e40b24e6}, 0xe10b) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) 03:57:48 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x1, 0x4, 0x3, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5}]}, 0x1c}}, 0x0) 03:57:48 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r0, 0x0, 0x24, 0x0, 0x0) 03:57:48 executing program 4: r0 = syz_io_uring_setup(0x6ad4, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) r3 = open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r3, 0x0, &(0x7f0000000500)=[{&(0x7f0000000200)=""/15, 0xf}], 0x1}, 0x0) set_mempolicy(0x1, &(0x7f00000001c0)=0x1, 0x83) io_uring_enter(r0, 0x2b66, 0x0, 0x0, 0x0, 0x5e) 03:57:49 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCQ_RING_SIZE(r0, 0x541b) 03:57:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_INFO(r1, 0x80e85411, &(0x7f0000001480)=""/231) 03:57:49 executing program 0: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETMODE(r0, 0x4b3a, 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0x1) 03:57:49 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x1, 0x0, &(0x7f0000000080)) 03:57:51 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="66530700ae897094e71b0f7ebea5a907b6502646db45a0e1401d7c87c9407ab960679fcb636483a04ede4c4616c150ea383e936bd19e8623ea2b74d397371c5599e3f03594378df9a1897b88fcd23094223b63568bcaf00bcfb78ca9fffcde260d3cdd10cb03c2c58d17c37d0f5c349ea8dff6bf6fbc51a6", 0x78}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:57:51 executing program 3: r0 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f00000000c0)={0x0, 0x1, 0x0, 0x800}) 03:57:51 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000340)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @empty}, 0x1c) 03:57:51 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x22, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x0, 0x0}}], 0xfd63) 03:57:51 executing program 1: set_mempolicy(0x3, &(0x7f0000000140)=0x100000001, 0x7f) fsopen(&(0x7f0000000080)='nfs4\x00', 0x0) 03:57:51 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$inet_opts(r1, 0x0, 0xa, &(0x7f00000012c0)=""/4096, &(0x7f0000000040)=0x1000) 03:57:51 executing program 1: clone(0x25000180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x3, 0x0) 03:57:51 executing program 3: r0 = syz_io_uring_setup(0x187, &(0x7f0000000440), &(0x7f00006d5000/0x2000)=nil, &(0x7f00000cc000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x3082, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}}, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) r5 = socket$inet(0x2, 0x1, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) r7 = syz_open_dev$vcsu(&(0x7f0000000080), 0x9c, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000640)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@rights={{0x24, 0x1, 0x1, [r4, r5, r3, r6, r7]}}], 0x28}], 0x1, 0x0) io_uring_enter(r0, 0x6196, 0x0, 0x0, 0x0, 0x0) 03:57:51 executing program 2: prctl$PR_SET_SECUREBITS(0x1c, 0xf) r0 = open(&(0x7f0000000680)='./file0\x00', 0x8a040, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fcntl$setlease(r0, 0x400, 0x0) setreuid(0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setlease(r0, 0x400, 0x2) 03:57:51 executing program 4: r0 = getpgid(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000080)=""/138, 0x8a}, {0x0, 0x7ffffffff000}, {&(0x7f00000001c0)=""/33, 0x21}], 0x3, &(0x7f0000000440)=[{&(0x7f0000000380)=""/143, 0x8f}], 0x1, 0x0) 03:57:51 executing program 1: clone(0x25000180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x3, 0x0) 03:57:51 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)=0x10) io_setup(0x202, &(0x7f0000000200)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 03:57:54 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="66530700ae897094e71b0f7ebea5a907b6502646db45a0e1401d7c87c9407ab960679fcb636483a04ede4c4616c150ea383e936bd19e8623ea2b74d397371c5599e3f03594378df9a1897b88fcd23094223b63568bcaf00bcfb78ca9fffcde260d3cdd10cb03c2c58d17c37d0f5c349ea8dff6bf6fbc51a6", 0x78}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:57:54 executing program 1: clone(0x25000180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x3, 0x0) 03:57:54 executing program 4: io_setup(0x5a0f, &(0x7f0000000000)=0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000440)=[&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4}]) 03:57:54 executing program 3: r0 = syz_io_uring_setup(0x187, &(0x7f0000000440), &(0x7f00006d5000/0x2000)=nil, &(0x7f00000cc000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x3082, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}}, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) r5 = socket$inet(0x2, 0x1, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) r7 = syz_open_dev$vcsu(&(0x7f0000000080), 0x9c, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000640)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@rights={{0x24, 0x1, 0x1, [r4, r5, r3, r6, r7]}}], 0x28}], 0x1, 0x0) io_uring_enter(r0, 0x6196, 0x0, 0x0, 0x0, 0x0) 03:57:54 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 03:57:54 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffff, 0x87}) 03:57:54 executing program 1: clone(0x25000180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x3, 0x0) 03:57:54 executing program 3: r0 = syz_io_uring_setup(0x187, &(0x7f0000000440), &(0x7f00006d5000/0x2000)=nil, &(0x7f00000cc000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x3082, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}}, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) r5 = socket$inet(0x2, 0x1, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) r7 = syz_open_dev$vcsu(&(0x7f0000000080), 0x9c, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000640)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@rights={{0x24, 0x1, 0x1, [r4, r5, r3, r6, r7]}}], 0x28}], 0x1, 0x0) io_uring_enter(r0, 0x6196, 0x0, 0x0, 0x0, 0x0) 03:57:54 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f00000000c0)={{0x2, 0x0, @local}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @multicast1}}) [ 344.891171][ T25] audit: type=1326 audit(1621915074.840:485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18246 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 03:57:54 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket(0x10, 0x3, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004800)={0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="1c000000680005b100000016d001000002000000", @ANYRES32=0x0, @ANYBLOB="040006"], 0x1c}], 0x1}, 0x0) write$binfmt_misc(r1, &(0x7f00000001c0)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x33fe0, 0x0) 03:57:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x3c9c, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000002c0)={0x309080}, &(0x7f0000000340)='./file0\x00', 0x18}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x6) io_uring_enter(r1, 0x7f29, 0x0, 0x0, 0x0, 0x0) 03:57:54 executing program 3: r0 = syz_io_uring_setup(0x187, &(0x7f0000000440), &(0x7f00006d5000/0x2000)=nil, &(0x7f00000cc000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x3082, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}}, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) r5 = socket$inet(0x2, 0x1, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) r7 = syz_open_dev$vcsu(&(0x7f0000000080), 0x9c, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000640)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@rights={{0x24, 0x1, 0x1, [r4, r5, r3, r6, r7]}}], 0x28}], 0x1, 0x0) io_uring_enter(r0, 0x6196, 0x0, 0x0, 0x0, 0x0) [ 345.713756][ T25] audit: type=1326 audit(1621915075.660:486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18246 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 03:57:57 executing program 1: clock_adjtime(0xa, &(0x7f0000000000)) 03:57:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000000c0), 0x4) 03:57:57 executing program 4: io_setup(0x5a0f, &(0x7f0000000000)=0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000440)=[&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4}]) 03:57:57 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f00000004c0)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @dev}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2c, &(0x7f00000004c0)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @dev}}}, 0x108) 03:57:57 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 03:57:57 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001580)={&(0x7f0000000400)=@newsa={0x138, 0x10, 0x1, 0x0, 0x0, {{@in6=@empty, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in6=@mcast2, 0x20000, 0x6c}, @in6=@dev, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}}, 0x0) 03:57:57 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x891a, &(0x7f0000000140)=@buf) 03:57:57 executing program 1: clock_adjtime(0xa, &(0x7f0000000000)) 03:57:57 executing program 0: r0 = getpgid(0x0) syz_open_procfs$namespace(r0, 0x0) 03:57:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000340)={[{@fat=@codepage={'codepage', 0x3d, '437'}}]}) 03:57:57 executing program 1: clock_adjtime(0xa, &(0x7f0000000000)) [ 347.889752][ T25] audit: type=1326 audit(1621915077.840:487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18302 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 03:57:57 executing program 0: fchmodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) chown(&(0x7f0000000440)='./file0\x00', 0x0, 0xffffffffffffffff) 03:57:57 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xe, 0x5ee}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r1, r2, 0x0, 0x800000080004103) socket$packet(0x11, 0x0, 0x300) perf_event_open$cgroup(&(0x7f0000000400)={0x0, 0x80, 0x0, 0x6e, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000002c0), 0x2}, 0x41, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000}, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0x2) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) 03:57:57 executing program 4: io_setup(0x5a0f, &(0x7f0000000000)=0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000440)=[&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4}]) 03:57:57 executing program 1: clock_adjtime(0xa, &(0x7f0000000000)) 03:57:57 executing program 3: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="5c9a420200010000c8dc44"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) [ 347.963958][T18325] loop3: detected capacity change from 0 to 270 03:57:58 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 03:57:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=@allocspi={0xf8, 0x16, 0x2e183ad2054e624d, 0x0, 0x0, {{{@in=@remote, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in=@empty}, @in=@private}}}, 0xf8}}, 0x0) 03:57:58 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/timer_list\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000280)=""/172, 0xac, 0x1614) 03:57:58 executing program 5: setrlimit(0x7, &(0x7f0000000100)) r0 = fork() pidfd_open(r0, 0x0) 03:57:58 executing program 3: clone(0x66100d00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_netdev_private(r0, 0x89fb, &(0x7f0000000000)=':') 03:57:58 executing program 4: io_setup(0x5a0f, &(0x7f0000000000)=0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000440)=[&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4}]) 03:57:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x100, 0x4) pselect6(0x40, &(0x7f0000000180)={0x8}, 0x0, 0x0, 0x0, 0x0) 03:57:58 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x800, 0x0, 0x1, 0x1}, 0x20) 03:57:58 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x2, 0x11, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x400c841, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @dev}, 0x1c) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3", 0xffd8}], 0x1, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4007da3) 03:57:58 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='setgroups\x00') write$cgroup_netprio_ifpriomap(r0, 0x0, 0x7) 03:57:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xe, 0x5ee}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000300)={&(0x7f0000000040)={0x2, 0x4e24, @dev}, 0x10, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1400000000000200000100000000010400"], 0x18}, 0x0) getsockopt$inet6_buf(r1, 0x29, 0xd2, 0x0, &(0x7f0000000100)) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000180), 0x40000, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r2, 0x8935, &(0x7f0000000200)={'ip6gretap0\x00'}) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r3, r4, 0x0, 0x800000080004103) ioctl$TIOCL_SETSEL(r4, 0x541c, &(0x7f00000000c0)={0x2, {0x2, 0xd82, 0xaf8, 0x8, 0x100, 0x3}}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000140)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x97f, 0x2, 0x1, 0x8, 0x5, 0x800}, 0x20) socket$packet(0x11, 0x0, 0x300) sendto$packet(0xffffffffffffffff, 0x0, 0x5cc, 0x0, &(0x7f00000001c0), 0x14) [ 348.784110][ T25] audit: type=1326 audit(1621915078.730:488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18366 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 03:57:58 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) exit_group(0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000100)=""/58) [ 348.887624][ T25] audit: type=1326 audit(1621915078.830:489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18408 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 348.936083][ T25] audit: type=1326 audit(1621915078.830:490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18408 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=56 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 348.973293][ T25] audit: type=1326 audit(1621915078.830:491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18408 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 348.998025][ T25] audit: type=1326 audit(1621915078.830:492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18408 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=61 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 349.024315][ T25] audit: type=1326 audit(1621915078.870:493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18412 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 349.049310][ T25] audit: type=1326 audit(1621915078.870:494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18412 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=101 compat=0 ip=0x4665d9 code=0x7ffc0000 03:57:59 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 03:57:59 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='comm\x00') exit_group(0x0) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000140)='l', 0x1}], 0x1) 03:57:59 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) readv(r0, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/213, 0xd5}, {&(0x7f00000001c0)=""/173, 0xad}, {&(0x7f0000000400)=""/219, 0xdb}], 0x3) 03:57:59 executing program 0: r0 = socket$inet(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000380)) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000500)={'syztnl1\x00', &(0x7f0000000480)={'ip6tnl0\x00', 0x0, 0x29, 0x3, 0x6, 0x9, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, 0x7, 0x0, 0x3, 0x4}}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="240000001e0007021dfffd946f610500020003e8fe0208010001080008000c000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) r3 = openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.log\x00', 0x240, 0x1e6) write$sndseq(r3, &(0x7f0000000580)=[{0x0, 0x0, 0x0, 0x0, @tick, {0x0, 0x7}, {0x9, 0x20}, @raw32}, {0x0, 0x0, 0x0, 0x0, @time={0x0, 0xe8}, {0x80, 0x1}, {0x2, 0x7}, @raw8={"05dbfc30f0cbfebb22a1112d"}}, {0xff, 0x6, 0x3, 0x0, @tick=0x9d06, {0x6, 0x7}, {0x9, 0x51}, @raw8={"ce0f9ecac721b64527a0fe39"}}, {0x80, 0x7, 0x7, 0xff, @tick, {}, {}, @control={0x4, 0xbb, 0x1ff}}], 0x70) 03:57:59 executing program 4: r0 = timerfd_create(0x0, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) timerfd_settime(r0, 0x3, &(0x7f0000001440)={{0x77359400}, {r1, r2+10000000}}, 0x0) readv(r0, &(0x7f0000001340)=[{&(0x7f00000000c0)=""/51, 0x33}], 0x1) 03:57:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_opts(r2, 0x0, 0x32, &(0x7f0000937fed)=""/1, &(0x7f0000000080)=0x1) 03:57:59 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000), 0x248800) read(r0, &(0x7f0000000300)=""/67, 0x43) sendfile(r2, r2, 0x0, 0xdd3d) sendfile(r0, r1, 0x0, 0x10000000002500) 03:57:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@prjquota}]}) 03:57:59 executing program 4: socketpair(0x1, 0x805, 0x0, &(0x7f0000001680)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) write$char_usb(r2, 0x0, 0x0) 03:57:59 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000180), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={0x34, r2, 0x2b9, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MLSCATLST={0xc, 0x4, 0x0, 0x1, [{0x4}, {0x4}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}]}, 0x34}}, 0x0) 03:57:59 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) [ 349.632918][T18433] netlink: 'syz-executor.0': attribute type 12 has an invalid length. [ 349.641986][T18433] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 349.655555][T18433] netlink: 'syz-executor.0': attribute type 12 has an invalid length. [ 349.669347][T18433] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:57:59 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001a40)="66530700ae897094e7b126b097eaa769be6d28c41bd34e677d114b655ef5f0166391c68f70e44e260f82e8a9bfc92b1055f69a37237647e947e4df739526ecbb3987b178b1ead5a678216d5d3568dab9af7a4d5cc06f3eb349fd086c22e3fc56d2b0cae5170871c145045174ad6edb6b0a183dd660ef94af2121945b0d79bb5efadeaad6eaaf0ebc8ae15948eb13fe714f32449bb5e2bdfe6c86cc1d507694a8d504f1144634b26cafc25714cf7fdc166f16fa0d74cd1164f949d143aa7692731ed21fb541b7a2cc83eb76be0952aea033004c34140785d3135a259470f3b7daeac815daf1bc482dee541c06871fb4994c50a2ae4a4734be9865110b7c11ed30f800ed6f71b72186f32cbea5651265bd89e818219d421ee201b12dab2d61bb708197db89f0ebd9f839a6ba32365538315429fe", 0x133}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) tkill(r0, 0x2) ptrace$cont(0x9, r0, 0x0, 0x0) [ 349.716506][T18454] loop3: detected capacity change from 0 to 4 [ 349.724761][T18454] EXT4-fs (loop3): Project quota feature not enabled. Cannot enable project quota enforcement. 03:58:00 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000080)={0x3, 0x3, 0x80}) 03:58:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@prjquota}]}) 03:58:00 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000180), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={0x34, r2, 0x2b9, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MLSCATLST={0xc, 0x4, 0x0, 0x1, [{0x4}, {0x4}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}]}, 0x34}}, 0x0) 03:58:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0xfd06) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x43, 0x0, "7fc3eb20dc86d7a0718d638ae8a3ced80d598060e6b0d20e36819465580df86281b2440cd50978bd2b090d43402d88386e2ac0c00eed85421f3d52026a4518084c49e3e4af6e6018460f430cdafce76a"}, 0xd8) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x56) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4) 03:58:00 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000140)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}, 0xa}]}) 03:58:00 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000180), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={0x34, r2, 0x2b9, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MLSCATLST={0xc, 0x4, 0x0, 0x1, [{0x4}, {0x4}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}]}, 0x34}}, 0x0) [ 350.511748][T18490] loop3: detected capacity change from 0 to 4 [ 350.535202][T18490] EXT4-fs (loop3): Project quota feature not enabled. Cannot enable project quota enforcement. [ 350.556178][T18504] tmpfs: Bad value for 'mpol' [ 350.564156][T18506] tmpfs: Bad value for 'mpol' 03:58:00 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000), 0x248800) read(r0, &(0x7f0000000300)=""/67, 0x43) sendfile(r2, r2, 0x0, 0xdd3d) sendfile(r0, r1, 0x0, 0x10000000002500) 03:58:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)={0x64, 0x0, 0x1, 0x401, 0x0, 0x1a14, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}]}, 0x64}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)={0x68, 0x0, 0x1, 0x401, 0x0, 0x1a14, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) 03:58:00 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000180), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={0x34, r2, 0x2b9, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MLSCATLST={0xc, 0x4, 0x0, 0x1, [{0x4}, {0x4}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}]}, 0x34}}, 0x0) 03:58:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@prjquota}]}) 03:58:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2200c0, 0x0) readlinkat(r0, &(0x7f0000002300)='\x00', &(0x7f0000002340)=""/55, 0x37) [ 350.653476][T18527] loop3: detected capacity change from 0 to 4 [ 350.666158][T18527] EXT4-fs (loop3): Project quota feature not enabled. Cannot enable project quota enforcement. 03:58:02 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001a40)="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", 0x133}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) tkill(r0, 0x2) ptrace$cont(0x9, r0, 0x0, 0x0) 03:58:02 executing program 2: set_mempolicy(0x4, 0x0, 0x0) set_mempolicy(0x4, 0x0, 0x0) 03:58:02 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), r0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x100, 0x70bd2e, 0x25dfdbfb}, 0x14}}, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) sendmsg$netlink(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000001a000100000619f4027c3b093f"], 0x1c}], 0x1}, 0x0) 03:58:02 executing program 0: pkey_mprotect(&(0x7f0000ff5000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000ff6000/0x4000)=nil) 03:58:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@prjquota}]}) 03:58:02 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000), 0x248800) read(r0, &(0x7f0000000300)=""/67, 0x43) sendfile(r2, r2, 0x0, 0xdd3d) sendfile(r0, r1, 0x0, 0x10000000002500) 03:58:02 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) recvmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000000)=""/133, 0x85}, {&(0x7f00000002c0)=""/130, 0x82}, {0x0}, {&(0x7f0000000380)=""/161, 0xa1}, {&(0x7f0000000440)=""/184, 0xb8}, {&(0x7f0000000500)=""/153, 0x99}, {&(0x7f00000005c0)=""/213, 0xd5}, {&(0x7f0000000180)=""/53, 0x35}, {&(0x7f00000006c0)=""/244, 0xf4}], 0x9}}], 0x2102, 0x0, 0x0) 03:58:02 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000200)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="dd9d985c"], &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='msdos\x00', 0x0, 0x0) 03:58:02 executing program 1: setresuid(0xee00, 0xee01, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000780)={0x0, 0x7, &(0x7f0000000740)=[{&(0x7f00000005c0)={0x1c, 0x19, 0x1, 0x0, 0x0, "", [@typed={0x2, 0x0, 0x0, 0x0, @str='(-[!#-\x00'}]}, 0x1c}], 0x1}, 0x0) [ 352.787374][T18550] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 352.795132][T18551] loop3: detected capacity change from 0 to 4 [ 352.814907][T18551] EXT4-fs (loop3): Project quota feature not enabled. Cannot enable project quota enforcement. [ 352.818943][T18556] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 352.875426][T18564] loop2: detected capacity change from 0 to 264192 03:58:02 executing program 3: set_mempolicy(0x3, &(0x7f0000000000)=0x3, 0x9) syz_btf_id_by_name$bpf_lsm(0x0) 03:58:02 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prctl$PR_GET_TSC(0x19, &(0x7f00000000c0)) 03:58:02 executing program 2: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000080)=0x400000001, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0x22, &(0x7f0000356000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:58:05 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001a40)="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", 0x133}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) tkill(r0, 0x2) ptrace$cont(0x9, r0, 0x0, 0x0) 03:58:05 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prctl$PR_GET_TSC(0x19, &(0x7f00000000c0)) 03:58:05 executing program 3: set_mempolicy(0x3, &(0x7f0000000000)=0x3, 0x9) syz_btf_id_by_name$bpf_lsm(0x0) 03:58:05 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x81ff, 0x0) r0 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) close(r0) 03:58:05 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000), 0x248800) read(r0, &(0x7f0000000300)=""/67, 0x43) sendfile(r2, r2, 0x0, 0xdd3d) sendfile(r0, r1, 0x0, 0x10000000002500) 03:58:05 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) recvmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000000)=""/133, 0x85}, {&(0x7f00000002c0)=""/130, 0x82}, {0x0}, {&(0x7f0000000380)=""/161, 0xa1}, {&(0x7f0000000440)=""/184, 0xb8}, {&(0x7f0000000500)=""/153, 0x99}, {&(0x7f00000005c0)=""/213, 0xd5}, {&(0x7f0000000180)=""/53, 0x35}, {&(0x7f00000006c0)=""/244, 0xf4}], 0x9}}], 0x2102, 0x0, 0x0) 03:58:05 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prctl$PR_GET_TSC(0x19, &(0x7f00000000c0)) 03:58:05 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001a40)="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", 0x133}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) tkill(r0, 0x2) ptrace$cont(0x9, r0, 0x0, 0x0) 03:58:05 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prctl$PR_GET_TSC(0x19, &(0x7f00000000c0)) [ 355.806137][ T25] kauditd_printk_skb: 15 callbacks suppressed [ 355.806145][ T25] audit: type=1326 audit(1621915085.742:510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18604 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 03:58:05 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) recvmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000000)=""/133, 0x85}, {&(0x7f00000002c0)=""/130, 0x82}, {0x0}, {&(0x7f0000000380)=""/161, 0xa1}, {&(0x7f0000000440)=""/184, 0xb8}, {&(0x7f0000000500)=""/153, 0x99}, {&(0x7f00000005c0)=""/213, 0xd5}, {&(0x7f0000000180)=""/53, 0x35}, {&(0x7f00000006c0)=""/244, 0xf4}], 0x9}}], 0x2102, 0x0, 0x0) 03:58:05 executing program 3: set_mempolicy(0x3, &(0x7f0000000000)=0x3, 0x9) syz_btf_id_by_name$bpf_lsm(0x0) 03:58:05 executing program 3: set_mempolicy(0x3, &(0x7f0000000000)=0x3, 0x9) syz_btf_id_by_name$bpf_lsm(0x0) 03:58:06 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000000), 0x4) 03:58:06 executing program 3: r0 = syz_io_uring_setup(0x533, &(0x7f0000000580), &(0x7f0000ffa000/0x3000)=nil, &(0x7f00005ea000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000240)=0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000500)=@in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}}, 0x0) io_uring_enter(r0, 0x266f, 0x0, 0x0, 0x0, 0x0) 03:58:06 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000005c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 356.220796][ T25] audit: type=1326 audit(1621915086.162:511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18646 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 356.245461][ T25] audit: type=1326 audit(1621915086.162:512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18646 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=276 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 356.273131][ T25] audit: type=1326 audit(1621915086.162:513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18646 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 356.297801][ T25] audit: type=1326 audit(1621915086.162:514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18646 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=157 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 356.322263][ T25] audit: type=1326 audit(1621915086.192:515): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18646 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 03:58:06 executing program 2: r0 = fsopen(&(0x7f0000000040)='binfmt_misc\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f00000000c0)='+\x00', &(0x7f0000000100)='silent\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000080)='silent\x00', 0x0, 0x0) read(r0, 0x0, 0x0) close(r0) 03:58:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000001700)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$evdev(0xffffffffffffffff, &(0x7f00000001c0)=[{{0x0, 0x2710}, 0x14, 0x6}], 0x18) r1 = syz_open_dev$evdev(&(0x7f00000000c0), 0x2, 0x822b01) write$char_usb(r1, &(0x7f0000000040)="e2", 0x570) 03:58:06 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) recvmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000000)=""/133, 0x85}, {&(0x7f00000002c0)=""/130, 0x82}, {0x0}, {&(0x7f0000000380)=""/161, 0xa1}, {&(0x7f0000000440)=""/184, 0xb8}, {&(0x7f0000000500)=""/153, 0x99}, {&(0x7f00000005c0)=""/213, 0xd5}, {&(0x7f0000000180)=""/53, 0x35}, {&(0x7f00000006c0)=""/244, 0xf4}], 0x9}}], 0x2102, 0x0, 0x0) 03:58:06 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="7d2090d195508be35b471eff6c4c098619b5b0df99b310741e9cd8b718d85a3c51979d17b0841ae9ff2c9ad52946b8325500", 0x32}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 356.631445][ T25] audit: type=1326 audit(1621915086.572:516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18604 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 03:58:08 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) recvmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000000)=""/133, 0x85}, {&(0x7f00000002c0)=""/130, 0x82}, {0x0}, {&(0x7f0000000380)=""/161, 0xa1}, {&(0x7f0000000440)=""/184, 0xb8}, {&(0x7f0000000500)=""/153, 0x99}, {&(0x7f00000005c0)=""/213, 0xd5}, {&(0x7f0000000180)=""/53, 0x35}, {&(0x7f00000006c0)=""/244, 0xf4}], 0x9}}], 0x2102, 0x0, 0x0) 03:58:08 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="7d2090d195508be35b471eff6c4c098619b5b0df99b310741e9cd8b718d85a3c51979d17b0841ae9ff2c9ad52946b8325500", 0x32}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 03:58:08 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$BLKPBSZGET(r0, 0x80041285, &(0x7f00000000c0)) 03:58:08 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(r0, 0x5606, 0x0) 03:58:08 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73662a7b3b00088001000240000004f801", 0x17}, {&(0x7f0000000240)="53595a4b414c4c45522020080000e780325132510000e78c3312b1000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020100016e870325132510000e870325103000000000041660069006c00650031000f00100000ffffffffffffffffffff0000ffffffff46494c4531202020202020200016e809005132510000e870325105000a00000141660069006c00650032000f00140000ffffffffffffffffffff0000ffffffff4629d09efa274dd48de284c918e76bf71fc0be6eb61f71b71968ad36d765303149ae1da38f32ded124f1c00e", 0xec, 0x1800}], 0x0, &(0x7f0000010d00)) getdents64(r0, &(0x7f0000000080)=""/114, 0x72) 03:58:08 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) recvmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000000)=""/133, 0x85}, {&(0x7f00000002c0)=""/130, 0x82}, {0x0}, {&(0x7f0000000380)=""/161, 0xa1}, {&(0x7f0000000440)=""/184, 0xb8}, {&(0x7f0000000500)=""/153, 0x99}, {&(0x7f00000005c0)=""/213, 0xd5}, {&(0x7f0000000180)=""/53, 0x35}, {&(0x7f00000006c0)=""/244, 0xf4}], 0x9}}], 0x2102, 0x0, 0x0) 03:58:08 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x2) 03:58:08 executing program 2: clone(0x1000500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="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", 0x1ad}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 358.915193][T18682] loop2: detected capacity change from 0 to 24 03:58:09 executing program 3: r0 = socket(0x10, 0x2, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r0, &(0x7f0000000400)={&(0x7f0000000200), 0xffd3, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x0, 0x0, {}, [{{@pci={{0x30}, {0x11}}, {0x8}}, {0x8}, {0x6}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x8}, {0x6}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x8}, {0x6}}]}, 0xe8}}, 0x0) 03:58:09 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="7d2090d195508be35b471eff6c4c098619b5b0df99b310741e9cd8b718d85a3c51979d17b0841ae9ff2c9ad52946b8325500", 0x32}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 03:58:09 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2b, &(0x7f0000000040), 0x4) 03:58:09 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2b, &(0x7f0000000040), 0x4) [ 359.425193][T18708] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18708 comm=syz-executor.3 03:58:09 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="7d2090d195508be35b471eff6c4c098619b5b0df99b310741e9cd8b718d85a3c51979d17b0841ae9ff2c9ad52946b8325500", 0x32}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 03:58:09 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="c76304000000463d9c907b"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 03:58:09 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) recvmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000000)=""/133, 0x85}, {&(0x7f00000002c0)=""/130, 0x82}, {0x0}, {&(0x7f0000000380)=""/161, 0xa1}, {&(0x7f0000000440)=""/184, 0xb8}, {&(0x7f0000000500)=""/153, 0x99}, {&(0x7f00000005c0)=""/213, 0xd5}, {&(0x7f0000000180)=""/53, 0x35}, {&(0x7f00000006c0)=""/244, 0xf4}], 0x9}}], 0x2102, 0x0, 0x0) 03:58:09 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2b, &(0x7f0000000040), 0x4) 03:58:09 executing program 2: mkdir(0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x2000, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000), 0x3eb, 0xc082) r1 = memfd_create(&(0x7f0000000280)='\xfaIh\x05\x00K\x99F\x16\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_{T\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfbK\'\x06\r\xf8\x96\"\xe3\xd5\xc2\x818\x1f\xbf\x8c&`A-T\xbb)\x12\xbf\xfa\xc6\xefe\tM\xe6\xe5\xe9[\xdd\x90J\x18\xaa\x91$\x02\xf8\xcb\xa3\xfatw\xb9\x00\xdfA\xa5\x9d\tk\x16\x16T\x8c\x18\xb4\xb0\x7f\x8a:\xbb\x97M+\xbc5\f\xf8\xc0>\x9e\x11\x00'/140, 0x0) pwritev(r1, &(0x7f0000000380)=[{0x0}, {&(0x7f00000001c0)="e930", 0x2}], 0x2, 0x4081002, 0x3) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f00000000c0)="f5d645f379dbb31f14692701d03d3c1026e23c85c513414af9181827f3c08207bb2179cf1449651cc82c7da02aeb97f0c59dd192057743bca055cc2b44c320711a9959a865acff5e08ff7192f1c777fcafef4f482274414aff99f4b82683c08f74ff2db1232b2e919652d6aac617b01a43a941cfb100a2f8100490dd132f013dd9dadd", 0x83}, {&(0x7f0000000400)}, {&(0x7f0000000180)="585cdd84c2c26f5a2144a0607f52b9282e", 0x11}], 0x3, 0x5) io_uring_enter(0xffffffffffffffff, 0x1c24, 0x5962, 0x0, &(0x7f00000003c0)={[0xf3e]}, 0x8) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) fallocate(r0, 0x11, 0x0, 0x100007e00) r2 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000040)='./file0\x00', 0xc000, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r2) 03:58:09 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x89, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) 03:58:09 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2b, &(0x7f0000000040), 0x4) 03:58:09 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="310000001e00010a"], 0x14}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[], 0xfffffc7b) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x4001}, 0x10) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 03:58:09 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0x7ff}, {0x6, 0x45, 0xfd}]}, 0x10) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x700, 0x0, 0xffffffffffffff39) [ 359.824476][T18735] loop3: detected capacity change from 0 to 132104 03:58:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:58:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000640007031dfffd946f610500070003047d5b000077000000421ba3a20400ff7e280000001100ffffba16a0aa1c0900000000000013000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 03:58:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$sock(r0, &(0x7f0000000080)=[{{&(0x7f0000000640)=@in={0xa, 0x4e20, @broadcast}, 0x80, 0x0}}, {{&(0x7f0000000000)=@in={0x2, 0x4e24, @private}, 0x80, 0x0, 0x0, &(0x7f0000000180)=[@timestamping={{0x14, 0x1, 0x25, 0x4}}], 0x18}}], 0x2, 0x0) [ 360.007809][T18751] netlink: 21 bytes leftover after parsing attributes in process `syz-executor.3'. 03:58:10 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0x7ff}, {0x6, 0x45, 0xfd}]}, 0x10) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x700, 0x0, 0xffffffffffffff39) 03:58:10 executing program 0: perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x6}, 0x40, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x3000002, 0x40032, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4000040, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000440)={0x2, r1}) fcntl$setlease(r0, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x2) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x3, 0x9, 0x1f, 0x30, 0x0, 0x1, 0x676ea210ac6c34bf, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x9287c07, 0x0, @perf_config_ext={0x401, 0x5}, 0x2, 0x0, 0x81, 0x2, 0x7, 0x9c0f, 0x8b31, 0x0, 0x4, 0x0, 0x8}, 0xffffffffffffffff, 0x9, r0, 0x0) mlock2(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) fork() mlock2(&(0x7f0000ec3000/0x4000)=nil, 0x4000, 0x0) [ 360.055838][T18755] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 360.124145][T18758] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 03:58:10 executing program 2: mkdir(0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x2000, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000), 0x3eb, 0xc082) r1 = memfd_create(&(0x7f0000000280)='\xfaIh\x05\x00K\x99F\x16\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_{T\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfbK\'\x06\r\xf8\x96\"\xe3\xd5\xc2\x818\x1f\xbf\x8c&`A-T\xbb)\x12\xbf\xfa\xc6\xefe\tM\xe6\xe5\xe9[\xdd\x90J\x18\xaa\x91$\x02\xf8\xcb\xa3\xfatw\xb9\x00\xdfA\xa5\x9d\tk\x16\x16T\x8c\x18\xb4\xb0\x7f\x8a:\xbb\x97M+\xbc5\f\xf8\xc0>\x9e\x11\x00'/140, 0x0) pwritev(r1, &(0x7f0000000380)=[{0x0}, {&(0x7f00000001c0)="e930", 0x2}], 0x2, 0x4081002, 0x3) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f00000000c0)="f5d645f379dbb31f14692701d03d3c1026e23c85c513414af9181827f3c08207bb2179cf1449651cc82c7da02aeb97f0c59dd192057743bca055cc2b44c320711a9959a865acff5e08ff7192f1c777fcafef4f482274414aff99f4b82683c08f74ff2db1232b2e919652d6aac617b01a43a941cfb100a2f8100490dd132f013dd9dadd", 0x83}, {&(0x7f0000000400)}, {&(0x7f0000000180)="585cdd84c2c26f5a2144a0607f52b9282e", 0x11}], 0x3, 0x5) io_uring_enter(0xffffffffffffffff, 0x1c24, 0x5962, 0x0, &(0x7f00000003c0)={[0xf3e]}, 0x8) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) fallocate(r0, 0x11, 0x0, 0x100007e00) r2 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000040)='./file0\x00', 0xc000, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r2) 03:58:10 executing program 4: setreuid(0x0, 0xee01) r0 = socket(0x2, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x891a, &(0x7f0000000040)) 03:58:10 executing program 0: perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x6}, 0x40, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x3000002, 0x40032, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4000040, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000440)={0x2, r1}) fcntl$setlease(r0, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x2) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x3, 0x9, 0x1f, 0x30, 0x0, 0x1, 0x676ea210ac6c34bf, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x9287c07, 0x0, @perf_config_ext={0x401, 0x5}, 0x2, 0x0, 0x81, 0x2, 0x7, 0x9c0f, 0x8b31, 0x0, 0x4, 0x0, 0x8}, 0xffffffffffffffff, 0x9, r0, 0x0) mlock2(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) fork() mlock2(&(0x7f0000ec3000/0x4000)=nil, 0x4000, 0x0) 03:58:10 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0x7ff}, {0x6, 0x45, 0xfd}]}, 0x10) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x700, 0x0, 0xffffffffffffff39) 03:58:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl(r1, 0x937e, &(0x7f0000000500)="0100000000000000180100000500c10003050000000000b42f") [ 360.713876][T18781] loop3: detected capacity change from 0 to 132104 03:58:10 executing program 3: r0 = gettid() capget(&(0x7f00000016c0)={0x19980330, r0}, &(0x7f0000001700)) 03:58:10 executing program 1: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x2, 0x0, r3, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0x0) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x7ffff000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r6, 0x0) io_uring_enter(r0, 0x6196, 0x0, 0x0, 0x0, 0x0) 03:58:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[], 0x1a0) fallocate(r0, 0x100000003, 0x0, 0x80019c) 03:58:10 executing program 0: perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x6}, 0x40, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x3000002, 0x40032, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4000040, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000440)={0x2, r1}) fcntl$setlease(r0, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x2) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x3, 0x9, 0x1f, 0x30, 0x0, 0x1, 0x676ea210ac6c34bf, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x9287c07, 0x0, @perf_config_ext={0x401, 0x5}, 0x2, 0x0, 0x81, 0x2, 0x7, 0x9c0f, 0x8b31, 0x0, 0x4, 0x0, 0x8}, 0xffffffffffffffff, 0x9, r0, 0x0) mlock2(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) fork() mlock2(&(0x7f0000ec3000/0x4000)=nil, 0x4000, 0x0) [ 360.854949][T18803] capability: warning: `syz-executor.3' uses 32-bit capabilities (legacy support in use) 03:58:10 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0x7ff}, {0x6, 0x45, 0xfd}]}, 0x10) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x700, 0x0, 0xffffffffffffff39) 03:58:10 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000080)='./bus\x00', 0x0) set_mempolicy(0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) 03:58:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[], 0x1a0) fallocate(r0, 0x100000003, 0x0, 0x80019c) 03:58:10 executing program 2: mkdir(0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x2000, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000), 0x3eb, 0xc082) r1 = memfd_create(&(0x7f0000000280)='\xfaIh\x05\x00K\x99F\x16\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_{T\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfbK\'\x06\r\xf8\x96\"\xe3\xd5\xc2\x818\x1f\xbf\x8c&`A-T\xbb)\x12\xbf\xfa\xc6\xefe\tM\xe6\xe5\xe9[\xdd\x90J\x18\xaa\x91$\x02\xf8\xcb\xa3\xfatw\xb9\x00\xdfA\xa5\x9d\tk\x16\x16T\x8c\x18\xb4\xb0\x7f\x8a:\xbb\x97M+\xbc5\f\xf8\xc0>\x9e\x11\x00'/140, 0x0) pwritev(r1, &(0x7f0000000380)=[{0x0}, {&(0x7f00000001c0)="e930", 0x2}], 0x2, 0x4081002, 0x3) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f00000000c0)="f5d645f379dbb31f14692701d03d3c1026e23c85c513414af9181827f3c08207bb2179cf1449651cc82c7da02aeb97f0c59dd192057743bca055cc2b44c320711a9959a865acff5e08ff7192f1c777fcafef4f482274414aff99f4b82683c08f74ff2db1232b2e919652d6aac617b01a43a941cfb100a2f8100490dd132f013dd9dadd", 0x83}, {&(0x7f0000000400)}, {&(0x7f0000000180)="585cdd84c2c26f5a2144a0607f52b9282e", 0x11}], 0x3, 0x5) io_uring_enter(0xffffffffffffffff, 0x1c24, 0x5962, 0x0, &(0x7f00000003c0)={[0xf3e]}, 0x8) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) fallocate(r0, 0x11, 0x0, 0x100007e00) r2 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000040)='./file0\x00', 0xc000, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r2) 03:58:10 executing program 0: perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x6}, 0x40, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x3000002, 0x40032, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4000040, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000440)={0x2, r1}) fcntl$setlease(r0, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x2) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x3, 0x9, 0x1f, 0x30, 0x0, 0x1, 0x676ea210ac6c34bf, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x9287c07, 0x0, @perf_config_ext={0x401, 0x5}, 0x2, 0x0, 0x81, 0x2, 0x7, 0x9c0f, 0x8b31, 0x0, 0x4, 0x0, 0x8}, 0xffffffffffffffff, 0x9, r0, 0x0) mlock2(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) fork() mlock2(&(0x7f0000ec3000/0x4000)=nil, 0x4000, 0x0) 03:58:11 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[], 0x1a0) fallocate(r0, 0x100000003, 0x0, 0x80019c) 03:58:11 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db000800000000000023c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b58773", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x40) 03:58:11 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[], 0x1a0) fallocate(r0, 0x100000003, 0x0, 0x80019c) 03:58:11 executing program 5: clone3(&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0xac) [ 361.095530][T18816] loop3: detected capacity change from 0 to 16 03:58:11 executing program 1: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x2, 0x0, r3, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0x0) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x7ffff000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r6, 0x0) io_uring_enter(r0, 0x6196, 0x0, 0x0, 0x0, 0x0) 03:58:11 executing program 2: mkdir(0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x2000, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000), 0x3eb, 0xc082) r1 = memfd_create(&(0x7f0000000280)='\xfaIh\x05\x00K\x99F\x16\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_{T\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfbK\'\x06\r\xf8\x96\"\xe3\xd5\xc2\x818\x1f\xbf\x8c&`A-T\xbb)\x12\xbf\xfa\xc6\xefe\tM\xe6\xe5\xe9[\xdd\x90J\x18\xaa\x91$\x02\xf8\xcb\xa3\xfatw\xb9\x00\xdfA\xa5\x9d\tk\x16\x16T\x8c\x18\xb4\xb0\x7f\x8a:\xbb\x97M+\xbc5\f\xf8\xc0>\x9e\x11\x00'/140, 0x0) pwritev(r1, &(0x7f0000000380)=[{0x0}, {&(0x7f00000001c0)="e930", 0x2}], 0x2, 0x4081002, 0x3) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f00000000c0)="f5d645f379dbb31f14692701d03d3c1026e23c85c513414af9181827f3c08207bb2179cf1449651cc82c7da02aeb97f0c59dd192057743bca055cc2b44c320711a9959a865acff5e08ff7192f1c777fcafef4f482274414aff99f4b82683c08f74ff2db1232b2e919652d6aac617b01a43a941cfb100a2f8100490dd132f013dd9dadd", 0x83}, {&(0x7f0000000400)}, {&(0x7f0000000180)="585cdd84c2c26f5a2144a0607f52b9282e", 0x11}], 0x3, 0x5) io_uring_enter(0xffffffffffffffff, 0x1c24, 0x5962, 0x0, &(0x7f00000003c0)={[0xf3e]}, 0x8) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) fallocate(r0, 0x11, 0x0, 0x100007e00) r2 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000040)='./file0\x00', 0xc000, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r2) 03:58:11 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000240)={0x0, 0x5, 0x3, 0x0, 0x1, [{}]}) 03:58:11 executing program 5: clone3(&(0x7f0000001680)={0x42320500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='uid=', @ANYRESHEX]) mount(0x0, &(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='autofs\x00', 0x0, &(0x7f0000000400)) 03:58:11 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="240000001d005f0614f9f407faac470002000000000000000000080008000100000000ff", 0x24) 03:58:11 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) pipe2$9p(&(0x7f00000002c0)={0xffffffffffffffff}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\xafa\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000180)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f00000001c0), 0xffff) fcntl$addseals(r2, 0x409, 0x8) fallocate(r2, 0x3, 0x0, 0x81) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 03:58:11 executing program 4: syz_mount_image$msdos(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000001280)='system.posix_acl_default\x00', &(0x7f00000012c0), 0x24, 0x0) mknod$loop(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280), 0x0, 0x0, 0x2) [ 361.396636][T18856] loop3: detected capacity change from 0 to 132104 [ 361.467525][T18862] autofs4:pid:18862:autofs_fill_super: called with bogus options 03:58:11 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0x34}}, 0x0) 03:58:11 executing program 4: mlockall(0x7) syz_io_uring_setup(0x574f, &(0x7f0000000180), &(0x7f0000002000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) [ 361.564434][T18884] autofs4:pid:18884:autofs_fill_super: called with bogus options 03:58:11 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, 0x108) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000780)={0x2, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 03:58:11 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000340)='\x00\xc2\xea\x99\xbb\x1c\xf8jw\x97\x05\xa3\xa2\'\xdd\xe4q\xbf\t\x8c\xe0\x19\xe5\xbcJ6\xfc\xa8\xcdj\xc1F\x02\x93\xca`\x8e\x00\x00\x00\x00\x00\x00\x00\x00\x00\b \xff\x13\x96\xe3?\xdfH\x8c\xe4V\xe2\xfe\v8\x04\xa5\xb9\xc4:\xf3\xf6y_w\xd8\xcf\x90k\x05\x00\xf9\x1e\xe8m\xec\x12\xa015\xc2\xb3u|K\x111\xd4\f8\xeb\x18\xad\xbb!1\x85\x96P\x1b\xa1\x9a\x81\xf8\xb1\xecB)\xe5\xaa7\xfe\xdd,_D\xe5|\xb1j^\xaec}\x1a\xb4\x17\xafP\x85I\xd5\xa0I\xb0\xaf\xb5\x8b\\\x05\xd7g\xcbV\x8e\xd0\xac\x87I7\xbd\xc6\x9bI\x92\xb2\x87.\xb3\x1fs\xe7%\xdd+\r\xb4\x117\xa7ei~\xb8\x16\xd1P\xf2\x84\x89K\x16\xd0F|\xa3\x89\xc9~9\x00\x00\x00\x00\x00\x00\x00', 0x0) write(r1, &(0x7f00000000c0)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0xc40001e1) creat(&(0x7f0000000040)='./file0\x00', 0x0) 03:58:11 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000340)='\x00\xc2\xea\x99\xbb\x1c\xf8jw\x97\x05\xa3\xa2\'\xdd\xe4q\xbf\t\x8c\xe0\x19\xe5\xbcJ6\xfc\xa8\xcdj\xc1F\x02\x93\xca`\x8e\x00\x00\x00\x00\x00\x00\x00\x00\x00\b \xff\x13\x96\xe3?\xdfH\x8c\xe4V\xe2\xfe\v8\x04\xa5\xb9\xc4:\xf3\xf6y_w\xd8\xcf\x90k\x05\x00\xf9\x1e\xe8m\xec\x12\xa015\xc2\xb3u|K\x111\xd4\f8\xeb\x18\xad\xbb!1\x85\x96P\x1b\xa1\x9a\x81\xf8\xb1\xecB)\xe5\xaa7\xfe\xdd,_D\xe5|\xb1j^\xaec}\x1a\xb4\x17\xafP\x85I\xd5\xa0I\xb0\xaf\xb5\x8b\\\x05\xd7g\xcbV\x8e\xd0\xac\x87I7\xbd\xc6\x9bI\x92\xb2\x87.\xb3\x1fs\xe7%\xdd+\r\xb4\x117\xa7ei~\xb8\x16\xd1P\xf2\x84\x89K\x16\xd0F|\xa3\x89\xc9~9\x00\x00\x00\x00\x00\x00\x00', 0x0) write(r1, &(0x7f00000000c0)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0xc40001e1) creat(&(0x7f0000000040)='./file0\x00', 0x0) 03:58:11 executing program 1: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x2, 0x0, r3, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0x0) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x7ffff000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r6, 0x0) io_uring_enter(r0, 0x6196, 0x0, 0x0, 0x0, 0x0) 03:58:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) close_range(r0, 0xffffffffffffffff, 0x2) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:58:11 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='4\xacXrcO\b\xc4ut/e\x00'/28, 0x0) write$binfmt_elf64(r0, &(0x7f0000000600)=ANY=[@ANYBLOB="7f454c46000000d20000000000e9ff0003003e0000001000000006000000001e40000000000000000000000000008b000000001000003800020000000000000003"], 0x44) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34}, [{}], "3554e8996e2696f0050300e0008017e66225ea166002d17d057f6267e7d502455ee60a33af2d13583e"}, 0x7d) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 03:58:11 executing program 5: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000b40)=ANY=[], 0xa) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="2000000012005f0214f9f407000000000a", 0x11) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 03:58:11 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000340)='\x00\xc2\xea\x99\xbb\x1c\xf8jw\x97\x05\xa3\xa2\'\xdd\xe4q\xbf\t\x8c\xe0\x19\xe5\xbcJ6\xfc\xa8\xcdj\xc1F\x02\x93\xca`\x8e\x00\x00\x00\x00\x00\x00\x00\x00\x00\b \xff\x13\x96\xe3?\xdfH\x8c\xe4V\xe2\xfe\v8\x04\xa5\xb9\xc4:\xf3\xf6y_w\xd8\xcf\x90k\x05\x00\xf9\x1e\xe8m\xec\x12\xa015\xc2\xb3u|K\x111\xd4\f8\xeb\x18\xad\xbb!1\x85\x96P\x1b\xa1\x9a\x81\xf8\xb1\xecB)\xe5\xaa7\xfe\xdd,_D\xe5|\xb1j^\xaec}\x1a\xb4\x17\xafP\x85I\xd5\xa0I\xb0\xaf\xb5\x8b\\\x05\xd7g\xcbV\x8e\xd0\xac\x87I7\xbd\xc6\x9bI\x92\xb2\x87.\xb3\x1fs\xe7%\xdd+\r\xb4\x117\xa7ei~\xb8\x16\xd1P\xf2\x84\x89K\x16\xd0F|\xa3\x89\xc9~9\x00\x00\x00\x00\x00\x00\x00', 0x0) write(r1, &(0x7f00000000c0)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0xc40001e1) creat(&(0x7f0000000040)='./file0\x00', 0x0) 03:58:12 executing program 0: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) r1 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setsig(r1, 0xa, 0x11) fcntl$setlease(r1, 0x400, 0x0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x502, 0x0) r2 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x0) 03:58:12 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x100000, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0/file0\x00', 0x0, 0x801402, 0x0) mount$bind(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x10c0, 0x0) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x1805002, 0x0) mount$bind(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0xe404, 0x0) 03:58:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PTP_ENABLE_PPS(r1, 0x40103d02, 0x0) 03:58:12 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000340)='\x00\xc2\xea\x99\xbb\x1c\xf8jw\x97\x05\xa3\xa2\'\xdd\xe4q\xbf\t\x8c\xe0\x19\xe5\xbcJ6\xfc\xa8\xcdj\xc1F\x02\x93\xca`\x8e\x00\x00\x00\x00\x00\x00\x00\x00\x00\b \xff\x13\x96\xe3?\xdfH\x8c\xe4V\xe2\xfe\v8\x04\xa5\xb9\xc4:\xf3\xf6y_w\xd8\xcf\x90k\x05\x00\xf9\x1e\xe8m\xec\x12\xa015\xc2\xb3u|K\x111\xd4\f8\xeb\x18\xad\xbb!1\x85\x96P\x1b\xa1\x9a\x81\xf8\xb1\xecB)\xe5\xaa7\xfe\xdd,_D\xe5|\xb1j^\xaec}\x1a\xb4\x17\xafP\x85I\xd5\xa0I\xb0\xaf\xb5\x8b\\\x05\xd7g\xcbV\x8e\xd0\xac\x87I7\xbd\xc6\x9bI\x92\xb2\x87.\xb3\x1fs\xe7%\xdd+\r\xb4\x117\xa7ei~\xb8\x16\xd1P\xf2\x84\x89K\x16\xd0F|\xa3\x89\xc9~9\x00\x00\x00\x00\x00\x00\x00', 0x0) write(r1, &(0x7f00000000c0)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0xc40001e1) creat(&(0x7f0000000040)='./file0\x00', 0x0) 03:58:12 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=@allocspi={0x10c, 0x16, 0x1, 0x0, 0x0, {{{@in6=@ipv4={'\x00', '\xff\xff', @local}, @in=@multicast1}, {@in=@multicast1, 0x0, 0x6c}, @in6=@remote}}, [@mark={0xc}, @XFRMA_IF_ID={0x8}]}, 0x10c}}, 0x0) 03:58:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x121, &(0x7f0000000280)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 03:58:12 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x100000, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0/file0\x00', 0x0, 0x801402, 0x0) mount$bind(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x10c0, 0x0) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x1805002, 0x0) mount$bind(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0xe404, 0x0) 03:58:12 executing program 1: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x2, 0x0, r3, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0x0) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x7ffff000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r6, 0x0) io_uring_enter(r0, 0x6196, 0x0, 0x0, 0x0, 0x0) 03:58:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000240)="0201630000000a000000ff45ac0080ffffff0500e931190000000000000680000000630000000900000087771f72003007000f00000000000000008000ca55aa", 0x40, 0x1c0}]) 03:58:12 executing program 3: setreuid(0xee00, 0xee00) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) getresuid(&(0x7f0000000000), &(0x7f0000000140)=0x0, &(0x7f0000000180)) setreuid(r1, r0) 03:58:12 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={r2, 0x1, 0x6, @multicast}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r2, 0x2, 0x6}, 0x10) r3 = socket$netlink(0x10, 0x3, 0x0) dup3(r3, r0, 0x0) 03:58:12 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x100000, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0/file0\x00', 0x0, 0x801402, 0x0) mount$bind(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x10c0, 0x0) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x1805002, 0x0) mount$bind(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0xe404, 0x0) [ 362.430749][T18969] device lo entered promiscuous mode [ 362.436220][T18970] loop2: detected capacity change from 0 to 1 [ 362.450097][T18969] device lo left promiscuous mode [ 362.466166][T18979] device lo entered promiscuous mode [ 362.472892][T18961] device lo left promiscuous mode [ 362.478323][T18970] loop2: p1 p2 < > p3 p4 < p5 p6 > [ 362.483651][T18970] loop2: partition table partially beyond EOD, truncated [ 362.490755][T18970] loop2: p1 start 10 is beyond EOD, truncated [ 362.496923][T18970] loop2: p2 start 25 is beyond EOD, truncated [ 362.503004][T18970] loop2: p3 start 9 is beyond EOD, truncated [ 362.509120][T18970] loop2: p4 size 2 extends beyond EOD, truncated [ 362.515924][T18970] loop2: p5 start 10 is beyond EOD, truncated [ 362.522046][T18970] loop2: p6 start 9 is beyond EOD, truncated 03:58:13 executing program 0: set_mempolicy(0x6001, &(0x7f0000000040)=0xf09, 0x9) 03:58:13 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094b126b097eaa769be6d02001bd34e677d114b655ef5f0166391c68f70e44e390f82e8a9118d15ec308521eb88f8c32e51d0bfc92b1055f69a37237647e947e4df739526dab9af060000006f3eb349fd086cffff0000d2f0cae5170871c145045174ad6edb6b0a183dd660ef94af2121945b0d79bb5efadeaad6eaaf0ebc8ae15948eb13fe714f32449bb5e2bdfe6c86cc1d507694a8d504f1144634b26cafc25714cf7fdc160000000000000000000000000000d01c1d3e6ff3483a65590e0f98b5d00554499d3593", 0xd0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x3) 03:58:13 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mount$bind(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x100000, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0/file0\x00', 0x0, 0x801402, 0x0) mount$bind(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x10c0, 0x0) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x1805002, 0x0) mount$bind(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0xe404, 0x0) 03:58:13 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={r2, 0x1, 0x6, @multicast}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r2, 0x2, 0x6}, 0x10) r3 = socket$netlink(0x10, 0x3, 0x0) dup3(r3, r0, 0x0) 03:58:13 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) poll(&(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {0xffffffffffffffff, 0x9485}], 0x7, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue0\x00'}) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a357b6b140cbb6215dd33459"}}], 0xfffffee4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) 03:58:13 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae897094e71b0fa1f147a8378f3657cdcf86db93aa6ed9cbc6a9e00b9e626aa995d690c8a2372286677850ab8e9b75839f0715a567dafe306f0818fd861ff11495d58553d8c11c606e13da9b8d26a566833fe1f9c73899301d879b51848164e7b988889c753ba801e880c49a91e7b9486916ea7a348947d85d038e1ac9522c11a448eb497c3e3c53f1fab7d652fe3f5f47c19680532dc8a190e522fe2f99859d8b1ebeb5113b7ee64dd6215e563ef2ce8f28e89e5796e9", 0xbb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 03:58:13 executing program 1: io_setup(0x7, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x8) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000), 0x4) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000), 0x8) 03:58:13 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x23, &(0x7f00000007c0)=""/36, &(0x7f0000000800)=0x24) 03:58:13 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000440), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000240)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) mkdirat(r0, &(0x7f0000000180)='./file2\x00', 0x0) [ 363.152206][T18999] device lo entered promiscuous mode [ 363.169419][T18999] device lo left promiscuous mode 03:58:13 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={r2, 0x1, 0x6, @multicast}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r2, 0x2, 0x6}, 0x10) r3 = socket$netlink(0x10, 0x3, 0x0) dup3(r3, r0, 0x0) 03:58:13 executing program 0: r0 = syz_io_uring_setup(0x1a6d, &(0x7f0000000180), &(0x7f00006d5000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x3082, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x3a28, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_PROBE(r0, 0x6, 0x0, 0x0) io_uring_enter(r0, 0x6edb, 0x0, 0x0, 0x0, 0x0) 03:58:13 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) r0 = socket$inet6(0x10, 0x2, 0x0) fstatfs(r0, &(0x7f0000000080)=""/4096) 03:58:13 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000180)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x14c, &(0x7f00000002c0)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 363.300332][T19024] device lo entered promiscuous mode [ 363.306642][ T25] audit: type=1326 audit(1621915093.242:517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19028 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 363.342149][ T25] audit: type=1326 audit(1621915093.242:518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19028 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=41 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 363.366507][T19024] device lo left promiscuous mode [ 363.368572][ T25] audit: type=1326 audit(1621915093.242:519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19028 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 363.396189][ T25] audit: type=1326 audit(1621915093.242:520): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19028 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=138 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 363.424612][ T25] audit: type=1326 audit(1621915093.242:521): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19028 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 363.449702][ T25] audit: type=1326 audit(1621915093.242:522): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19028 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=157 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 363.474114][ T25] audit: type=1326 audit(1621915093.282:523): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19028 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 363.498732][ T25] audit: type=1326 audit(1621915093.282:524): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19028 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=41 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 363.523087][ T25] audit: type=1326 audit(1621915093.282:525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19028 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 363.547412][ T25] audit: type=1326 audit(1621915093.282:526): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19028 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 03:58:16 executing program 3: r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000000)=[{}], 0x1, 0xfff, 0x0, 0x0) r1 = openat$procfs(0xffffff9c, &(0x7f0000000800)='/proc/cpuinfo\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000140)={0xc0002014}) 03:58:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000180)='.', 0x0, 0x33088, 0x0) open_tree(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x81001) mount(&(0x7f0000000140)=@filename='./file0\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5110, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 03:58:16 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x9, 0xebc) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) 03:58:16 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={r2, 0x1, 0x6, @multicast}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r2, 0x2, 0x6}, 0x10) r3 = socket$netlink(0x10, 0x3, 0x0) dup3(r3, r0, 0x0) 03:58:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x29, 0x10, &(0x7f0000000500), 0x4) 03:58:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r1, &(0x7f0000000a00)=[{{&(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10, 0x0}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x130}}], 0x2, 0x4008004) 03:58:16 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000080)=0xffffffff, 0x4) 03:58:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0x0, 0x0, &(0x7f0000000040)=0xfffffffffffffead) 03:58:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000180)='.', 0x0, 0x33088, 0x0) open_tree(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x81001) mount(&(0x7f0000000140)=@filename='./file0\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5110, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 03:58:16 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80, 0x62}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000040)={{0x80}, 'port1\x00'}) [ 366.158510][T19054] device lo entered promiscuous mode [ 366.170313][T19054] device lo left promiscuous mode 03:58:16 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x6fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1) 03:58:16 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)=ANY=[@ANYBLOB='\x00']) 03:58:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[], 0x10132) setsockopt$sock_int(r2, 0x1, 0x2a, &(0x7f0000000000)=0xffff, 0x4) r3 = io_uring_setup(0x633a, &(0x7f0000000040)) r4 = dup3(r2, r3, 0x0) recvmmsg(r4, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2, 0x0) 03:58:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000180)='.', 0x0, 0x33088, 0x0) open_tree(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x81001) mount(&(0x7f0000000140)=@filename='./file0\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5110, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 03:58:16 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000480)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x5, &(0x7f0000000000)=0x4, 0x4) sendmsg$inet(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 03:58:16 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "66e77ec093e8850ed3228039ea6e7c6d4300000000d96921b55f3117adfb74c1e3dbc951f8e6f914f01b0000c0ebb4ab8c259da600"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x1d, r0, 0xffffffffffffffff, 0xffffffffffffffff) 03:58:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000180)='.', 0x0, 0x33088, 0x0) open_tree(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x81001) mount(&(0x7f0000000140)=@filename='./file0\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5110, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 03:58:16 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0xfffffffffffffe3b, &(0x7f0000000000)=[{&(0x7f00000000c0)="5500000018007f5f14fe01b2a4a29093020604dffffffe010405040539000900070006080100000019000b40060c1001020022dc1338d54404139b84136ef75afb83de4411000500", 0xff72}, {&(0x7f0000000040)="73005000d612110000ff0ea988", 0xd}], 0x2}, 0x0) 03:58:16 executing program 5: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)={0x40000001}) epoll_wait(r1, &(0x7f00000000c0)=[{}], 0x1, 0x0) 03:58:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r2, &(0x7f00000044c0)=[{{&(0x7f0000000040)={0xa, 0x4e24, 0x0, @empty}, 0x1c, 0x0}}, {{&(0x7f0000000480)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000000140)=[@hopopts_2292={{0x18}}], 0x18}}], 0x2, 0x0) 03:58:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x57d5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_READV=@pass_iovec={0x1, 0x2, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x1040, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x134) acct(&(0x7f00000000c0)='./file0\x00') [ 366.335896][T19090] loop1: detected capacity change from 0 to 1024 [ 366.359529][T19090] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 03:58:16 executing program 3: r0 = socket(0x10, 0x2, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYRES16, @ANYBLOB="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"], 0x2}}, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d0a0b49ff708800008003280004020100ac14141fbc71176a36ede498534108e58342fa94a235a2a441f9", 0xfcae) 03:58:16 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001a40)="66530700ae897094e7b126b097eaa769be6d28c41bd34e677d114b655ef5f0166391c68f70e44e260f82e8a9bfc92b1055f69a37237647e947e4df739526ecbb3987b178b1ead5a678216d5d3568dab9af7a4d5cc06f3eb349fd086c22e3fc56d2b0cae5170871c145045174ad6edb6b0a183dd660ef94af2121945b0d79bb5efadeaad6eaaf0ebc8ae15948eb13fe714f32449bb5e2bdfe6c86cc1d507694a8d504f1144634b26cafc25714cf7fdc166f16fa0d74cd1164f949d1", 0xbb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) [ 366.450060][T19090] EXT4-fs (loop1): orphan cleanup on readonly fs [ 366.456433][T19090] EXT4-fs error (device loop1): ext4_quota_enable:6432: comm syz-executor.1: Bad quota inode # 3 [ 366.466971][T19090] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 366.480982][T19090] EXT4-fs (loop1): Cannot turn on quotas: error -116 [ 366.487672][T19090] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 03:58:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f00000001c0)={0x0, 0xfb, 0x24, 0x0, 0x0, "19c0a8244d512acf8f19a24c514c99de", "9c8659514dfccac6a0d80a7990228a"}, 0x24, 0x0) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)=@known='trusted.overlay.upper\x00', &(0x7f0000000180)=""/35, 0x23) 03:58:16 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) setxattr$security_selinux(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240), &(0x7f0000000280)='system_u:object_r:modules_object_t:s0\x00', 0x26, 0x0) [ 366.505732][T19121] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 366.513892][T19121] netlink: 2508 bytes leftover after parsing attributes in process `syz-executor.3'. [ 366.541309][T19135] netlink: 'syz-executor.3': attribute type 4 has an invalid length. 03:58:16 executing program 3: preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r1, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x5412, 0x0) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000000)) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000080)={0x7eff, 0x0, 0x0, 0x0, 0x0, "b05ed32976199f526289fd1cca8d9f1de553c8"}) write(r0, &(0x7f00000000c0)="b4", 0xfdef) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r2, 0x5412, &(0x7f00000000c0)=0x13) 03:58:16 executing program 0: set_mempolicy(0x4003, &(0x7f0000000000)=0x1, 0x45f) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000040), 0x8) 03:58:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x57d5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_READV=@pass_iovec={0x1, 0x2, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x1040, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x134) acct(&(0x7f00000000c0)='./file0\x00') [ 366.549424][T19135] netlink: 2508 bytes leftover after parsing attributes in process `syz-executor.3'. 03:58:16 executing program 2: r0 = fork() wait4(r0, 0x0, 0x0, 0x0) wait4(r0, &(0x7f0000000040), 0x0, 0x0) getpgrp(r0) tgkill(r0, r0, 0x37) getpgrp(r0) fork() tgkill(0x0, 0x0, 0x0) 03:58:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r1) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgid(r5) 03:58:17 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$msdos(&(0x7f0000000680), &(0x7f00000006c0)='./file0\x00', 0x0, 0x0, 0x0, 0x24000, &(0x7f0000000ac0)) 03:58:17 executing program 1: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}}, 0x0) ioctl$int_in(r4, 0x5452, &(0x7f0000000180)=0x2) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r3, 0x0, 0x0) 03:58:17 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_int(r0, 0x1, 0x27, &(0x7f0000000080), 0x4) 03:58:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x57d5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_READV=@pass_iovec={0x1, 0x2, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x1040, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x134) acct(&(0x7f00000000c0)='./file0\x00') 03:58:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet(r0, &(0x7f0000002980)=[{{&(0x7f0000000000)={0x2, 0x4e24, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0xb}, @remote}}}], 0x20}}], 0x1, 0x0) 03:58:17 executing program 2: r0 = fork() wait4(r0, 0x0, 0x0, 0x0) wait4(r0, &(0x7f0000000040), 0x0, 0x0) getpgrp(r0) tgkill(r0, r0, 0x37) getpgrp(r0) fork() tgkill(0x0, 0x0, 0x0) 03:58:17 executing program 3: io_setup(0x1, &(0x7f0000000040)=0x0) io_pgetevents(r0, 0x2, 0x2, &(0x7f0000000240)=[{}, {}], &(0x7f0000000300)={0x0, 0x3938700}, 0x0) 03:58:17 executing program 1: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb5, &(0x7f0000001340)="c4c691019919da078a0098d1e0a59320ff79b040f762910016775a8454cc16dc38f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689bce0e2db60713a3a7eeba5c9c6a47312334c2a97a4837714569255346f930000ffbcd48a70502173d6efa56b60f48cf0c9d0989ecbbfc220bd2b39df9ad8d6b14910f4a869863009780dd6e673a02f7ed829932929af9dffb1fa2c43a2316418ba9eb1f8fac57719b6650c7016af47d3160960f4dc0f5e233b"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 03:58:17 executing program 0: r0 = semget$private(0x0, 0x1, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000080)=[0x270]) semop(r0, &(0x7f0000000040)=[{}], 0x1) semctl$IPC_RMID(r0, 0x0, 0x10) 03:58:17 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$inet(0x2, 0x3, 0x33) bind$inet(r0, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xd}}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) close(r0) 03:58:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/protocols\x00') preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000240)=""/144, 0x90}, {&(0x7f0000000300)=""/232, 0xe8}], 0x2, 0x0, 0x0) 03:58:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x57d5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_READV=@pass_iovec={0x1, 0x2, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x1040, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x134) acct(&(0x7f00000000c0)='./file0\x00') 03:58:17 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="c5b85b133ad775ca695d1a"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 03:58:17 executing program 1: r0 = epoll_create1(0x0) r1 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)={0xb000001c}) epoll_wait(r0, &(0x7f00000000c0)=[{}], 0x1, 0x0) 03:58:17 executing program 2: r0 = fork() wait4(r0, 0x0, 0x0, 0x0) wait4(r0, &(0x7f0000000040), 0x0, 0x0) getpgrp(r0) tgkill(r0, r0, 0x37) getpgrp(r0) fork() tgkill(0x0, 0x0, 0x0) 03:58:17 executing program 3: sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000280)=ANY=[@ANYBLOB="9413000a"], 0x70}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x80000000000a01, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000001940)=""/4076, 0xfec}], 0x1) 03:58:17 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) writev(r0, &(0x7f0000000580)=[{&(0x7f0000000340)="ac1bd94ea710066f9bd775d83d395465b1c386aca1a5a65b5d4606ab7ce83a57a18659ba0bff12278e45a6c745f66e7daa99a70f645a0f407595dbaad2931beffdd9fd83f9900d9cbd03c7a1fb84e1f41c0c4f", 0x53}, {&(0x7f00000003c0)="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", 0xfd}, {&(0x7f0000000680)="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", 0x45d}], 0x3) 03:58:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff770400000000200010004d2000000000000040000000000000000000", 0xffffffe5}], 0x2) 03:58:17 executing program 5: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)='cpu<-0\n\n\n') 03:58:17 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) writev(r0, &(0x7f0000000580)=[{&(0x7f0000000340)="ac1bd94ea710066f9bd775d83d395465b1c386aca1a5a65b5d4606ab7ce83a57a18659ba0bff12278e45a6c745f66e7daa99a70f645a0f407595dbaad2931beffdd9fd83f9900d9cbd03c7a1fb84e1f41c0c4f", 0x53}, {&(0x7f00000003c0)="e98b63b6f6cc616ce0a3207b483ca647d600ac1bd3409a5bf0395ecbd32077424cfbfcb6083bf099211216a1a8e00e60fd3ef2d5d54040328ee31826a261ac6a660be4257e86e14f68c72396281757ea24491226ffdecaddf96dad6310eeace1c02ce995a2082d503b0efef535f32231450ab0cad64c7b88163ad6b6af9142397039fca54883833b4ce9713abe88eae2ecd790a63f07f0be4d28d1d2a8c8b948a99ab75d68679f5707ecf9c8cf4ea14a63474cfa60acdd803df6ca0e57c28c93b10ebdd5f52f3f566a3c62ef048a080faf358afb4469de4c2a362868407736f9889fdadc1afff93af74236602dcff0121fe1868f98be9637bd3e9b150a", 0xfd}, {&(0x7f0000000680)="6bc78d9bcba9d0259d24df43b81a891e827ab64df09c3a3b00f78ae07928a074e3c398f5b173f6b09d6f04f5a4791e871ff174dff9ca375b7a540332d5d5c2bed6bc576ae8bf366552a4282e667340b9f6f225d73f737e8a4c180655ab7130be45c8a0955eddea5d77c3c572775296730d2a699f9bdf2dfa6eb174ca4f306ea9a2b24c9fb6bd4c5f22dd030f09374219508efb593d7ddd7ca39334331057af5b37729d71f941a10b4d9a4006b768d560bd3409190af5127fbd723a8670b663c2fe176e04cc1201b6f23657f5c6c3f11153d4cb89ace0392f7894501cee234b2395ae6bdd415c81866972eb7e00c2e40a571a045319182496f27f528111dc1de21c9d74b54113e0768b695a7564b1ecba03069f037309e2248a4ee865f05abf2f7adfc1bcf86d857593a17ee49a8427b39b72093ebdf769652e4708ab0508d42dc895864f8acc5e534a772d01b5cf65d05b94bf1f0ce443185a6eb077688970294559a81ca4a1e05e2e6c934f9151b806bef2e474d5f839db97d68e9892ef95e36f0ae171db8c784f0c84531caa5e906be8958821e0f6efda433a03a670b6a2a92535b37ae01ecc4544c72a5d4b6741d4a54a989c50c41f9b78fbfd51f5634a968da7c9ab2238454e8ebc676f7a93e8a8cdaee14551489a18f1c9ed068709fd614b5079140d2f1c8519eace0fa4d80638fb2554abe4311bcfaf3a459346b90a8da50f786cbbb96f2b83eb4822d0b227812a6897d4611f941d6c5678b137f0459dc8c0dc9432b3604c61ed3decf0f86a6f6404da0626d7b9afacbc0abf5cd07eaf53764f233db63160a765a8367bf61af30f4f241f0d21031c92e68d37dc6a64d197e82f8bc8dc09e13d39b16992f1a8f3a4fba698b9dedce056b84d0c7732c69cc956e796e7cca9d64a9bcc3211b076b4d4e3eadb3c13e8f2a310b729f26d1c672840ff70e0165c417e6b696a19b170989b4b0df3ee5ea8185e4a1cd5ce7b25879d46dff7793a22965e3e6d74a38bd757c1f646658a5032b3000286b7a0e83d8a5b194d98029da7bcf5f5d8f73ec9234ef047a9b791eaacc0194e1dde6654333daa98974ded853c6969ef41fcfc1c1ac8c1ae288261cd382d9dbd72b8d833752598996d63e662d68654c34b3f7529029872944a89756ce2d9e1b2092c103b1cff1dcfe11b62a85e2222973a0b8240dbd6ca57ca683b614d24e0fae7ba1299d9379083046633ee978f86ed5bf1e9c92467d837eca395ab00942f259fa2c4522022d265b89f063e537082d49de7919ee6610fd295a48d5132d71e5247d23be5de3f495b3274a79b67336ad1116df8573d78fce75f0b54242fb6b02fe3d1f48adbb5f14467b294cebdd685f199ae278682e47982bab4efb215b96dedd60064396f4662a26822f2039f3f38531f31153154251fe33a2d8ef278eaf7f99b49aee0724883a4c189d55e30f08744ab6846a829d9874335e7110c21b5656740366046b3a76f8b5a4bbaa71bc7e9052dec4bc0dc42d47adebeab817bc84f41cad248728b4de8eba857b992f2fcc3afc1ae0416731725717bc54d7e780d5d672b80c4", 0x45d}], 0x3) 03:58:17 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) writev(r0, &(0x7f0000000580)=[{&(0x7f0000000340)="ac1bd94ea710066f9bd775d83d395465b1c386aca1a5a65b5d4606ab7ce83a57a18659ba0bff12278e45a6c745f66e7daa99a70f645a0f407595dbaad2931beffdd9fd83f9900d9cbd03c7a1fb84e1f41c0c4f", 0x53}, {&(0x7f00000003c0)="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", 0xfd}, {&(0x7f0000000680)="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", 0x45d}], 0x3) 03:58:17 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x2c}, {0x6}]}, 0x10) writev(r0, &(0x7f0000000040)=[{&(0x7f00000001c0)='4', 0xc0}], 0x1) 03:58:17 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x12, 0x0, &(0x7f0000000180)) 03:58:17 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda6, 0x4) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000100)="dff548771d77ce8786aca76dda6fb054ab8ea73799d7293eda90ba41a2db81fab55b5415692300a8e64bca2f60e1717f85f06a6bbca90f392b04f34940db7ffccc33ed6ea82296de9683c9e360cd1c477304bd8f9bd74d44a4c7d1c7e625a86cd54b72c5745f475a772b84977a6b05381dbe6259bc510f0f70c3e9946a78c7b5a19e97447799d930f9", 0x89}, {&(0x7f00000002c0)="96431fb1cb119741590ad657dc5e5ce3e5fe9f1f639e6a18bc7b6c1d0b424eb306f34cf2429c62c0fdefbae36740a7169721af852826d7f14b6cae8af86507ff78a1dda991aea5952f43e7e0146a3c035f0113d617240e8940c60cdf5200193bbe3a0c0b1eae5799db27b4ee9c13475210defa4dac9d784e0c89135b82b321f8e43d7a5db9ab1bfd319f472a", 0x8c}, {&(0x7f0000000a40)="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", 0x364}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="1e268a927f1f6588b967482941ba78600453f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95426a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:58:17 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) writev(r0, &(0x7f0000000580)=[{&(0x7f0000000340)="ac1bd94ea710066f9bd775d83d395465b1c386aca1a5a65b5d4606ab7ce83a57a18659ba0bff12278e45a6c745f66e7daa99a70f645a0f407595dbaad2931beffdd9fd83f9900d9cbd03c7a1fb84e1f41c0c4f", 0x53}, {&(0x7f00000003c0)="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", 0xfd}, {&(0x7f0000000680)="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", 0x45d}], 0x3) 03:58:17 executing program 2: r0 = fork() wait4(r0, 0x0, 0x0, 0x0) wait4(r0, &(0x7f0000000040), 0x0, 0x0) getpgrp(r0) tgkill(r0, r0, 0x37) getpgrp(r0) fork() tgkill(0x0, 0x0, 0x0) 03:58:17 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) writev(r0, &(0x7f0000000580)=[{&(0x7f0000000340)="ac1bd94ea710066f9bd775d83d395465b1c386aca1a5a65b5d4606ab7ce83a57a18659ba0bff12278e45a6c745f66e7daa99a70f645a0f407595dbaad2931beffdd9fd83f9900d9cbd03c7a1fb84e1f41c0c4f", 0x53}, {&(0x7f00000003c0)="e98b63b6f6cc616ce0a3207b483ca647d600ac1bd3409a5bf0395ecbd32077424cfbfcb6083bf099211216a1a8e00e60fd3ef2d5d54040328ee31826a261ac6a660be4257e86e14f68c72396281757ea24491226ffdecaddf96dad6310eeace1c02ce995a2082d503b0efef535f32231450ab0cad64c7b88163ad6b6af9142397039fca54883833b4ce9713abe88eae2ecd790a63f07f0be4d28d1d2a8c8b948a99ab75d68679f5707ecf9c8cf4ea14a63474cfa60acdd803df6ca0e57c28c93b10ebdd5f52f3f566a3c62ef048a080faf358afb4469de4c2a362868407736f9889fdadc1afff93af74236602dcff0121fe1868f98be9637bd3e9b150a", 0xfd}, {&(0x7f0000000680)="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", 0x45d}], 0x3) 03:58:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) setrlimit(0x7, &(0x7f0000000000)) accept4(r1, 0x0, 0x0, 0x0) 03:58:17 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev, 0x0, 0x3c}, 0x2, @in6=@empty, 0x0, 0x4, 0x0, 0xfa}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 03:58:17 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) poll(&(0x7f0000000080)=[{r2}], 0x1, 0x7c836ccb) fcntl$setpipe(r1, 0x407, 0x0) 03:58:17 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) writev(r0, &(0x7f0000000580)=[{&(0x7f0000000340)="ac1bd94ea710066f9bd775d83d395465b1c386aca1a5a65b5d4606ab7ce83a57a18659ba0bff12278e45a6c745f66e7daa99a70f645a0f407595dbaad2931beffdd9fd83f9900d9cbd03c7a1fb84e1f41c0c4f", 0x53}, {&(0x7f00000003c0)="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", 0xfd}, {&(0x7f0000000680)="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", 0x45d}], 0x3) 03:58:17 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) writev(r0, &(0x7f0000000580)=[{&(0x7f0000000340)="ac1bd94ea710066f9bd775d83d395465b1c386aca1a5a65b5d4606ab7ce83a57a18659ba0bff12278e45a6c745f66e7daa99a70f645a0f407595dbaad2931beffdd9fd83f9900d9cbd03c7a1fb84e1f41c0c4f", 0x53}, {&(0x7f00000003c0)="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", 0xfd}, {&(0x7f0000000680)="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", 0x45d}], 0x3) 03:58:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r1, &(0x7f0000000ea9)=""/407, 0x197) 03:58:17 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x1000, 0x1) open$dir(&(0x7f0000000280)='./file0\x00', 0x20900, 0x0) pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x8}, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) 03:58:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000200100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100c03853ef01", 0x3b, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 03:58:18 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda6, 0x4) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000100)="dff548771d77ce8786aca76dda6fb054ab8ea73799d7293eda90ba41a2db81fab55b5415692300a8e64bca2f60e1717f85f06a6bbca90f392b04f34940db7ffccc33ed6ea82296de9683c9e360cd1c477304bd8f9bd74d44a4c7d1c7e625a86cd54b72c5745f475a772b84977a6b05381dbe6259bc510f0f70c3e9946a78c7b5a19e97447799d930f9", 0x89}, {&(0x7f00000002c0)="96431fb1cb119741590ad657dc5e5ce3e5fe9f1f639e6a18bc7b6c1d0b424eb306f34cf2429c62c0fdefbae36740a7169721af852826d7f14b6cae8af86507ff78a1dda991aea5952f43e7e0146a3c035f0113d617240e8940c60cdf5200193bbe3a0c0b1eae5799db27b4ee9c13475210defa4dac9d784e0c89135b82b321f8e43d7a5db9ab1bfd319f472a", 0x8c}, {&(0x7f0000000a40)="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", 0x364}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="1e268a927f1f6588b967482941ba78600453f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95426a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:58:18 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c3549b4c2f00c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3166", 0xff7c}], 0x1) 03:58:18 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xff00000000000000, 0xa8aaaafffeaaaa3e}}, 0x1c) 03:58:18 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000100)={[], [{@rootcontext={'rootcontext', 0xa, 'sysadm_u'}}]}) [ 367.989185][T19325] loop1: detected capacity change from 0 to 131456 [ 368.004850][T19325] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 03:58:18 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xff00000000000000, 0xa8aaaafffeaaaa3e}}, 0x1c) 03:58:18 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xff00000000000000, 0xa8aaaafffeaaaa3e}}, 0x1c) [ 368.156840][T19350] tmpfs: Unknown parameter 'rootcontext [ 368.156840][T19350] sysadm_u' [ 368.176042][T19355] tmpfs: Unknown parameter 'rootcontext [ 368.176042][T19355] sysadm_u' 03:58:18 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x15e, &(0x7f00000007c0)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:58:18 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002400)=[{{&(0x7f0000000040)={0xa, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000002d40)=ANY=[@ANYBLOB="4801"], 0x148}}, {{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000600)="d4", 0x1}], 0x1}}], 0x2, 0x20008005) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000700)="d0", 0x1}], 0x1}}], 0x1, 0x0) 03:58:18 executing program 1: r0 = socket(0x10, 0x803, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) dup2(r1, r0) getsockopt$SO_BINDTODEVICE(r0, 0x6, 0x25, &(0x7f0000000000), 0x20a154cc) 03:58:18 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xff00000000000000, 0xa8aaaafffeaaaa3e}}, 0x1c) 03:58:18 executing program 4: clone(0x200300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() connect(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000000)) ptrace(0x10, r0) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000140)="f4fbee5dac") ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)="be9ff483111ec7c05a6e35766a9c5cd98ed812fee8ee677c468e2d01bb015a560342c1891c9b259ef048c5ac173518e9cd261fa6cbe6a89b00bbcac9c7a8fc13d6d5661f30c63f72be485d2065e695187bb1482dff9c9d341184640629dc64bb37212a404898297b90eb535ba521052c06a3f59c8a96155e941ed41bc723c4062d6dc6418cd0808ff3") ptrace$getregset(0x4205, r0, 0x2, &(0x7f00000005c0)={0x0}) 03:58:18 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda6, 0x4) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000100)="dff548771d77ce8786aca76dda6fb054ab8ea73799d7293eda90ba41a2db81fab55b5415692300a8e64bca2f60e1717f85f06a6bbca90f392b04f34940db7ffccc33ed6ea82296de9683c9e360cd1c477304bd8f9bd74d44a4c7d1c7e625a86cd54b72c5745f475a772b84977a6b05381dbe6259bc510f0f70c3e9946a78c7b5a19e97447799d930f9", 0x89}, {&(0x7f00000002c0)="96431fb1cb119741590ad657dc5e5ce3e5fe9f1f639e6a18bc7b6c1d0b424eb306f34cf2429c62c0fdefbae36740a7169721af852826d7f14b6cae8af86507ff78a1dda991aea5952f43e7e0146a3c035f0113d617240e8940c60cdf5200193bbe3a0c0b1eae5799db27b4ee9c13475210defa4dac9d784e0c89135b82b321f8e43d7a5db9ab1bfd319f472a", 0x8c}, {&(0x7f0000000a40)="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", 0x364}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="1e268a927f1f6588b967482941ba78600453f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95426a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:58:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="66530700ae897094e71b0fa1f107000000364603812c66538d750f6ee1d0014e3f0500bb9fb045f2d1c190926c2fef2308004d04003ea1315b9532f3af2f5e153eb78020fa00eb298802d8dcbf11169c111c145129d6f9f6c1f3b18d6d352507f7018b311fef2c560001000010000000fb8019128e", 0x75}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1e) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 03:58:18 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x101}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r4, 0x0, 0x10000, 0x0) read(r3, &(0x7f0000000180)=""/185, 0xfffffdef) write$P9_RGETLOCK(r4, &(0x7f00000002c0)=ANY=[], 0x26) dup2(r1, r2) 03:58:18 executing program 0: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="e8000000", @ANYRES16=0x0, @ANYBLOB="04000000ebebd5080500c0"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000900)) 03:58:18 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x202, &(0x7f0000000200)=0x0) ftruncate(r0, 0x81fd) io_submit(r1, 0x3b, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x4000}]) creat(&(0x7f0000000100)='./bus\x00', 0x0) 03:58:18 executing program 4: mlockall(0x5) mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) mlockall(0x7) 03:58:18 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f00000002c0), 0x4) 03:58:18 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_io_uring_setup(0x15b4, &(0x7f0000000340), &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f00000002c0)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r1, 0x6deb, 0x0, 0x0, 0x0, 0x0) readv(r0, &(0x7f0000001440)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETSF2(r4, 0x5437, 0x0) 03:58:18 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000004c0)=[{{&(0x7f0000000100)={0xa, 0x4e20, 0x0, @remote}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @remote, 0x2}, 0x1c, 0x0, 0x0, &(0x7f0000000540)=[@dstopts_2292={{0x18}}, @dontfrag={{0x14, 0x29, 0x3e, 0xd8}}], 0x30}}], 0x2, 0x0) 03:58:18 executing program 3: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x28, r0, 0x301, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 03:58:19 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x17b, &(0x7f0000001340)="c4c691019919da078a0098d1e0a59320ff79b040f762910016775a8454cc16dc38f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689bce0e2db60713a3a7eeba5c9c6a47312334c2a97a4837714569255346f930000ffbcd48a70502173d6efa56b60f48cf0c9d0989ecbbfc220bd2b39df9ad8d6b14910f4a869863009780dd6e673a02f7ed829932929af9dffb1fa2c43a2316418ba9eb1f8fac57719b6650c7016af47d3160960f4dc0f5e233b32d191e7e4038ed607016ac06e8214ed7d77cea361915907969ff9f43a5aba17ec18f82611bd8eaa876fcc5ff9eac52567ecc1e30746c21060f7aeee1160a26ea18d388ae82180105572516041514566a35650c3f8c39388cc5b3aab2edc6a68af8873f3ddf84521dc060955bde2fff5bf4247701e2745a31ffdc0f3d96521fd6d5707adcdc066169672d06bee71dc1993f83c79c76ff9a270880bd60ff3b1fadffbb1c862c6bfad57922cc7af23e89e7d16abee81de43b925a586f2c74593d2ef55be6c1ad2"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 03:58:19 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x80000148) inotify_add_watch(r0, &(0x7f00000000c0)='./file0\x00', 0x90000213) 03:58:19 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda6, 0x4) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000100)="dff548771d77ce8786aca76dda6fb054ab8ea73799d7293eda90ba41a2db81fab55b5415692300a8e64bca2f60e1717f85f06a6bbca90f392b04f34940db7ffccc33ed6ea82296de9683c9e360cd1c477304bd8f9bd74d44a4c7d1c7e625a86cd54b72c5745f475a772b84977a6b05381dbe6259bc510f0f70c3e9946a78c7b5a19e97447799d930f9", 0x89}, {&(0x7f00000002c0)="96431fb1cb119741590ad657dc5e5ce3e5fe9f1f639e6a18bc7b6c1d0b424eb306f34cf2429c62c0fdefbae36740a7169721af852826d7f14b6cae8af86507ff78a1dda991aea5952f43e7e0146a3c035f0113d617240e8940c60cdf5200193bbe3a0c0b1eae5799db27b4ee9c13475210defa4dac9d784e0c89135b82b321f8e43d7a5db9ab1bfd319f472a", 0x8c}, {&(0x7f0000000a40)="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", 0x364}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="1e268a927f1f6588b967482941ba78600453f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95426a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:58:21 executing program 3: open(0x0, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, r0, 0x0) clone(0x80000000, &(0x7f0000000180)="dcf637d588d23c6cb2e27cadec87b51a99217fb6659762c57ddbdc715633e2e83e9ed0735b24d33e66a8e8287a4bf2ff27639f9ad9dc2e324e2fa52ec7305b4b62bef5921be1dcbd5ad82d1ec6103594008113e17490b1a97ee33fcf02b3c6e6aceec8ca0d2b595f6c8be57fe6e81941ef73c2575dbcf563acac3d8a858a7063d7294bbb9514a32702f3744eb3042a4b235d7abbef579d9c7709ba641c6c20e70425a05db705aae0d682145be318172b253d73c58c988e5ff4ec0a8774d6f244e133cdee09dc87abb9f8cbe972205bc6fdd00a60ad", &(0x7f0000000080), 0x0, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x402c542b, 0x0) 03:58:21 executing program 1: r0 = eventfd2(0x0, 0x0) read$eventfd(r0, &(0x7f0000000180), 0x8) read$eventfd(r0, &(0x7f0000000000), 0x8) write$eventfd(r0, &(0x7f0000000140)=0xffff, 0x8) write$eventfd(r0, &(0x7f0000000040)=0x5, 0x8) 03:58:21 executing program 4: syz_open_dev$sg(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)=0x0) timer_settime(r0, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_nanosleep(0x8, 0x0, &(0x7f0000000280)={0x0, r1+10000000}, 0x0) 03:58:21 executing program 2: r0 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xda\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa8K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xe0\x9d\xb3Yn\xa7\xd4\xd5AU\xe5\xb9\xef\xb9)\xa1\x153\x15\b\xcb\xf7\xefw\x00\x00\x00\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sync_file_range(r0, 0x0, 0x0, 0x6) 03:58:21 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="1c0000001e005f0214fffffffffffff80700"/28, 0x1c) 03:58:21 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_io_uring_setup(0x15b4, &(0x7f0000000340), &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f00000002c0)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r1, 0x6deb, 0x0, 0x0, 0x0, 0x0) readv(r0, &(0x7f0000001440)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETSF2(r4, 0x5437, 0x0) 03:58:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xa) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000280)=0xfff, 0x4) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@GTPA_MS_ADDRESS={0x8, 0x5, @broadcast}, @GTPA_LINK={0x8}]}, 0x24}}, 0x0) recvmmsg(r0, &(0x7f0000008e80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20000062, 0x0) 03:58:21 executing program 3: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0xfffffffb}, 0x10) write(r0, &(0x7f0000000140)="240000001a005f0014f9f407000909000a008000000000ffffff80000800400000000000", 0x24) 03:58:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xa) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000280)=0xfff, 0x4) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@GTPA_MS_ADDRESS={0x8, 0x5, @broadcast}, @GTPA_LINK={0x8}]}, 0x24}}, 0x0) recvmmsg(r0, &(0x7f0000008e80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20000062, 0x0) 03:58:21 executing program 2: r0 = syz_io_uring_setup(0x2ce5, &(0x7f0000000200), &(0x7f0000002000/0x2000)=nil, &(0x7f0000490000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000080)=0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_SEND={0x1a, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x0, 0x0, r3}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_POLL_REMOVE, 0x6) io_uring_enter(r0, 0xa2, 0x0, 0x0, 0x0, 0x0) 03:58:21 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_io_uring_setup(0x15b4, &(0x7f0000000340), &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f00000002c0)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r1, 0x6deb, 0x0, 0x0, 0x0, 0x0) readv(r0, &(0x7f0000001440)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETSF2(r4, 0x5437, 0x0) 03:58:21 executing program 3: mlock(&(0x7f0000bff000/0x400000)=nil, 0x400000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) madvise(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3) 03:58:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xa) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000280)=0xfff, 0x4) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@GTPA_MS_ADDRESS={0x8, 0x5, @broadcast}, @GTPA_LINK={0x8}]}, 0x24}}, 0x0) recvmmsg(r0, &(0x7f0000008e80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20000062, 0x0) 03:58:22 executing program 1: r0 = syz_io_uring_setup(0x187, &(0x7f0000000340), &(0x7f00004f4000/0x4000)=nil, &(0x7f0000116000/0x4000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_open_dev$tty1(0xc, 0x4, 0x1) eventfd2(0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index=0x8, 0x0, 0x0}, 0x5) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd=r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x3b61, 0x0, 0x0, 0x0, 0x0) 03:58:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xa) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000280)=0xfff, 0x4) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@GTPA_MS_ADDRESS={0x8, 0x5, @broadcast}, @GTPA_LINK={0x8}]}, 0x24}}, 0x0) recvmmsg(r0, &(0x7f0000008e80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20000062, 0x0) 03:58:24 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="fc0000001c000705ab092509b86807000aab05000000000000000a93210001", 0xffffffe7) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 03:58:24 executing program 3: r0 = socket(0xa, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$inet6_mreq(r0, 0x88, 0x66, &(0x7f0000005fc0)={@mcast2}, &(0x7f0000006000)=0x14) 03:58:24 executing program 4: syz_open_dev$sg(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)=0x0) timer_settime(r0, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_nanosleep(0x8, 0x0, &(0x7f0000000280)={0x0, r1+10000000}, 0x0) 03:58:24 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_io_uring_setup(0x15b4, &(0x7f0000000340), &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f00000002c0)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r1, 0x6deb, 0x0, 0x0, 0x0, 0x0) readv(r0, &(0x7f0000001440)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETSF2(r4, 0x5437, 0x0) 03:58:24 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000001040), 0x0, 0x0) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000040)=""/144) r2 = syz_open_dev$evdev(&(0x7f0000001040), 0x0, 0x82442) ioctl$EVIOCGKEY(r2, 0x5452, &(0x7f0000000040)=""/4096) 03:58:24 executing program 5: r0 = socket$inet(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xd7}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendfile(r0, r1, 0x0, 0x4bd3a94f) 03:58:24 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000000101ff0f0000000800000000020000000c0019800800010004000000040001"], 0x24}}, 0x0) 03:58:24 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000200), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000380)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}]}, 0x28}}, 0x0) [ 374.831929][T19538] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=33608 sclass=netlink_route_socket pid=19538 comm=syz-executor.5 [ 374.839205][T19528] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.2'. 03:58:24 executing program 0: prctl$PR_SET_SECUREBITS(0x1c, 0x25) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x10) 03:58:24 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @private=0xa010102}, {0x0, @link_local}, 0x6a, {0x2, 0x0, @loopback}, 'sit0\x00'}) write(0xffffffffffffffff, &(0x7f0000000200)="9c10ab00801ada2eb4ae3c532f9426afab26b49614db2b51017eee80170168d0d1326f10bacb2889a8018f7e233c7482c24641d22fd3a1e43ed8e8836701e9fc5f45c8558a1eac338b36f5e01dbe94b053548c68a8a44735c024e2141b1e2ffc9fd66410a27fa98735636c0aa8dc7d6a45b99404112b0ff78888fabbfebe7dee4b93265d22769619d1e0a29ef4603a560e14588256d015dcc5e57c53100bdfa22f", 0xa1) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000018c0)="1c0000001200050f0ca6760000ee53c6ce0ffb299d49b23e9b200a00089f36b878220724e59b4786e36bbe65d7b96e4161b0a242563fefdc437c632071d191cfe58d6875069935cbb3bf3dda5e55d1b6bcd38cab8bbb93ad3a31287b0f0af6e96ea1db4bd320d1b6857f884a5457716b3ba6e4e6b5aa629f2d678f53ad3fcb", 0x7f, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000400)=""/4096, 0x7e, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e21, 0x5, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x100}, 0x1c) sendto$inet6(r1, &(0x7f00000000c0)="1ba0000010001d0200fdc5cbdd041d8e828003000000000001a7960fab0fc8da78031c6660b08f00003f71aced466b4644434a88fed7d75725e1069e42dc4b3844e5fb82bb02fec770967c740c00000000d02830b5a4c01a92317320f0c0a5adb7b5b8bf255f1a8dffa8", 0xfe0b, 0x40800, 0x0, 0xffffffffffffff95) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x20}, 0x1c) recvfrom$inet6(r3, &(0x7f0000000000)=""/35, 0xffffffffffffff13, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r4 = accept4(r2, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) sendto$inet6(r3, &(0x7f00000001c0)="9750757e6e", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x600000000000004) 03:58:24 executing program 3: mkdir(&(0x7f0000002200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000980)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000009c0)=""/4096, 0x1000) getdents64(r0, 0x0, 0x0) [ 374.873857][T19538] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=50422 sclass=netlink_route_socket pid=19538 comm=syz-executor.5 [ 374.889985][T19538] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=18432 sclass=netlink_route_socket pid=19538 comm=syz-executor.5 [ 374.910161][T19538] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4075 sclass=netlink_route_socket pid=19538 comm=syz-executor.5 03:58:24 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpgid(0x0, 0x0) [ 374.938618][T19542] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.2'. [ 374.952830][T19558] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 374.961765][T19538] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=19456 sclass=netlink_route_socket pid=19538 comm=syz-executor.5 03:58:24 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='nonumtail=1']) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 03:58:24 executing program 3: mkdir(&(0x7f0000002200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000980)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000009c0)=""/4096, 0x1000) getdents64(r0, 0x0, 0x0) [ 374.985898][T19558] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 375.012810][T19567] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 375.022359][T19538] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4367 sclass=netlink_route_socket pid=19538 comm=syz-executor.5 [ 375.034689][T19558] netlink: 40027 bytes leftover after parsing attributes in process `syz-executor.1'. [ 375.045044][T19558] device lo entered promiscuous mode [ 375.046373][T19538] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=143 sclass=netlink_route_socket pid=19538 comm=syz-executor.5 [ 375.051164][T19558] device sit0 entered promiscuous mode [ 375.063397][T19538] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=179 sclass=netlink_route_socket pid=19538 comm=syz-executor.5 [ 375.071084][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 375.081787][T19538] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=224 sclass=netlink_route_socket pid=19538 comm=syz-executor.5 [ 375.114577][T19538] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19538 comm=syz-executor.5 03:58:25 executing program 4: syz_open_dev$sg(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)=0x0) timer_settime(r0, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_nanosleep(0x8, 0x0, &(0x7f0000000280)={0x0, r1+10000000}, 0x0) 03:58:25 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='nonumtail=1']) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 03:58:25 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = epoll_create1(0x0) fcntl$dupfd(r0, 0xb, 0xffffffffffffffff) 03:58:25 executing program 3: mkdir(&(0x7f0000002200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000980)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000009c0)=""/4096, 0x1000) getdents64(r0, 0x0, 0x0) 03:58:25 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[{&(0x7f00000002c0)="82c766792c45a66c3f9807ab1ed7fa62b740871b38cc0b36c95e4db2a3088753005d976c1e14c08f97a8a5bc46bd92af43c1d1c593a3668fdfcf3bbfd83e73fc6daa1b3731ab877bf115dc68e1522c302fc6ef9cdd10bb6299e90f749c9f6fd17ad4409fd0d33f1d58dd18442f0701f89774582a8277c326f491f82632453023731e24e5cd84f83b6f3d9c988a2c19e3ebc23f9aedae38a2a5511a5f2a8431e89561d3bcd233f10756a88ec665ceb8db626e6f4457332898fe2c5aa6d4f38cf5bb", 0xc1}, {&(0x7f00000001c0)="21a5c6e559db2e860263b3b4e599c171fd20186cb2491b278eec244365bc0982bc8a1e17a97a46cdcfbabab937b64d75495ab054", 0x34}, {&(0x7f0000000600)="f82905528a7bebad0c2e3b1a34bc32f444a6cfd7a111169fcb76f790c2d74a1267efb285becf9a61ce1ef32ec683ae2c5614d4395f4c324233556d713fbfc612b4f92fca4a02d00c62b4e39f4e702eedc4cf7e18f744705350de315bc96fbd04d59fa00b7c211b958b8055da9327a59ddffb4f8e24e3aa490de2678f373ea7d9022c3ce5a1dcabdbe732595056977532ddad64c9ab92e4c8f58563cd3b8b", 0x9e, 0x64}], 0x0, &(0x7f0000000980)={[{@gid={'gid', 0x3d, 0xee01}}, {@size={'size', 0x3d, [0x0, 0x0, 0x0, 0x37]}}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x0, 0x74]}}, {@huge_always}, {@huge_always}], [{@appraise}, {@subj_role={'subj_role', 0x3d, '-:]#)^\' '}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}, {@permit_directio}, {@appraise}, {@obj_type}, {@fsmagic}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00') sendmmsg$sock(0xffffffffffffffff, &(0x7f00000029c0)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000440)="c0f5207ee74ad987524d395b52b5258adc9566983ae91361875485c578a84e52b914dabd8aad78ced512944eb1e76302f117ea55ee2a38c7ffdb8b2d4571ca663b92d3cded85fca9e47ef9bf61a0757fcfec54ddfb4054", 0x57}, {&(0x7f00000004c0)}], 0x2, &(0x7f0000000580)=[@timestamping={{0x14, 0x1, 0x25, 0x3b}}, @txtime={{0x18, 0x1, 0x3d, 0x4}}, @txtime={{0x18}}], 0x48}}, {{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="b8a5b2f831bb85d1f4a4059920907e", 0xf}, {&(0x7f0000000700)="7553f5497b05943776dea51a8e154c8eb679e610041c11dbe9a3929d2dbeb1e2dc3c0cf90fcd5685dba8e23bc9fa2e8977e2a0f68abdf307c1b8b05123f29f71b7dd199818e545c45bdb3e725124aa205bb43db269d3c2608eab715847048c24a448b5a6c21c11cdc5b43bd46a814a314cc1a91924e3df5034b315b246b86f31dc7e3a8a4b4a4039415654562bd921cca84c36c8f6221d932bcd49f8236ad8a4651770efbbdee31b61a1c094ac9a2bbd4fba9372a0ebd828bed25699d93fcc0a650e13ed73c00a33ec8b988042f54ae91f5f101a27d109262a66bfa8b9b6ecf168a132540353c2fabd8ea6e4cf6775b55e", 0xf1}, {&(0x7f0000000100)="c99d26ab2ddf25f172ee7d1c1bedb872c7c538ef7c6d5c9809a71d3d2dc0f8638666dbf82df2da780c53984cff435de481694adc4dcd18", 0x37}], 0x3}}], 0x2, 0x0) setgroups(0x400000000000026f, &(0x7f0000000080)=[0x0, 0xee00]) preadv(r0, &(0x7f00000006c0)=[{&(0x7f0000002a40)=""/4112, 0x1010}], 0x1, 0x0, 0x0) 03:58:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)={0x74, 0x0, 0x1, 0x409, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x10, 0x6, 0x0, 0x1, [@CTA_NAT_PROTO={0xc, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e21}]}]}]}, 0x74}}, 0x0) 03:58:25 executing program 3: mkdir(&(0x7f0000002200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000980)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000009c0)=""/4096, 0x1000) getdents64(r0, 0x0, 0x0) [ 375.784123][T19558] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 375.793572][T19558] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 375.803183][T19567] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 375.812773][T19558] netlink: 40027 bytes leftover after parsing attributes in process `syz-executor.1'. 03:58:25 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @private=0xa010102}, {0x0, @link_local}, 0x6a, {0x2, 0x0, @loopback}, 'sit0\x00'}) write(0xffffffffffffffff, &(0x7f0000000200)="9c10ab00801ada2eb4ae3c532f9426afab26b49614db2b51017eee80170168d0d1326f10bacb2889a8018f7e233c7482c24641d22fd3a1e43ed8e8836701e9fc5f45c8558a1eac338b36f5e01dbe94b053548c68a8a44735c024e2141b1e2ffc9fd66410a27fa98735636c0aa8dc7d6a45b99404112b0ff78888fabbfebe7dee4b93265d22769619d1e0a29ef4603a560e14588256d015dcc5e57c53100bdfa22f", 0xa1) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000018c0)="1c0000001200050f0ca6760000ee53c6ce0ffb299d49b23e9b200a00089f36b878220724e59b4786e36bbe65d7b96e4161b0a242563fefdc437c632071d191cfe58d6875069935cbb3bf3dda5e55d1b6bcd38cab8bbb93ad3a31287b0f0af6e96ea1db4bd320d1b6857f884a5457716b3ba6e4e6b5aa629f2d678f53ad3fcb", 0x7f, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000400)=""/4096, 0x7e, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e21, 0x5, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x100}, 0x1c) sendto$inet6(r1, &(0x7f00000000c0)="1ba0000010001d0200fdc5cbdd041d8e828003000000000001a7960fab0fc8da78031c6660b08f00003f71aced466b4644434a88fed7d75725e1069e42dc4b3844e5fb82bb02fec770967c740c00000000d02830b5a4c01a92317320f0c0a5adb7b5b8bf255f1a8dffa8", 0xfe0b, 0x40800, 0x0, 0xffffffffffffff95) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x20}, 0x1c) recvfrom$inet6(r3, &(0x7f0000000000)=""/35, 0xffffffffffffff13, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r4 = accept4(r2, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) sendto$inet6(r3, &(0x7f00000001c0)="9750757e6e", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x600000000000004) 03:58:25 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='nonumtail=1']) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 03:58:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x12, 0x0, 0xc04a01) 03:58:25 executing program 3: r0 = memfd_create(&(0x7f0000000900)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf!\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c!\x0f/\xb8o8\xb9\x8d\x19\xe2\xca\x01y\x83\xe7\ng\x87\xd930x0) timer_settime(r0, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_nanosleep(0x8, 0x0, &(0x7f0000000280)={0x0, r1+10000000}, 0x0) 03:58:26 executing program 3: r0 = fsopen(&(0x7f0000000040)='vfat\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000000)='nolazytime\x00', &(0x7f00000000c0)='vfat\x00', 0x0) 03:58:26 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='nonumtail=1']) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 03:58:26 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[{&(0x7f00000002c0)="82c766792c45a66c3f9807ab1ed7fa62b740871b38cc0b36c95e4db2a3088753005d976c1e14c08f97a8a5bc46bd92af43c1d1c593a3668fdfcf3bbfd83e73fc6daa1b3731ab877bf115dc68e1522c302fc6ef9cdd10bb6299e90f749c9f6fd17ad4409fd0d33f1d58dd18442f0701f89774582a8277c326f491f82632453023731e24e5cd84f83b6f3d9c988a2c19e3ebc23f9aedae38a2a5511a5f2a8431e89561d3bcd233f10756a88ec665ceb8db626e6f4457332898fe2c5aa6d4f38cf5bb", 0xc1}, {&(0x7f00000001c0)="21a5c6e559db2e860263b3b4e599c171fd20186cb2491b278eec244365bc0982bc8a1e17a97a46cdcfbabab937b64d75495ab054", 0x34}, {&(0x7f0000000600)="f82905528a7bebad0c2e3b1a34bc32f444a6cfd7a111169fcb76f790c2d74a1267efb285becf9a61ce1ef32ec683ae2c5614d4395f4c324233556d713fbfc612b4f92fca4a02d00c62b4e39f4e702eedc4cf7e18f744705350de315bc96fbd04d59fa00b7c211b958b8055da9327a59ddffb4f8e24e3aa490de2678f373ea7d9022c3ce5a1dcabdbe732595056977532ddad64c9ab92e4c8f58563cd3b8b", 0x9e, 0x64}], 0x0, &(0x7f0000000980)={[{@gid={'gid', 0x3d, 0xee01}}, {@size={'size', 0x3d, [0x0, 0x0, 0x0, 0x37]}}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x0, 0x74]}}, {@huge_always}, {@huge_always}], [{@appraise}, {@subj_role={'subj_role', 0x3d, '-:]#)^\' '}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}, {@permit_directio}, {@appraise}, {@obj_type}, {@fsmagic}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00') sendmmsg$sock(0xffffffffffffffff, &(0x7f00000029c0)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000440)="c0f5207ee74ad987524d395b52b5258adc9566983ae91361875485c578a84e52b914dabd8aad78ced512944eb1e76302f117ea55ee2a38c7ffdb8b2d4571ca663b92d3cded85fca9e47ef9bf61a0757fcfec54ddfb4054", 0x57}, {&(0x7f00000004c0)}], 0x2, &(0x7f0000000580)=[@timestamping={{0x14, 0x1, 0x25, 0x3b}}, @txtime={{0x18, 0x1, 0x3d, 0x4}}, @txtime={{0x18}}], 0x48}}, {{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="b8a5b2f831bb85d1f4a4059920907e", 0xf}, {&(0x7f0000000700)="7553f5497b05943776dea51a8e154c8eb679e610041c11dbe9a3929d2dbeb1e2dc3c0cf90fcd5685dba8e23bc9fa2e8977e2a0f68abdf307c1b8b05123f29f71b7dd199818e545c45bdb3e725124aa205bb43db269d3c2608eab715847048c24a448b5a6c21c11cdc5b43bd46a814a314cc1a91924e3df5034b315b246b86f31dc7e3a8a4b4a4039415654562bd921cca84c36c8f6221d932bcd49f8236ad8a4651770efbbdee31b61a1c094ac9a2bbd4fba9372a0ebd828bed25699d93fcc0a650e13ed73c00a33ec8b988042f54ae91f5f101a27d109262a66bfa8b9b6ecf168a132540353c2fabd8ea6e4cf6775b55e", 0xf1}, {&(0x7f0000000100)="c99d26ab2ddf25f172ee7d1c1bedb872c7c538ef7c6d5c9809a71d3d2dc0f8638666dbf82df2da780c53984cff435de481694adc4dcd18", 0x37}], 0x3}}], 0x2, 0x0) setgroups(0x400000000000026f, &(0x7f0000000080)=[0x0, 0xee00]) preadv(r0, &(0x7f00000006c0)=[{&(0x7f0000002a40)=""/4112, 0x1010}], 0x1, 0x0, 0x0) 03:58:26 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) vmsplice(r0, &(0x7f0000000100)=[{&(0x7f00000000c0)="2ac3cb9375625c1c47ce17baa81d804df40c9a8a5734e9bdafcd275a", 0x1c}], 0x1, 0x10) 03:58:26 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg$AUDIT_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, 0x76, 0x1}, 0x38}}, 0x0) [ 376.314797][T19657] netlink: 'syz-executor.3': attribute type 27 has an invalid length. 03:58:26 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\xafa\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[], 0xff67) sendfile(r0, r1, &(0x7f00000000c0), 0xfff) fcntl$addseals(r1, 0x409, 0x8) fsetxattr$system_posix_acl(r1, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000200)={{}, {0x4}}, 0x24, 0x0) dup3(r0, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 03:58:26 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @private=0xa010102}, {0x0, @link_local}, 0x6a, {0x2, 0x0, @loopback}, 'sit0\x00'}) write(0xffffffffffffffff, &(0x7f0000000200)="9c10ab00801ada2eb4ae3c532f9426afab26b49614db2b51017eee80170168d0d1326f10bacb2889a8018f7e233c7482c24641d22fd3a1e43ed8e8836701e9fc5f45c8558a1eac338b36f5e01dbe94b053548c68a8a44735c024e2141b1e2ffc9fd66410a27fa98735636c0aa8dc7d6a45b99404112b0ff78888fabbfebe7dee4b93265d22769619d1e0a29ef4603a560e14588256d015dcc5e57c53100bdfa22f", 0xa1) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000018c0)="1c0000001200050f0ca6760000ee53c6ce0ffb299d49b23e9b200a00089f36b878220724e59b4786e36bbe65d7b96e4161b0a242563fefdc437c632071d191cfe58d6875069935cbb3bf3dda5e55d1b6bcd38cab8bbb93ad3a31287b0f0af6e96ea1db4bd320d1b6857f884a5457716b3ba6e4e6b5aa629f2d678f53ad3fcb", 0x7f, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000400)=""/4096, 0x7e, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e21, 0x5, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x100}, 0x1c) sendto$inet6(r1, &(0x7f00000000c0)="1ba0000010001d0200fdc5cbdd041d8e828003000000000001a7960fab0fc8da78031c6660b08f00003f71aced466b4644434a88fed7d75725e1069e42dc4b3844e5fb82bb02fec770967c740c00000000d02830b5a4c01a92317320f0c0a5adb7b5b8bf255f1a8dffa8", 0xfe0b, 0x40800, 0x0, 0xffffffffffffff95) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x20}, 0x1c) recvfrom$inet6(r3, &(0x7f0000000000)=""/35, 0xffffffffffffff13, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r4 = accept4(r2, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) sendto$inet6(r3, &(0x7f00000001c0)="9750757e6e", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x600000000000004) 03:58:26 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[{&(0x7f00000002c0)="82c766792c45a66c3f9807ab1ed7fa62b740871b38cc0b36c95e4db2a3088753005d976c1e14c08f97a8a5bc46bd92af43c1d1c593a3668fdfcf3bbfd83e73fc6daa1b3731ab877bf115dc68e1522c302fc6ef9cdd10bb6299e90f749c9f6fd17ad4409fd0d33f1d58dd18442f0701f89774582a8277c326f491f82632453023731e24e5cd84f83b6f3d9c988a2c19e3ebc23f9aedae38a2a5511a5f2a8431e89561d3bcd233f10756a88ec665ceb8db626e6f4457332898fe2c5aa6d4f38cf5bb", 0xc1}, {&(0x7f00000001c0)="21a5c6e559db2e860263b3b4e599c171fd20186cb2491b278eec244365bc0982bc8a1e17a97a46cdcfbabab937b64d75495ab054", 0x34}, {&(0x7f0000000600)="f82905528a7bebad0c2e3b1a34bc32f444a6cfd7a111169fcb76f790c2d74a1267efb285becf9a61ce1ef32ec683ae2c5614d4395f4c324233556d713fbfc612b4f92fca4a02d00c62b4e39f4e702eedc4cf7e18f744705350de315bc96fbd04d59fa00b7c211b958b8055da9327a59ddffb4f8e24e3aa490de2678f373ea7d9022c3ce5a1dcabdbe732595056977532ddad64c9ab92e4c8f58563cd3b8b", 0x9e, 0x64}], 0x0, &(0x7f0000000980)={[{@gid={'gid', 0x3d, 0xee01}}, {@size={'size', 0x3d, [0x0, 0x0, 0x0, 0x37]}}, {@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x0, 0x74]}}, {@huge_always}, {@huge_always}], [{@appraise}, {@subj_role={'subj_role', 0x3d, '-:]#)^\' '}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}, {@permit_directio}, {@appraise}, {@obj_type}, {@fsmagic}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00') sendmmsg$sock(0xffffffffffffffff, &(0x7f00000029c0)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000440)="c0f5207ee74ad987524d395b52b5258adc9566983ae91361875485c578a84e52b914dabd8aad78ced512944eb1e76302f117ea55ee2a38c7ffdb8b2d4571ca663b92d3cded85fca9e47ef9bf61a0757fcfec54ddfb4054", 0x57}, {&(0x7f00000004c0)}], 0x2, &(0x7f0000000580)=[@timestamping={{0x14, 0x1, 0x25, 0x3b}}, @txtime={{0x18, 0x1, 0x3d, 0x4}}, @txtime={{0x18}}], 0x48}}, {{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="b8a5b2f831bb85d1f4a4059920907e", 0xf}, {&(0x7f0000000700)="7553f5497b05943776dea51a8e154c8eb679e610041c11dbe9a3929d2dbeb1e2dc3c0cf90fcd5685dba8e23bc9fa2e8977e2a0f68abdf307c1b8b05123f29f71b7dd199818e545c45bdb3e725124aa205bb43db269d3c2608eab715847048c24a448b5a6c21c11cdc5b43bd46a814a314cc1a91924e3df5034b315b246b86f31dc7e3a8a4b4a4039415654562bd921cca84c36c8f6221d932bcd49f8236ad8a4651770efbbdee31b61a1c094ac9a2bbd4fba9372a0ebd828bed25699d93fcc0a650e13ed73c00a33ec8b988042f54ae91f5f101a27d109262a66bfa8b9b6ecf168a132540353c2fabd8ea6e4cf6775b55e", 0xf1}, {&(0x7f0000000100)="c99d26ab2ddf25f172ee7d1c1bedb872c7c538ef7c6d5c9809a71d3d2dc0f8638666dbf82df2da780c53984cff435de481694adc4dcd18", 0x37}], 0x3}}], 0x2, 0x0) setgroups(0x400000000000026f, &(0x7f0000000080)=[0x0, 0xee00]) preadv(r0, &(0x7f00000006c0)=[{&(0x7f0000002a40)=""/4112, 0x1010}], 0x1, 0x0, 0x0) 03:58:26 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) vmsplice(r0, &(0x7f0000000100)=[{&(0x7f00000000c0)="2ac3cb9375625c1c47ce17baa81d804df40c9a8a5734e9bdafcd275a", 0x1c}], 0x1, 0x10) 03:58:26 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/partitions\x00', 0x0, 0x0) lseek(r0, 0x1c, 0x0) 03:58:26 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f0000000440), &(0x7f00006d5000/0x2000)=nil, &(0x7f00000cc000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000640)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@rights={{0x10}}], 0x10}], 0x1, 0x0) io_uring_enter(r0, 0x6196, 0x0, 0x0, 0x0, 0x0) 03:58:26 executing program 2: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @private=0xa010102}, {0x0, @link_local}, 0x6a, {0x2, 0x0, @loopback}, 'sit0\x00'}) write(0xffffffffffffffff, &(0x7f0000000200)="9c10ab00801ada2eb4ae3c532f9426afab26b49614db2b51017eee80170168d0d1326f10bacb2889a8018f7e233c7482c24641d22fd3a1e43ed8e8836701e9fc5f45c8558a1eac338b36f5e01dbe94b053548c68a8a44735c024e2141b1e2ffc9fd66410a27fa98735636c0aa8dc7d6a45b99404112b0ff78888fabbfebe7dee4b93265d22769619d1e0a29ef4603a560e14588256d015dcc5e57c53100bdfa22f", 0xa1) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000018c0)="1c0000001200050f0ca6760000ee53c6ce0ffb299d49b23e9b200a00089f36b878220724e59b4786e36bbe65d7b96e4161b0a242563fefdc437c632071d191cfe58d6875069935cbb3bf3dda5e55d1b6bcd38cab8bbb93ad3a31287b0f0af6e96ea1db4bd320d1b6857f884a5457716b3ba6e4e6b5aa629f2d678f53ad3fcb", 0x7f, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000400)=""/4096, 0x7e, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e21, 0x5, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x100}, 0x1c) sendto$inet6(r1, &(0x7f00000000c0)="1ba0000010001d0200fdc5cbdd041d8e828003000000000001a7960fab0fc8da78031c6660b08f00003f71aced466b4644434a88fed7d75725e1069e42dc4b3844e5fb82bb02fec770967c740c00000000d02830b5a4c01a92317320f0c0a5adb7b5b8bf255f1a8dffa8", 0xfe0b, 0x40800, 0x0, 0xffffffffffffff95) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x20}, 0x1c) recvfrom$inet6(r3, &(0x7f0000000000)=""/35, 0xffffffffffffff13, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r4 = accept4(r2, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) sendto$inet6(r3, &(0x7f00000001c0)="9750757e6e", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x600000000000004) [ 376.863579][T19672] netlink: 'syz-executor.3': attribute type 27 has an invalid length. 03:58:26 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) vmsplice(r0, &(0x7f0000000100)=[{&(0x7f00000000c0)="2ac3cb9375625c1c47ce17baa81d804df40c9a8a5734e9bdafcd275a", 0x1c}], 0x1, 0x10) 03:58:26 executing program 5: r0 = eventfd2(0x0, 0x0) io_setup(0x2, &(0x7f0000000400)=0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r1, 0x2, &(0x7f00000003c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, 0x0]) 03:58:26 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)) lsetxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000040), &(0x7f00000004c0)=ANY=[], 0xc0, 0x0) getxattr(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)=@known='trusted.overlay.upper\x00', &(0x7f0000000680)=""/76, 0x4c) [ 376.910281][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 376.925157][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:58:26 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)) lsetxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000040), &(0x7f00000004c0)=ANY=[], 0xc0, 0x0) getxattr(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)=@known='trusted.overlay.upper\x00', &(0x7f0000000680)=""/76, 0x4c) 03:58:26 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) vmsplice(r0, &(0x7f0000000100)=[{&(0x7f00000000c0)="2ac3cb9375625c1c47ce17baa81d804df40c9a8a5734e9bdafcd275a", 0x1c}], 0x1, 0x10) [ 376.953377][T19692] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 377.024561][T19706] netlink: 'syz-executor.3': attribute type 27 has an invalid length. 03:58:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000140)=0x2, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$sock(r0, &(0x7f00000054c0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="c4", 0x1}], 0x1, &(0x7f00000011c0)=[@mark={{0x14, 0x1, 0x2}}], 0x18}}], 0x1, 0x0) 03:58:27 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/241, 0xf1) ptrace$setopts(0x4206, r0, 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/241, 0xf1) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x305, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc08c5334, &(0x7f00000003c0)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f00000003c0)={0x0, @tick=0x1000}) tkill(r0, 0x17) 03:58:27 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)) lsetxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000040), &(0x7f00000004c0)=ANY=[], 0xc0, 0x0) getxattr(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)=@known='trusted.overlay.upper\x00', &(0x7f0000000680)=""/76, 0x4c) 03:58:27 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100), 0xa001, 0x0) write$vga_arbiter(r0, &(0x7f0000000000)=@target={'target ', {'PCI:', 'd', ':', '4', ':', 'f', '.', '0'}, 0x58}, 0x13) 03:58:27 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @private=0xa010102}, {0x0, @link_local}, 0x6a, {0x2, 0x0, @loopback}, 'sit0\x00'}) write(0xffffffffffffffff, &(0x7f0000000200)="9c10ab00801ada2eb4ae3c532f9426afab26b49614db2b51017eee80170168d0d1326f10bacb2889a8018f7e233c7482c24641d22fd3a1e43ed8e8836701e9fc5f45c8558a1eac338b36f5e01dbe94b053548c68a8a44735c024e2141b1e2ffc9fd66410a27fa98735636c0aa8dc7d6a45b99404112b0ff78888fabbfebe7dee4b93265d22769619d1e0a29ef4603a560e14588256d015dcc5e57c53100bdfa22f", 0xa1) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000018c0)="1c0000001200050f0ca6760000ee53c6ce0ffb299d49b23e9b200a00089f36b878220724e59b4786e36bbe65d7b96e4161b0a242563fefdc437c632071d191cfe58d6875069935cbb3bf3dda5e55d1b6bcd38cab8bbb93ad3a31287b0f0af6e96ea1db4bd320d1b6857f884a5457716b3ba6e4e6b5aa629f2d678f53ad3fcb", 0x7f, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000400)=""/4096, 0x7e, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e21, 0x5, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x100}, 0x1c) sendto$inet6(r1, &(0x7f00000000c0)="1ba0000010001d0200fdc5cbdd041d8e828003000000000001a7960fab0fc8da78031c6660b08f00003f71aced466b4644434a88fed7d75725e1069e42dc4b3844e5fb82bb02fec770967c740c00000000d02830b5a4c01a92317320f0c0a5adb7b5b8bf255f1a8dffa8", 0xfe0b, 0x40800, 0x0, 0xffffffffffffff95) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x20}, 0x1c) recvfrom$inet6(r3, &(0x7f0000000000)=""/35, 0xffffffffffffff13, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r4 = accept4(r2, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) sendto$inet6(r3, &(0x7f00000001c0)="9750757e6e", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x600000000000004) 03:58:27 executing program 2: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @private=0xa010102}, {0x0, @link_local}, 0x6a, {0x2, 0x0, @loopback}, 'sit0\x00'}) write(0xffffffffffffffff, &(0x7f0000000200)="9c10ab00801ada2eb4ae3c532f9426afab26b49614db2b51017eee80170168d0d1326f10bacb2889a8018f7e233c7482c24641d22fd3a1e43ed8e8836701e9fc5f45c8558a1eac338b36f5e01dbe94b053548c68a8a44735c024e2141b1e2ffc9fd66410a27fa98735636c0aa8dc7d6a45b99404112b0ff78888fabbfebe7dee4b93265d22769619d1e0a29ef4603a560e14588256d015dcc5e57c53100bdfa22f", 0xa1) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000018c0)="1c0000001200050f0ca6760000ee53c6ce0ffb299d49b23e9b200a00089f36b878220724e59b4786e36bbe65d7b96e4161b0a242563fefdc437c632071d191cfe58d6875069935cbb3bf3dda5e55d1b6bcd38cab8bbb93ad3a31287b0f0af6e96ea1db4bd320d1b6857f884a5457716b3ba6e4e6b5aa629f2d678f53ad3fcb", 0x7f, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000400)=""/4096, 0x7e, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e21, 0x5, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x100}, 0x1c) sendto$inet6(r1, &(0x7f00000000c0)="1ba0000010001d0200fdc5cbdd041d8e828003000000000001a7960fab0fc8da78031c6660b08f00003f71aced466b4644434a88fed7d75725e1069e42dc4b3844e5fb82bb02fec770967c740c00000000d02830b5a4c01a92317320f0c0a5adb7b5b8bf255f1a8dffa8", 0xfe0b, 0x40800, 0x0, 0xffffffffffffff95) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x20}, 0x1c) recvfrom$inet6(r3, &(0x7f0000000000)=""/35, 0xffffffffffffff13, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r4 = accept4(r2, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) sendto$inet6(r3, &(0x7f00000001c0)="9750757e6e", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x600000000000004) 03:58:27 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x5, 0x0, 0x0) 03:58:27 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_elf64(r0, &(0x7f0000000640)={{0x1b, 0x5b, 0x7, 0x7, 0x31, 0x0, 0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x105d, 0x40}, [{}]}, 0x78) 03:58:27 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)) lsetxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000040), &(0x7f00000004c0)=ANY=[], 0xc0, 0x0) getxattr(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)=@known='trusted.overlay.upper\x00', &(0x7f0000000680)=""/76, 0x4c) [ 377.820356][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:58:27 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) ioctl$TCXONC(r0, 0x540a, 0x2) r1 = syz_open_pts(r0, 0x0) poll(&(0x7f0000000140)=[{r1}], 0x1, 0x10001) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "32cd58adaf40bd015b17d30446af742f266099"}) 03:58:27 executing program 0: r0 = perf_event_open(&(0x7f0000002200)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x3f) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x1000, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0x40000000}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000100)) 03:58:27 executing program 4: r0 = fsopen(&(0x7f0000000040)='sysfs\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x6, 0x0, 0x0, 0x0) r1 = dup(r0) fsmount(r1, 0x0, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) fstat(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xee00, r3) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f00000000c0)='\x00', &(0x7f0000000100)='\\*{,:,.\x00', 0x0) [ 377.865091][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:58:27 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="8000000000010b04000000000000000002000000240001801400018008000100ac141400080002007f0020010c00028005000100000000001c0010800800f13f0000000008000140150000000800024000000000240002801400018008000100ac9414bb08000200000000000c0002800500010000000000080007"], 0x80}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x0) 03:58:28 executing program 0: r0 = perf_event_open(&(0x7f0000002200)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x3f) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x1000, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0x40000000}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000100)) 03:58:30 executing program 2: unshare(0x8000400) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_int(r0, 0x11, 0x66, &(0x7f0000002100), 0x4) 03:58:30 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = syz_io_uring_setup(0x15b4, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r0, 0x90e, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETAF(r3, 0x5408, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a5ea4a7ad401c0ef"}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_io_uring_setup(0x662b, &(0x7f00000002c0), &(0x7f0000ee5000/0x2000)=nil, &(0x7f0000c00000/0x400000)=nil, 0x0, 0x0) dup2(r3, r0) 03:58:30 executing program 0: r0 = perf_event_open(&(0x7f0000002200)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x3f) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x1000, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0x40000000}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000100)) 03:58:30 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="769100001400010085be0000000f00000a04000001000000000301"], 0x1}}, 0x0) sendmsg$OSF_MSG_REMOVE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 03:58:30 executing program 1: mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000003, 0x4012031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4003, &(0x7f0000000080)=0xbe, 0x3, 0x2) 03:58:30 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 03:58:30 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000680)={0x1, &(0x7f0000000640)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x5f, &(0x7f0000000140)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689c9c6a47312334c2a97ac2b7f0fb4aabebae8dc5dff502173d6efa56b60f48cf0c9d0989ecbbfc220bd2b39df9ad8d6"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 03:58:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') r0 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000004, 0x4000051, r0, 0x0) write$binfmt_misc(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="dc7afea08184959730ba75ccefbbc44b0a03a9e45afc4ef3be01fa8dff6aa640797ea9ed66a4f8fdeaef0ad9dfbe93ec6bccc58a459830a1e94740e06d94342c64dd8165ebea25878b8a8da2560890b8f323579e284fe7fafd05f442ec8ab4712545e6e3d021fdf6b8ff2137a52dc71c80e3c56001709c67a1ec8cb095ca2295"], 0x100) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 03:58:30 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='tmpfs\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000180)='./file0/bus\x00', 0x6210, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000140)='./file0\x00', r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) fstat(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xee00, r2) open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x40, 0x0) 03:58:30 executing program 5: r0 = timerfd_create(0x0, 0x0) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/55, 0x37}], 0x1) timerfd_settime(r0, 0x0, &(0x7f00000000c0)={{}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x387b1d0849878266, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a94000/0x3000)=nil, 0x3000, 0xa) [ 380.821146][T19787] __nla_validate_parse: 29 callbacks suppressed [ 380.821171][T19787] netlink: 35885 bytes leftover after parsing attributes in process `syz-executor.4'. 03:58:30 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit(0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="1400000052004f7fb3e4bf80a000080000000000", 0x14) getpgid(0x0) gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) recvmmsg(r0, &(0x7f0000005c80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x3803}}], 0x344, 0x10122, 0x0) 03:58:30 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000200), 0x228801, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) [ 380.873018][T19801] isolate_lru_page: 32 callbacks suppressed [ 380.873031][T19801] ------------[ cut here ]------------ [ 380.884566][T19801] trying to isolate tail page [ 380.884701][T19801] WARNING: CPU: 0 PID: 19801 at mm/vmscan.c:1960 isolate_lru_page+0x360/0x370 [ 380.898570][T19801] Modules linked in: [ 380.902514][T19801] CPU: 0 PID: 19801 Comm: syz-executor.3 Tainted: G W 5.13.0-rc3-syzkaller #0 [ 380.912812][T19801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 380.922901][T19801] RIP: 0010:isolate_lru_page+0x360/0x370 [ 380.928647][T19801] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 6e 1e f2 ff 48 c7 c7 53 1c 3b 83 31 c0 e8 90 58 da ff <0f> 0b e9 01 fd ff ff e8 54 1e f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 380.948352][T19801] RSP: 0018:ffffc900011e7b08 EFLAGS: 00010246 [ 380.954416][T19801] RAX: b139d995419bce00 RBX: 0000000000000001 RCX: 0000000000040000 [ 380.962416][T19801] RDX: ffffc90006253000 RSI: 00000000000014df RDI: 00000000000014e0 [ 380.970445][T19801] RBP: ffffea00041c7a00 R08: ffffffff8129ab8c R09: 0001c900011e78b7 [ 380.978577][T19801] R10: 0000000000000002 R11: ffff88812f2ba000 R12: ffffea00041c7a40 [ 380.986608][T19801] R13: ffff88812ed1d008 R14: ffffea00041c7a48 R15: 0000000020001000 [ 380.994610][T19801] FS: 00007fd4ce627700(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 381.003565][T19801] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 381.010245][T19801] CR2: 0000000000522030 CR3: 0000000133a3d000 CR4: 00000000001506f0 [ 381.018242][T19801] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 381.026302][T19801] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 381.034368][T19801] Call Trace: [ 381.037745][T19801] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 381.044302][T19801] ? swapin_walk_pmd_entry+0x320/0x320 [ 381.049930][T19801] __walk_page_range+0x93f/0x10e0 [ 381.054968][T19801] walk_page_range+0x111/0x2e0 [ 381.059801][T19801] do_madvise+0x84e/0x1050 [ 381.064217][T19801] ? kcsan_setup_watchpoint+0x26e/0x470 03:58:31 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x1b2, 0x4) connect(r0, &(0x7f00000001c0)=@in={0x2, 0x4e24, @remote}, 0x80) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000000d7, 0x0) [ 381.069786][T19801] __x64_sys_madvise+0x5d/0x70 [ 381.074626][T19801] do_syscall_64+0x4a/0x90 [ 381.079082][T19801] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 381.084990][T19801] RIP: 0033:0x4665d9 [ 381.088898][T19801] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 381.109113][T19801] RSP: 002b:00007fd4ce627188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 381.117725][T19801] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 381.125763][T19801] RDX: 0000000000000015 RSI: 0000000000600003 RDI: 0000000020000000 [ 381.133731][T19801] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 381.141855][T19801] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 381.149837][T19801] R13: 00007ffc02c7532f R14: 00007fd4ce627300 R15: 0000000000022000 [ 381.157972][T19801] ---[ end trace 53ed414deca314cf ]--- [ 381.163501][T19801] ------------[ cut here ]------------ [ 381.169089][T19801] trying to isolate tail page [ 381.169192][T19801] WARNING: CPU: 0 PID: 19801 at mm/vmscan.c:1960 isolate_lru_page+0x360/0x370 [ 381.183075][T19801] Modules linked in: [ 381.186981][T19801] CPU: 0 PID: 19801 Comm: syz-executor.3 Tainted: G W 5.13.0-rc3-syzkaller #0 [ 381.197700][T19801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 381.207886][T19801] RIP: 0010:isolate_lru_page+0x360/0x370 [ 381.213544][T19801] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 6e 1e f2 ff 48 c7 c7 53 1c 3b 83 31 c0 e8 90 58 da ff <0f> 0b e9 01 fd ff ff e8 54 1e f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 381.233402][T19801] RSP: 0018:ffffc900011e7b08 EFLAGS: 00010246 [ 381.239499][T19801] RAX: b139d995419bce00 RBX: 0000000000000001 RCX: 0000000000040000 [ 381.247490][T19801] RDX: ffffc90006253000 RSI: 0000000000022f03 RDI: 0000000000022f04 [ 381.255478][T19801] RBP: ffffea00041c7a00 R08: ffffffff8129ab8c R09: 0001c900011e78b7 [ 381.263533][T19801] R10: 0000000000000002 R11: ffff88812f2ba000 R12: ffffea00041c7a80 [ 381.271530][T19801] R13: ffff88812ed1d010 R14: ffffea00041c7a88 R15: 0000000020002000 [ 381.279513][T19801] FS: 00007fd4ce627700(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 381.288510][T19801] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 381.295095][T19801] CR2: 0000000000522030 CR3: 0000000133a3d000 CR4: 00000000001506f0 [ 381.303074][T19801] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 381.311064][T19801] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 381.319053][T19801] Call Trace: [ 381.322325][T19801] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 381.328662][T19801] ? swapin_walk_pmd_entry+0x320/0x320 [ 381.334144][T19801] __walk_page_range+0x93f/0x10e0 [ 381.339176][T19801] walk_page_range+0x111/0x2e0 [ 381.343955][T19801] do_madvise+0x84e/0x1050 [ 381.348456][T19801] ? kcsan_setup_watchpoint+0x26e/0x470 [ 381.354047][T19801] __x64_sys_madvise+0x5d/0x70 [ 381.358822][T19801] do_syscall_64+0x4a/0x90 [ 381.363288][T19801] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 381.369194][T19801] RIP: 0033:0x4665d9 [ 381.373202][T19801] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 381.393054][T19801] RSP: 002b:00007fd4ce627188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 381.401511][T19801] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 381.409524][T19801] RDX: 0000000000000015 RSI: 0000000000600003 RDI: 0000000020000000 [ 381.417633][T19801] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 381.425717][T19801] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 381.433701][T19801] R13: 00007ffc02c7532f R14: 00007fd4ce627300 R15: 0000000000022000 [ 381.441681][T19801] ---[ end trace 53ed414deca314d0 ]--- [ 381.447173][T19801] ------------[ cut here ]------------ [ 381.452614][T19801] trying to isolate tail page [ 381.452731][T19801] WARNING: CPU: 0 PID: 19801 at mm/vmscan.c:1960 isolate_lru_page+0x360/0x370 [ 381.466351][T19801] Modules linked in: [ 381.470224][T19801] CPU: 0 PID: 19801 Comm: syz-executor.3 Tainted: G W 5.13.0-rc3-syzkaller #0 [ 381.480377][T19801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 381.490521][T19801] RIP: 0010:isolate_lru_page+0x360/0x370 [ 381.496190][T19801] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 6e 1e f2 ff 48 c7 c7 53 1c 3b 83 31 c0 e8 90 58 da ff <0f> 0b e9 01 fd ff ff e8 54 1e f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 381.515869][T19801] RSP: 0018:ffffc900011e7b08 EFLAGS: 00010246 [ 381.521936][T19801] RAX: b139d995419bce00 RBX: 0000000000000001 RCX: 0000000000040000 [ 381.529921][T19801] RDX: ffffc90006253000 RSI: 000000000003ffff RDI: 0000000000040000 [ 381.537923][T19801] RBP: ffffea00041c7a00 R08: ffffffff8129ab8c R09: 0001c900011e78b7 [ 381.546108][T19801] R10: 0000000000000002 R11: ffff88812f2ba000 R12: ffffea00041c7ac0 [ 381.554154][T19801] R13: ffff88812ed1d018 R14: ffffea00041c7ac8 R15: 0000000020003000 [ 381.562129][T19801] FS: 00007fd4ce627700(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 381.571077][T19801] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 381.577773][T19801] CR2: 0000000000522030 CR3: 0000000133a3d000 CR4: 00000000001506f0 [ 381.585774][T19801] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 381.593984][T19801] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 381.601987][T19801] Call Trace: [ 381.605279][T19801] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 381.611685][T19801] ? swapin_walk_pmd_entry+0x320/0x320 [ 381.617169][T19801] __walk_page_range+0x93f/0x10e0 [ 381.622193][T19801] walk_page_range+0x111/0x2e0 [ 381.627025][T19801] do_madvise+0x84e/0x1050 [ 381.631434][T19801] ? kcsan_setup_watchpoint+0x26e/0x470 [ 381.636990][T19801] __x64_sys_madvise+0x5d/0x70 [ 381.641752][T19801] do_syscall_64+0x4a/0x90 [ 381.646212][T19801] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 381.652185][T19801] RIP: 0033:0x4665d9 [ 381.656076][T19801] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 381.675691][T19801] RSP: 002b:00007fd4ce627188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 381.684211][T19801] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 381.692198][T19801] RDX: 0000000000000015 RSI: 0000000000600003 RDI: 0000000020000000 [ 381.700199][T19801] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 381.708211][T19801] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 381.716264][T19801] R13: 00007ffc02c7532f R14: 00007fd4ce627300 R15: 0000000000022000 [ 381.724231][T19801] ---[ end trace 53ed414deca314d1 ]--- [ 381.729687][T19801] ------------[ cut here ]------------ [ 381.735131][T19801] trying to isolate tail page [ 381.735230][T19801] WARNING: CPU: 0 PID: 19801 at mm/vmscan.c:1960 isolate_lru_page+0x360/0x370 [ 381.748755][T19801] Modules linked in: [ 381.752632][T19801] CPU: 0 PID: 19801 Comm: syz-executor.3 Tainted: G W 5.13.0-rc3-syzkaller #0 [ 381.762781][T19801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 381.772850][T19801] RIP: 0010:isolate_lru_page+0x360/0x370 [ 381.778509][T19801] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 6e 1e f2 ff 48 c7 c7 53 1c 3b 83 31 c0 e8 90 58 da ff <0f> 0b e9 01 fd ff ff e8 54 1e f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 381.798195][T19801] RSP: 0018:ffffc900011e7b08 EFLAGS: 00010246 [ 381.804360][T19801] RAX: b139d995419bce00 RBX: 0000000000000001 RCX: 0000000000040000 [ 381.812337][T19801] RDX: ffffc90006253000 RSI: 000000000003ffff RDI: 0000000000040000 [ 381.820356][T19801] RBP: ffffea00041c7a00 R08: ffffffff8129ab8c R09: 0001c900011e78b7 [ 381.828349][T19801] R10: 0000000000000002 R11: ffff88812f2ba000 R12: ffffea00041c7b00 [ 381.836355][T19801] R13: ffff88812ed1d020 R14: ffffea00041c7b08 R15: 0000000020004000 [ 381.844315][T19801] FS: 00007fd4ce627700(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 381.853251][T19801] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 381.860047][T19801] CR2: 0000000000522030 CR3: 0000000133a3d000 CR4: 00000000001506f0 [ 381.868159][T19801] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 381.876336][T19801] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 381.884406][T19801] Call Trace: [ 381.887714][T19801] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 381.894161][T19801] ? swapin_walk_pmd_entry+0x320/0x320 [ 381.899720][T19801] __walk_page_range+0x93f/0x10e0 [ 381.904766][T19801] walk_page_range+0x111/0x2e0 [ 381.909570][T19801] do_madvise+0x84e/0x1050 [ 381.914034][T19801] ? kcsan_setup_watchpoint+0x26e/0x470 [ 381.919624][T19801] __x64_sys_madvise+0x5d/0x70 [ 381.924386][T19801] do_syscall_64+0x4a/0x90 [ 381.928934][T19801] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 381.934946][T19801] RIP: 0033:0x4665d9 [ 381.938857][T19801] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 381.958601][T19801] RSP: 002b:00007fd4ce627188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 381.967042][T19801] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 381.975028][T19801] RDX: 0000000000000015 RSI: 0000000000600003 RDI: 0000000020000000 [ 381.983227][T19801] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 381.991296][T19801] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 381.999292][T19801] R13: 00007ffc02c7532f R14: 00007fd4ce627300 R15: 0000000000022000 [ 382.007291][T19801] ---[ end trace 53ed414deca314d2 ]--- [ 382.012743][T19801] ------------[ cut here ]------------ [ 382.018333][T19801] trying to isolate tail page [ 382.018512][T19801] WARNING: CPU: 0 PID: 19801 at mm/vmscan.c:1960 isolate_lru_page+0x360/0x370 [ 382.032151][T19801] Modules linked in: [ 382.036230][T19801] CPU: 0 PID: 19801 Comm: syz-executor.3 Tainted: G W 5.13.0-rc3-syzkaller #0 [ 382.046424][T19801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 382.056674][T19801] RIP: 0010:isolate_lru_page+0x360/0x370 [ 382.062395][T19801] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 6e 1e f2 ff 48 c7 c7 53 1c 3b 83 31 c0 e8 90 58 da ff <0f> 0b e9 01 fd ff ff e8 54 1e f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 382.082010][T19801] RSP: 0018:ffffc900011e7b08 EFLAGS: 00010246 [ 382.088121][T19801] RAX: b139d995419bce00 RBX: 0000000000000001 RCX: 0000000000040000 [ 382.096108][T19801] RDX: ffffc90006253000 RSI: 000000000003ffff RDI: 0000000000040000 [ 382.104175][T19801] RBP: ffffea00041c7a00 R08: ffffffff8129ab8c R09: 0001c900011e78b7 [ 382.112214][T19801] R10: 0000000000000002 R11: ffff88812f2ba000 R12: ffffea00041c7b40 [ 382.120332][T19801] R13: ffff88812ed1d028 R14: ffffea00041c7b48 R15: 0000000020005000 [ 382.128696][T19801] FS: 00007fd4ce627700(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 382.137653][T19801] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 382.144408][T19801] CR2: 0000000000522030 CR3: 0000000133a3d000 CR4: 00000000001506f0 [ 382.152378][T19801] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 382.160361][T19801] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 382.168359][T19801] Call Trace: [ 382.171654][T19801] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 382.178141][T19801] ? swapin_walk_pmd_entry+0x320/0x320 [ 382.183599][T19801] __walk_page_range+0x93f/0x10e0 [ 382.188643][T19801] walk_page_range+0x111/0x2e0 [ 382.193411][T19801] do_madvise+0x84e/0x1050 [ 382.197874][T19801] ? kcsan_setup_watchpoint+0x26e/0x470 [ 382.203458][T19801] __x64_sys_madvise+0x5d/0x70 [ 382.208260][T19801] do_syscall_64+0x4a/0x90 [ 382.212727][T19801] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 382.218681][T19801] RIP: 0033:0x4665d9 [ 382.222589][T19801] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 382.242431][T19801] RSP: 002b:00007fd4ce627188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 382.250895][T19801] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 382.258936][T19801] RDX: 0000000000000015 RSI: 0000000000600003 RDI: 0000000020000000 [ 382.266922][T19801] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 382.274915][T19801] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 382.282903][T19801] R13: 00007ffc02c7532f R14: 00007fd4ce627300 R15: 0000000000022000 [ 382.290976][T19801] ---[ end trace 53ed414deca314d3 ]--- [ 382.296466][T19801] ------------[ cut here ]------------ [ 382.301932][T19801] trying to isolate tail page [ 382.302006][T19801] WARNING: CPU: 0 PID: 19801 at mm/vmscan.c:1960 isolate_lru_page+0x360/0x370 [ 382.315562][T19801] Modules linked in: [ 382.319435][T19801] CPU: 0 PID: 19801 Comm: syz-executor.3 Tainted: G W 5.13.0-rc3-syzkaller #0 [ 382.329590][T19801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 382.339661][T19801] RIP: 0010:isolate_lru_page+0x360/0x370 [ 382.345317][T19801] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 6e 1e f2 ff 48 c7 c7 53 1c 3b 83 31 c0 e8 90 58 da ff <0f> 0b e9 01 fd ff ff e8 54 1e f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 382.364958][T19801] RSP: 0018:ffffc900011e7b08 EFLAGS: 00010246 [ 382.371037][T19801] RAX: b139d995419bce00 RBX: 0000000000000001 RCX: 0000000000040000 [ 382.379027][T19801] RDX: ffffc90006253000 RSI: 000000000003ffff RDI: 0000000000040000 [ 382.387141][T19801] RBP: ffffea00041c7a00 R08: ffffffff8129ab8c R09: 0001c900011e78b7 [ 382.395182][T19801] R10: 0000000000000002 R11: ffff88812f2ba000 R12: ffffea00041c7b80 [ 382.403173][T19801] R13: ffff88812ed1d030 R14: ffffea00041c7b88 R15: 0000000020006000 [ 382.411165][T19801] FS: 00007fd4ce627700(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 382.420120][T19801] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 382.426825][T19801] CR2: 0000000000522030 CR3: 0000000133a3d000 CR4: 00000000001506f0 [ 382.434808][T19801] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 382.442825][T19801] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 382.450816][T19801] Call Trace: [ 382.454115][T19801] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 382.460452][T19801] ? swapin_walk_pmd_entry+0x320/0x320 [ 382.465935][T19801] __walk_page_range+0x93f/0x10e0 [ 382.470991][T19801] walk_page_range+0x111/0x2e0 [ 382.475786][T19801] do_madvise+0x84e/0x1050 [ 382.480192][T19801] ? kcsan_setup_watchpoint+0x26e/0x470 [ 382.485801][T19801] __x64_sys_madvise+0x5d/0x70 [ 382.490559][T19801] do_syscall_64+0x4a/0x90 [ 382.495024][T19801] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 382.500997][T19801] RIP: 0033:0x4665d9 [ 382.504886][T19801] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 382.524498][T19801] RSP: 002b:00007fd4ce627188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 382.532920][T19801] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 382.541405][T19801] RDX: 0000000000000015 RSI: 0000000000600003 RDI: 0000000020000000 [ 382.549425][T19801] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 382.557534][T19801] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 382.565610][T19801] R13: 00007ffc02c7532f R14: 00007fd4ce627300 R15: 0000000000022000 [ 382.573606][T19801] ---[ end trace 53ed414deca314d4 ]--- [ 382.579163][T19801] ------------[ cut here ]------------ [ 382.584603][T19801] trying to isolate tail page [ 382.584712][T19801] WARNING: CPU: 0 PID: 19801 at mm/vmscan.c:1960 isolate_lru_page+0x360/0x370 [ 382.598396][T19801] Modules linked in: [ 382.602343][T19801] CPU: 0 PID: 19801 Comm: syz-executor.3 Tainted: G W 5.13.0-rc3-syzkaller #0 [ 382.612518][T19801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 382.622661][T19801] RIP: 0010:isolate_lru_page+0x360/0x370 [ 382.628432][T19801] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 6e 1e f2 ff 48 c7 c7 53 1c 3b 83 31 c0 e8 90 58 da ff <0f> 0b e9 01 fd ff ff e8 54 1e f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 382.648085][T19801] RSP: 0018:ffffc900011e7b08 EFLAGS: 00010246 [ 382.654243][T19801] RAX: b139d995419bce00 RBX: 0000000000000001 RCX: 0000000000040000 [ 382.662233][T19801] RDX: ffffc90006253000 RSI: 000000000003ffff RDI: 0000000000040000 [ 382.670238][T19801] RBP: ffffea00041c7a00 R08: ffffffff8129ab8c R09: 0001c900011e78b7 [ 382.678315][T19801] R10: 0000000000000002 R11: ffff88812f2ba000 R12: ffffea00041c7bc0 [ 382.686301][T19801] R13: ffff88812ed1d038 R14: ffffea00041c7bc8 R15: 0000000020007000 [ 382.694442][T19801] FS: 00007fd4ce627700(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 382.703372][T19801] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 382.710077][T19801] CR2: 0000000000522030 CR3: 0000000133a3d000 CR4: 00000000001506f0 [ 382.718152][T19801] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 382.726163][T19801] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 382.734196][T19801] Call Trace: [ 382.737570][T19801] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 382.743930][T19801] ? swapin_walk_pmd_entry+0x320/0x320 [ 382.749407][T19801] __walk_page_range+0x93f/0x10e0 [ 382.754430][T19801] walk_page_range+0x111/0x2e0 [ 382.759241][T19801] do_madvise+0x84e/0x1050 [ 382.763656][T19801] ? kcsan_setup_watchpoint+0x26e/0x470 [ 382.769250][T19801] __x64_sys_madvise+0x5d/0x70 [ 382.774013][T19801] do_syscall_64+0x4a/0x90 [ 382.778520][T19801] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 382.784417][T19801] RIP: 0033:0x4665d9 [ 382.788357][T19801] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 382.808011][T19801] RSP: 002b:00007fd4ce627188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 382.816580][T19801] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 382.824560][T19801] RDX: 0000000000000015 RSI: 0000000000600003 RDI: 0000000020000000 [ 382.832551][T19801] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 382.840603][T19801] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 382.848600][T19801] R13: 00007ffc02c7532f R14: 00007fd4ce627300 R15: 0000000000022000 [ 382.856636][T19801] ---[ end trace 53ed414deca314d5 ]--- [ 382.862082][T19801] ------------[ cut here ]------------ [ 382.867529][T19801] trying to isolate tail page [ 382.867623][T19801] WARNING: CPU: 0 PID: 19801 at mm/vmscan.c:1960 isolate_lru_page+0x360/0x370 [ 382.881240][T19801] Modules linked in: [ 382.885369][T19801] CPU: 0 PID: 19801 Comm: syz-executor.3 Tainted: G W 5.13.0-rc3-syzkaller #0 [ 382.895709][T19801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 382.906028][T19801] RIP: 0010:isolate_lru_page+0x360/0x370 [ 382.912377][T19801] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 6e 1e f2 ff 48 c7 c7 53 1c 3b 83 31 c0 e8 90 58 da ff <0f> 0b e9 01 fd ff ff e8 54 1e f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 382.932611][T19801] RSP: 0018:ffffc900011e7b08 EFLAGS: 00010246 [ 382.938796][T19801] RAX: b139d995419bce00 RBX: 0000000000000001 RCX: 0000000000040000 [ 382.946788][T19801] RDX: ffffc90006253000 RSI: 000000000003ffff RDI: 0000000000040000 [ 382.954877][T19801] RBP: ffffea0004067600 R08: ffffffff8129ab8c R09: 0001c900011e78b7 [ 382.962984][T19801] R10: 0000000000000002 R11: ffff88812f2ba000 R12: ffffea0004067640 [ 382.970985][T19801] R13: ffff88812ed1d048 R14: ffffea0004067648 R15: 0000000020009000 [ 382.979142][T19801] FS: 00007fd4ce627700(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 382.988096][T19801] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 382.994681][T19801] CR2: 0000000000522030 CR3: 0000000133a3d000 CR4: 00000000001506f0 [ 383.002675][T19801] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 383.010800][T19801] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 383.018823][T19801] Call Trace: [ 383.022241][T19801] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 383.028728][T19801] ? swapin_walk_pmd_entry+0x320/0x320 [ 383.034266][T19801] __walk_page_range+0x93f/0x10e0 [ 383.039346][T19801] walk_page_range+0x111/0x2e0 [ 383.044110][T19801] do_madvise+0x84e/0x1050 [ 383.048546][T19801] ? kcsan_setup_watchpoint+0x26e/0x470 [ 383.054091][T19801] __x64_sys_madvise+0x5d/0x70 [ 383.058913][T19801] do_syscall_64+0x4a/0x90 [ 383.063355][T19801] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 383.069453][T19801] RIP: 0033:0x4665d9 [ 383.073369][T19801] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 383.093055][T19801] RSP: 002b:00007fd4ce627188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 383.101487][T19801] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 383.109482][T19801] RDX: 0000000000000015 RSI: 0000000000600003 RDI: 0000000020000000 [ 383.117460][T19801] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 383.125443][T19801] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 383.133407][T19801] R13: 00007ffc02c7532f R14: 00007fd4ce627300 R15: 0000000000022000 [ 383.141386][T19801] ---[ end trace 53ed414deca314d6 ]--- [ 383.147014][T19801] ------------[ cut here ]------------ [ 383.152499][T19801] trying to isolate tail page [ 383.152595][T19801] WARNING: CPU: 0 PID: 19801 at mm/vmscan.c:1960 isolate_lru_page+0x360/0x370 [ 383.166126][T19801] Modules linked in: [ 383.169993][T19801] CPU: 0 PID: 19801 Comm: syz-executor.3 Tainted: G W 5.13.0-rc3-syzkaller #0 [ 383.180255][T19801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 383.190311][T19801] RIP: 0010:isolate_lru_page+0x360/0x370 [ 383.195951][T19801] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 6e 1e f2 ff 48 c7 c7 53 1c 3b 83 31 c0 e8 90 58 da ff <0f> 0b e9 01 fd ff ff e8 54 1e f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 383.215668][T19801] RSP: 0018:ffffc900011e7b08 EFLAGS: 00010246 [ 383.221724][T19801] RAX: b139d995419bce00 RBX: 0000000000000001 RCX: 0000000000040000 [ 383.229694][T19801] RDX: ffffc90006253000 RSI: 000000000003ffff RDI: 0000000000040000 [ 383.237667][T19801] RBP: ffffea0004067600 R08: ffffffff8129ab8c R09: 0001c900011e78b7 [ 383.245643][T19801] R10: 0000000000000002 R11: ffff88812f2ba000 R12: ffffea0004067680 [ 383.253659][T19801] R13: ffff88812ed1d050 R14: ffffea0004067688 R15: 000000002000a000 [ 383.261640][T19801] FS: 00007fd4ce627700(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 383.270590][T19801] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 383.277229][T19801] CR2: 0000000000522030 CR3: 0000000133a3d000 CR4: 00000000001506f0 [ 383.285225][T19801] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 383.293185][T19801] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 383.301350][T19801] Call Trace: [ 383.304619][T19801] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 383.311034][T19801] ? swapin_walk_pmd_entry+0x320/0x320 [ 383.316504][T19801] __walk_page_range+0x93f/0x10e0 [ 383.321526][T19801] walk_page_range+0x111/0x2e0 [ 383.326316][T19801] do_madvise+0x84e/0x1050 [ 383.330763][T19801] ? kcsan_setup_watchpoint+0x26e/0x470 [ 383.336366][T19801] __x64_sys_madvise+0x5d/0x70 [ 383.341117][T19801] do_syscall_64+0x4a/0x90 [ 383.345539][T19801] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 383.351443][T19801] RIP: 0033:0x4665d9 [ 383.355389][T19801] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 383.375008][T19801] RSP: 002b:00007fd4ce627188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 383.383506][T19801] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 383.391527][T19801] RDX: 0000000000000015 RSI: 0000000000600003 RDI: 0000000020000000 [ 383.399499][T19801] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 383.407517][T19801] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 383.415551][T19801] R13: 00007ffc02c7532f R14: 00007fd4ce627300 R15: 0000000000022000 [ 383.423536][T19801] ---[ end trace 53ed414deca314d7 ]--- [ 383.428998][T19801] ------------[ cut here ]------------ [ 383.434438][T19801] trying to isolate tail page [ 383.434510][T19801] WARNING: CPU: 0 PID: 19801 at mm/vmscan.c:1960 isolate_lru_page+0x360/0x370 [ 383.448069][T19801] Modules linked in: [ 383.451932][T19801] CPU: 0 PID: 19801 Comm: syz-executor.3 Tainted: G W 5.13.0-rc3-syzkaller #0 [ 383.462087][T19801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 383.472146][T19801] RIP: 0010:isolate_lru_page+0x360/0x370 [ 383.477802][T19801] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 6e 1e f2 ff 48 c7 c7 53 1c 3b 83 31 c0 e8 90 58 da ff <0f> 0b e9 01 fd ff ff e8 54 1e f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 383.497425][T19801] RSP: 0018:ffffc900011e7b08 EFLAGS: 00010246 [ 383.503493][T19801] RAX: b139d995419bce00 RBX: 0000000000000001 RCX: 0000000000040000 [ 383.511544][T19801] RDX: ffffc90006253000 RSI: 000000000003ffff RDI: 0000000000040000 [ 383.519540][T19801] RBP: ffffea0004067600 R08: ffffffff8129ab8c R09: 0001c900011e78b7 [ 383.527520][T19801] R10: 0000000000000002 R11: ffff88812f2ba000 R12: ffffea00040676c0 [ 383.535500][T19801] R13: ffff88812ed1d058 R14: ffffea00040676c8 R15: 000000002000b000 [ 383.543472][T19801] FS: 00007fd4ce627700(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 383.552429][T19801] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 383.559048][T19801] CR2: 0000000000522030 CR3: 0000000133a3d000 CR4: 00000000001506f0 [ 383.567091][T19801] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 383.575049][T19801] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 383.583017][T19801] Call Trace: [ 383.586348][T19801] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 383.592688][T19801] ? swapin_walk_pmd_entry+0x320/0x320 [ 383.598149][T19801] __walk_page_range+0x93f/0x10e0 [ 383.603241][T19801] walk_page_range+0x111/0x2e0 [ 383.608008][T19801] do_madvise+0x84e/0x1050 [ 383.612417][T19801] ? kcsan_setup_watchpoint+0x26e/0x470 [ 383.617971][T19801] __x64_sys_madvise+0x5d/0x70 [ 383.622796][T19801] do_syscall_64+0x4a/0x90 [ 383.627262][T19801] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 383.633184][T19801] RIP: 0033:0x4665d9 [ 383.637075][T19801] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 383.656794][T19801] RSP: 002b:00007fd4ce627188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 383.665222][T19801] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 383.673176][T19801] RDX: 0000000000000015 RSI: 0000000000600003 RDI: 0000000020000000 03:58:33 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 03:58:33 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x38, 0x1, 0x1, 0x5, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x4, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @dev}}}]}]}, 0x38}}, 0x0) 03:58:33 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000180)={0x2, 0x4e22, @private}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_retopts={{0x10, 0x2}}], 0x10}, 0x0) 03:58:33 executing program 0: r0 = perf_event_open(&(0x7f0000002200)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x3f) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x1000, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0x40000000}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000100)) [ 383.681165][T19801] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 383.689150][T19801] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 383.697160][T19801] R13: 00007ffc02c7532f R14: 00007fd4ce627300 R15: 0000000000022000 [ 383.705156][T19801] ---[ end trace 53ed414deca314d8 ]--- 03:58:33 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r3, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff7f, 0x0, 0x0, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000400)=""/98, 0x62}], 0x1) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet6(r3, &(0x7f0000000000)=""/47, 0xffffffffffffff92, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000000)="480500001400", 0x6}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x200000000e26a, 0x0) 03:58:33 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 03:58:33 executing program 1: futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000000)={0x77359400}, &(0x7f0000048000), 0x0) 03:58:33 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 03:58:33 executing program 0: unshare(0x40000400) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r0, &(0x7f0000000340)=""/114, 0x72, 0x0) [ 383.856101][T19861] netlink: 880 bytes leftover after parsing attributes in process `syz-executor.5'. 03:58:34 executing program 2: mmap(&(0x7f0000b82000/0x1000)=nil, 0x1000, 0x3000004, 0x2031, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mremap(&(0x7f0000b83000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000b82000/0x1000)=nil) 03:58:34 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000240)) 03:58:34 executing program 3: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9740701094400020007100400010001000000080080e20000000b", 0x24) 03:58:34 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x3, &(0x7f0000000040)=[{0x2}, {0x2c}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000001e00), 0x3fffffffffffe36, 0x0) 03:58:34 executing program 5: syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) fchdir(r0) r2 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = memfd_create(&(0x7f0000000340)='\x00\xc2\xea\x99\xbb\x1c\xf8jw\x97\x05\xa3\xa2\'\xdd\xe4q\xbf\t\x8c\xe0\x19\xe5\xbcJ6\xfc\xa8\xcdj\xc1F\x02\x93\xca`\x8e\x00\x00\x00\x00\x00\x00\x00\x00\x00\b \xff\x13\x96\xe3?\xdfH\x8c\xe4V\xe2\xfe\v8\x04\xa5\xb9\xc4:\xf3\xf6y_w\xd8\xcf\x90k\x05\x00\xf9\x1e\xe8m\xec\x12\xa015\xc2\xb3u|K\x111\xd4\f8\xeb\x18\xad\xbb!1\x85\x96P\x1b\xa1\x9a\x81\xf8\xb1\xecB)\xe5\xaa7\xfe\xdd,_D\xe5|\xb1j^\xaec}\x1a\xb4\x17\xafP\x85I\xd5\xa0I\xb0\xaf\xb5\x8b\\\x05\xd7g\xcbV\x8e\xd0\xac\x87I7\xbd\xc6\x9bI\x92\xb2\x87.\xb3\x1fs\xe7%\xdd+\r\xb4\x117\xa7ei~\xb8\x16\xd1P\xf2\x84\x89K\x16\xd0F|\xa3\x89\xc9~9\x00\x00\x00\x00\x00\x00\x00', 0x0) write(r3, &(0x7f00000000c0)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r3, 0x0) r4 = inotify_init1(0x0) r5 = inotify_init1(0x0) inotify_add_watch(r5, &(0x7f0000000040)='./file0\x00', 0xc40001e1) inotify_add_watch(r4, &(0x7f0000000040)='./file0\x00', 0xc40001e1) creat(&(0x7f0000000040)='./file0\x00', 0x0) 03:58:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) writev(r3, &(0x7f0000000000)=[{&(0x7f00000003c0)="05", 0x1}], 0x1) ppoll(&(0x7f0000000040)=[{r2}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 03:58:34 executing program 3: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) writev(r1, &(0x7f0000000740)=[{&(0x7f0000000040)="76c73266563b84afed8daadd2becd8afa779b49d9e34bdd8328022121d95f26ac53a60a4bd09e8477788bc2596591d6385150c6d69a993b007259ede18c3", 0x3e}, {&(0x7f0000000200)="ff8eb23b9a4ec0e6c29baddfd2ea97615ec106b9157335dc1634de7abd121bf4afe530b68c9f16c29850ce956ae4aed5312ac798e1241474ef17bd352aeca7f79b36a0066a6f704462d192bd47b604f7ae0145a2b2024560bf2fdf9381b5c2a33ffc48f1e1168f4a1afbb351790a505deb2845d04f5a043473131ee249a8b21d9d2b243ac210f0ac84a016e9f6389c48e52220525d6bb1b445e4aed26d7f1f5b07d1bd95c30c742639db15c08b7a3d211c700cfca170d877dda5d47c3da17fe17b74b802454c08c1b29b14605f025d6437e06c7507865b26c2326a2fc3c5ae0b310c85da162f2cd75d42c7ca9efcd437adcb", 0xf2}, {&(0x7f0000000300)="4cb71167e4fea10c153093716978ae181aa63766d6cd40c2efb4c3b67d4683569705a33167ab9602bd20d0fa2689823b399b12d0167943186c0817640a6612850e4489d7852a7864260d825f7dc2ec591fdd6e7e3b94e0d5271552f08468", 0x5e}, {&(0x7f0000000380)="88627aa91d33973135c3b91fd29c7d4e1d254e2f650be4577108b4f60e7ca6501e5e1b93227d9637800a3b180650f36f80aa110f18382671ff8806ee3b4058b28ca5734cfe34fa1bd6b620d0bca2d8e648cc559658e99a0ab6aeb3335f", 0x5d}, {&(0x7f0000000400)="0a9e886070070a68d14f25cfe686e3b0943acef5d26d987992f1ab0f64605fde2bf1c56b302577290b9e586720b710723969327a72d84f914f0258bab193e33b6e864eb45bc844d49ebf9661", 0x4c}], 0x5) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000080)=0x4386, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f8}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4dca) splice(r0, 0x0, r2, 0x0, 0xffffffff, 0x0) 03:58:34 executing program 2: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="23320800000000000000ba"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 03:58:34 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x3, &(0x7f0000000080)=[{0x34, 0x0, 0x0, 0x7ffffffe}, {0x7}, {0x6}]}) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f511, 0x0) 03:58:34 executing program 1: futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000000)={0x77359400}, &(0x7f0000048000), 0x0) 03:58:34 executing program 3: open(&(0x7f0000000000)='./file1\x00', 0x1750c0, 0x0) setxattr$system_posix_acl(&(0x7f0000000440)='./file1\x00', &(0x7f0000000480)='system.posix_acl_access\x00', &(0x7f0000000680)={{}, {}, [], {}, [{}, {0x8, 0x0, 0xee00}]}, 0x1c, 0x0) 03:58:34 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000040)="66530700ae891b7dc7674f7094e71b0fb1f147a8378f364602812c66538d750f6e0542e1f89d6cd49ea29996b045f2d1eaa302ab", 0x34}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 03:58:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000003000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000940)={0x18, 0x5e, 0xa21a0ff0c61f0d83, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @uid}]}, 0x18}], 0x1}, 0x0) 03:58:34 executing program 3: setresuid(0x0, 0xee00, 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x10}, 0x10}}, 0x0) 03:58:34 executing program 2: getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f00000001c0)={'NETMAP\x00'}, &(0x7f0000000280)=0x1e) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000200)={0x0, 0x0, {0x2}, 0x3ff}) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a357b6b140cbb6215dd33459"}}], 0xfffffee4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) 03:58:34 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000040)={0x2}) 03:58:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0x3) fcntl$addseals(r1, 0x409, 0xa) fremovexattr(r1, &(0x7f0000000100)=@known='trusted.overlay.metacopy\x00') dup3(r0, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 384.734629][ T25] kauditd_printk_skb: 2 callbacks suppressed [ 384.734640][ T25] audit: type=1326 audit(1621915114.674:529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19909 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 03:58:35 executing program 4: unshare(0x480) r0 = inotify_init1(0x0) inotify_add_watch(r0, 0x0, 0x31000202) 03:58:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="66530700ae897094e71b0fa1f147a8378f364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb298802d8f6c1f3b18d6d352507f7018b31a53bad1ec3533c791a753a1fef2c560001000000000000fb8005128e7e4d939955f8ac396203", 0x7c}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x1e) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00000000000000000000670000000800010000001e0d19a16ccc", @ANYRES32=0x0, @ANYBLOB="0800c300000000000800c40000000000"], 0x34}}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 03:58:35 executing program 2: getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f00000001c0)={'NETMAP\x00'}, &(0x7f0000000280)=0x1e) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000200)={0x0, 0x0, {0x2}, 0x3ff}) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a357b6b140cbb6215dd33459"}}], 0xfffffee4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) 03:58:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x5e, &(0x7f0000000440)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689c9c6a47312334c2a97ac2b7f0fb4aabebae8dc5dffbcd48a70502173d6efa56b60f48cf0c9d0989ecbbfc220bd2b"}}], 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 03:58:35 executing program 1: futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000000)={0x77359400}, &(0x7f0000048000), 0x0) 03:58:35 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x3, &(0x7f0000000080)=[{0x34, 0x0, 0x0, 0x7ffffffe}, {0x7}, {0x6}]}) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f511, 0x0) [ 385.562654][ T25] audit: type=1326 audit(1621915115.504:530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19909 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 03:58:35 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) unshare(0x40400) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5415, 0x0) 03:58:35 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="3e4633c0cd00000000811b"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 03:58:35 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_CHANNEL(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x28, r1, 0x421, 0x0, 0x0, {{0x2}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 03:58:35 executing program 3: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000100)=0x9, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f0000000000)=0x7, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) recvmmsg(r0, &(0x7f0000002040)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 385.656226][ T25] audit: type=1326 audit(1621915115.604:531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19964 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 03:58:35 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="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", 0x124}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) syz_io_uring_setup(0x9c2, &(0x7f0000000080), &(0x7f0000ee8000/0x1000)=nil, &(0x7f00006d4000/0x4000)=nil, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000180)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) wait4(0x0, 0x0, 0x0, 0x0) exit_group(0x0) 03:58:35 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f00000000c0)={0x0, 0x0, 0x7ffffc}) 03:58:35 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='#\'%nod%v\x00\x7f\xe5\xd0ql\x86\xc9\xe6\x14\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x00\x14}\n\x81\xc7\x85|oC\xca\v\xe3\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xab\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF\x13\x9f\xc2\xb7/1\xb9V\xf0*\xcb\xdc\x05n<\xcfi\x02=1\xda\"\xb3\xfe\xf3\x97\xd9\xa5b\xd4\x00Q$\xb2v\\\xa9\xcf*tw\x8a\n_)\x89A\x8f`R\x12zM\a\xc43\xd0d\xee\x13Q', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) r1 = mmap$IORING_OFF_CQ_RING(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x11, 0xffffffffffffffff, 0x8000000) r2 = mmap$IORING_OFF_SQES(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x8, 0x12, 0xffffffffffffffff, 0x10000000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = syz_open_dev$char_raw(&(0x7f0000000140), 0x1, 0x1211c2) r5 = syz_io_uring_setup(0x9c3, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000200)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r8}}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_FILES_UPDATE={0x14, 0x3, 0x0, 0x0, 0x1ff, &(0x7f0000000180)=[r3, r0, r4, r0], 0x4, 0x0, 0x1, {0x0, r8}}, 0x8) sendfile(r0, r0, &(0x7f0000000200), 0x87) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x11, r0, 0x0) r9 = syz_open_procfs(0x0, 0x0) mount(&(0x7f0000000080), &(0x7f0000000080)='.', 0x0, 0x5010, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r9, 0x0, 0x10, &(0x7f0000000380)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in=@initdev}}, &(0x7f0000000100)=0xe8) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532332c756e616d753d2327256e6f642576007fe5d0716c86c9e61493b07f5f2c793c7eab84000000000100147d0a81c7857c6f43ca0be3ba5d666e0ddf21940fafb793e86e80cb65d8da7b86992f52b6c34e1626abf97baf3bcf8ca8b906afd0fb3a904c4e46139fc2b72f31b956f02acbdc056e3ccf69023d31da22b3fef397d9a562d4005124b2765ca9cf2a74778a0a5f2989418f6052127a4d07c433d064ee13512c6e6f657874656e642c6d73697a653d3078303030303030303030303030303062352ca5e4beb9a346413a", @ANYRESDEC=r10, @ANYBLOB="0e030000000255d7"]) 03:58:35 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x25, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = mq_open(0x0, 0x0, 0x0, 0x0) mq_open(&(0x7f0000000280)='eth0\x00', 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_FEATURES(r0, 0x80189439, &(0x7f00000001c0)) r1 = mq_open(&(0x7f0000000680)='eth0\x00O\xd1\xe1+\xbe\x18\x06\x83\xa9\xb0?gB\xed\xfcZ]\xc2f.\xc0Z\x99Y\x7fP\xb8(\x02_\x94\xd2\xa8\x7f$H\xc5\xdb[q\xb89\xf5\xcb6\xb1^Yj\'/\x8f\x1cTZ\xa9\"#\x00bp\x83\x02\xa9\xd1\xc0/\x8b\x98\xa6u\xf8[\xc0,G\xe9l', 0x42, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)) clock_gettime(0x2, &(0x7f0000000140)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800003, 0x50, 0xffffffffffffffff, 0x8bee4000) preadv(r2, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) mq_timedsend(r2, &(0x7f00000002c0)="1d2b58a06f7ef12030acb5d333bdf6e79d21363eead6549bc63eb8c69c52271adede49358395b96ac0d16f4bd1d111dcd852b3f3509c486f21f03519d12ea2ef83cb2eb2fd04c3eaca738fb6c4ccd89257d29e6130312ec44f3d3684554cb35b300fbf8d0865a2677037ee538ca32e2ed9c5b53e67487268c867ab19613ad78c81fde47194049987fc2f14389b6c564e4f2a0b382abac74c31113c978a4a95de378e99559de33db296e02c67730d85c7472176542166752d72e9cc6b2a5499adbaabb7a717a7ed528b42e395ad3ada971b5197e85e06740dd8fbda56e3", 0xdd, 0x76, &(0x7f0000000500)={0x77359400}) mq_timedsend(r0, &(0x7f0000000200)="27e410787c2330db04988b5fdbe50fc693ec48938381deffff1779a2538bf82259280afad06b0e140b278f0e97fa9335fe85db491dc3009f16c82558ab18a672a0c169c34f169d7daa3015d1d254add623ac437514ba776fb2c25e2abac3", 0x5e, 0x1ff, &(0x7f00000003c0)) clock_gettime(0x4, &(0x7f0000000180)) mq_timedreceive(r1, &(0x7f0000000580)=""/83, 0x73ed3df10c16736e, 0x8, &(0x7f0000000100)) r3 = mq_open(&(0x7f0000000280)='\xb5\xff\xff\xff\x00', 0x42, 0x0, 0x0) mq_timedreceive(r3, &(0x7f0000000000)=""/83, 0x9b0c4f391059f39b, 0x0, &(0x7f0000000100)={0x77359400}) mq_timedsend(r3, &(0x7f0000000400)="4de09d987895f7b42ecd845f1381138af9d2e5ad70bff68b44a3dd5af1601c6841b6b11081599f124b63b7d674ec9fdc3bfaf2636ee2b94021b3e791f86a164c538e42212e19e6da2c03532fe73ff6c5ade1cf2afeb5da4f219c6b90b7bdb557d6b8f4697973f1022eccf3682c14c867f21d2b598c4b568d7d1af77e49f502106c794262d50c9e9c178984cc56f9a03d04cc899965ba3533b8cd2669550ecad8bcf287a97ad9965e5bbf8e67d8bd4a62cdfb0ea11994e1362a93f8dc3d62916df60143232249a7ef4e15", 0xca, 0x6, &(0x7f0000000540)) 03:58:35 executing program 2: getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f00000001c0)={'NETMAP\x00'}, &(0x7f0000000280)=0x1e) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000200)={0x0, 0x0, {0x2}, 0x3ff}) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a357b6b140cbb6215dd33459"}}], 0xfffffee4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) 03:58:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @loopback}, 0x1c) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r1, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x1802, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000180), 0x4) 03:58:36 executing program 1: futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000000)={0x77359400}, &(0x7f0000048000), 0x0) 03:58:36 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000b40)=ANY=[], 0xa) close(r2) socket(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000180)="2000000012005f0214f9f407000000000a", 0x11) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 03:58:36 executing program 2: getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f00000001c0)={'NETMAP\x00'}, &(0x7f0000000280)=0x1e) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000200)={0x0, 0x0, {0x2}, 0x3ff}) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a357b6b140cbb6215dd33459"}}], 0xfffffee4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) 03:58:36 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x3, &(0x7f0000000080)=[{0x34, 0x0, 0x0, 0x7ffffffe}, {0x7}, {0x6}]}) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f511, 0x0) 03:58:36 executing program 0: r0 = semget$private(0x0, 0x4000000009, 0x0) semop(r0, &(0x7f0000000180)=[{0x0, 0xfffd}], 0x1) semop(r0, &(0x7f0000000280)=[{0x0, 0xffff}], 0x1) semctl$IPC_RMID(r0, 0x0, 0x0) [ 386.537857][ T25] audit: type=1326 audit(1621915116.485:532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=20031 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 03:58:36 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x300}, 0x0, r2}) 03:58:36 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="66530700ae897094e7b144b097eaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b5877341e0e1dcc2025aa18c9228103b66e1d49d31d322dbecfa63da445b8bef73d9125939f50bd2d4ed96a074eb04a348a666bf48b23ac4edcce412245deacb1f630e4052b9d6c20a45c772242f63a6bf41", 0xb0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) sendmsg$NFT_MSG_GETFLOWTABLE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) tkill(r0, 0x2d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 03:58:36 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="000006526a90c729802e2b"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 03:58:36 executing program 2: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000100)={'fscrypt:', @desc1}, &(0x7f00000001c0)={0x0, "d8929600f39d90e6cc65b2da70bfc52ebf97fb64388e91231df26befcf3768025b2bfd4bd1338a0fc6e3479ae2bd78f86fea9ff8000bcf4ace3df54f4e20b81c"}, 0x48, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r1}) add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "c38afa7701268da84f3c0ea0e7ea07a1a9f43f630764b6ff4976195207867b741342be183edeca2c5cefc825ab46a0ad6909882d31446530737aa504e7719105"}, 0x48, r0) 03:58:36 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[], 0x90) 03:58:36 executing program 3: capset(&(0x7f00000000c0)={0x20080522}, &(0x7f0000000740)) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8949, &(0x7f0000000000)={'batadv0\x00', @ifru_addrs=@ethernet={0x0, @local}}) 03:58:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @loopback}, 0x1c) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r1, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x1802, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000180), 0x4) 03:58:37 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x3, &(0x7f0000000080)=[{0x34, 0x0, 0x0, 0x7ffffffe}, {0x7}, {0x6}]}) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f511, 0x0) 03:58:37 executing program 2: r0 = socket(0x2, 0x3, 0x81) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000100)=0x2f1a, 0x4) sendmsg$unix(r0, &(0x7f0000002580)={&(0x7f0000000000), 0x6e, 0x0}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_int(r0, 0x1, 0x1d, &(0x7f0000000080)=0xa832, 0x4) recvmmsg(r0, &(0x7f0000002040)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2100, 0x0) 03:58:37 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7a900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000388000/0x1000)=nil, 0x1000, 0x65) mprotect(&(0x7f0000763000/0x1000)=nil, 0x1000, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x202, &(0x7f0000000200)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x1a000000}]) r2 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) io_submit(0x0, 0x1, &(0x7f00000002c0)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x9c, r2, &(0x7f0000000240)="2904283d406c1815bdfbc8ac31c09b77a9587e5f1ab0a5ea3dd65127ccf17fb62fbd1ce346f237860386e962be6de293d614698f2223a0b8c7fa17c449b2b8edaa64cb08240eb1bb0ccfc07b8527042c70cf5af7df78aa2f067b6940d85b8165c2bf87afacb3af6973d2e9e5d2", 0x6d, 0x4, 0x0, 0x3}]) r3 = openat(0xffffffffffffffff, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) close(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) 03:58:37 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@updpolicy={0xb8, 0x19, 0x21, 0x0, 0x0, {{@in=@loopback, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x22, &(0x7f0000000040)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x88fe) 03:58:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @loopback}, 0x1c) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r1, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x1802, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000180), 0x4) 03:58:37 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x2}) fcntl$lock(r0, 0x6, &(0x7f0000000100)={0x2, 0x0, 0x7}) 03:58:37 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000006b80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003700)=ANY=[], 0x2e8}}], 0x1, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000000640)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x20, @empty, 0x10000}, 0x1c, 0x0}}, {{&(0x7f0000000500)={0xa, 0x0, 0x0, @mcast1}, 0x1c, &(0x7f0000000700)=[{&(0x7f0000000540)="2f5b886a39d4f13217a93923d74f4e353cec9e6ca44f4ff3160bcfa3582b78ce11feaa0be06878bb6f71817a72ab3d063a097750a9c988c360011d", 0x3b}, {&(0x7f00000005c0)="465846fdd57b042ec4dcaf260bb40f8c", 0x10}, {&(0x7f0000000600)}], 0x3, &(0x7f0000000740)=[@hopopts={{0x130, 0x29, 0x36, {0x2f, 0x22, '\x00', [@generic={0x0, 0x10c, "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"}, @pad1, @padn={0x1, 0x1, [0x0]}]}}}, @dontfrag={{0x14}}], 0x148}}, {{0x0, 0x0, &(0x7f0000002c00)=[{&(0x7f00000018c0)="b6", 0x1}], 0x1, &(0x7f0000002c80)=[@rthdrdstopts={{0x18}}, @dontfrag={{0x14}}], 0x30}}], 0x3, 0x48044) 03:58:37 executing program 2: r0 = socket(0x2, 0x3, 0x81) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000100)=0x2f1a, 0x4) sendmsg$unix(r0, &(0x7f0000002580)={&(0x7f0000000000), 0x6e, 0x0}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_int(r0, 0x1, 0x1d, &(0x7f0000000080)=0xa832, 0x4) recvmmsg(r0, &(0x7f0000002040)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2100, 0x0) 03:58:37 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x33, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b, 0x31, 0x6d, 0x40}}, 0x40) [ 387.415060][ T25] audit: type=1326 audit(1621915117.355:533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=20099 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 03:58:37 executing program 2: r0 = socket(0x2, 0x3, 0x81) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000100)=0x2f1a, 0x4) sendmsg$unix(r0, &(0x7f0000002580)={&(0x7f0000000000), 0x6e, 0x0}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_int(r0, 0x1, 0x1d, &(0x7f0000000080)=0xa832, 0x4) recvmmsg(r0, &(0x7f0000002040)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2100, 0x0) 03:58:37 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000006b80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003700)=ANY=[], 0x2e8}}], 0x1, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000000640)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x20, @empty, 0x10000}, 0x1c, 0x0}}, {{&(0x7f0000000500)={0xa, 0x0, 0x0, @mcast1}, 0x1c, &(0x7f0000000700)=[{&(0x7f0000000540)="2f5b886a39d4f13217a93923d74f4e353cec9e6ca44f4ff3160bcfa3582b78ce11feaa0be06878bb6f71817a72ab3d063a097750a9c988c360011d", 0x3b}, {&(0x7f00000005c0)="465846fdd57b042ec4dcaf260bb40f8c", 0x10}, {&(0x7f0000000600)}], 0x3, &(0x7f0000000740)=[@hopopts={{0x130, 0x29, 0x36, {0x2f, 0x22, '\x00', [@generic={0x0, 0x10c, "ef30ab78b7fe1126b5cd062352f4f698729bf4d4f12df6263dd10e3e21489c12b94eda21eceee4a73b42945c20e88fa0fb0fc060faf1aced57475214c5c5beb778b7166b8a202b24b8979a616f6d9bb5681cdd1f2f1e66c635bdea996a04d63ef24d9e5d6b0530347e2632a089e76bef5a6958d85ad5e87880924df09124d22f43dc4b70efb4b226a919e6099bd7793eba3c54d0db509afeecb588492fab4a33c66668c8948302317f48f10d0b1b79db2c48df26100c8309c21074ed7ac4d15c1d031621424473bb4fa51e0b24f959946249c653e63ee168e1145e032e10cf520d1f517165648cfdd0efc4d41fe5ab3a8c63b8264e2aae628fa915089299385755e74a80cb64a755c7b6b2c4"}, @pad1, @padn={0x1, 0x1, [0x0]}]}}}, @dontfrag={{0x14}}], 0x148}}, {{0x0, 0x0, &(0x7f0000002c00)=[{&(0x7f00000018c0)="b6", 0x1}], 0x1, &(0x7f0000002c80)=[@rthdrdstopts={{0x18}}, @dontfrag={{0x14}}], 0x30}}], 0x3, 0x48044) 03:58:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @loopback}, 0x1c) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r1, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x1802, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000180), 0x4) 03:58:38 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000006b80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003700)=ANY=[], 0x2e8}}], 0x1, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000000640)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x20, @empty, 0x10000}, 0x1c, 0x0}}, {{&(0x7f0000000500)={0xa, 0x0, 0x0, @mcast1}, 0x1c, &(0x7f0000000700)=[{&(0x7f0000000540)="2f5b886a39d4f13217a93923d74f4e353cec9e6ca44f4ff3160bcfa3582b78ce11feaa0be06878bb6f71817a72ab3d063a097750a9c988c360011d", 0x3b}, {&(0x7f00000005c0)="465846fdd57b042ec4dcaf260bb40f8c", 0x10}, {&(0x7f0000000600)}], 0x3, &(0x7f0000000740)=[@hopopts={{0x130, 0x29, 0x36, {0x2f, 0x22, '\x00', [@generic={0x0, 0x10c, "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"}, @pad1, @padn={0x1, 0x1, [0x0]}]}}}, @dontfrag={{0x14}}], 0x148}}, {{0x0, 0x0, &(0x7f0000002c00)=[{&(0x7f00000018c0)="b6", 0x1}], 0x1, &(0x7f0000002c80)=[@rthdrdstopts={{0x18}}, @dontfrag={{0x14}}], 0x30}}], 0x3, 0x48044) 03:58:38 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) readahead(r0, 0x0, 0x0) 03:58:38 executing program 5: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x844, &(0x7f0000000080), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r4, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r5, 0x0}, 0x10001) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) 03:58:38 executing program 2: r0 = socket(0x2, 0x3, 0x81) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000100)=0x2f1a, 0x4) sendmsg$unix(r0, &(0x7f0000002580)={&(0x7f0000000000), 0x6e, 0x0}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_int(r0, 0x1, 0x1d, &(0x7f0000000080)=0xa832, 0x4) recvmmsg(r0, &(0x7f0000002040)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2100, 0x0) 03:58:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @loopback}, 0x1c) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r1, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x1802, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000180), 0x4) 03:58:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x382, 0x0) write$vga_arbiter(r1, &(0x7f0000000040)=@target={'target ', {'PCI:', '0', ':', '6', ':', '19', '.', '1f'}}, 0x15) 03:58:38 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2000) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "1ec75d60024af731e83324c16a8cf9cfedb3de"}) r2 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000013) 03:58:38 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000006b80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003700)=ANY=[], 0x2e8}}], 0x1, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000000640)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x20, @empty, 0x10000}, 0x1c, 0x0}}, {{&(0x7f0000000500)={0xa, 0x0, 0x0, @mcast1}, 0x1c, &(0x7f0000000700)=[{&(0x7f0000000540)="2f5b886a39d4f13217a93923d74f4e353cec9e6ca44f4ff3160bcfa3582b78ce11feaa0be06878bb6f71817a72ab3d063a097750a9c988c360011d", 0x3b}, {&(0x7f00000005c0)="465846fdd57b042ec4dcaf260bb40f8c", 0x10}, {&(0x7f0000000600)}], 0x3, &(0x7f0000000740)=[@hopopts={{0x130, 0x29, 0x36, {0x2f, 0x22, '\x00', [@generic={0x0, 0x10c, "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"}, @pad1, @padn={0x1, 0x1, [0x0]}]}}}, @dontfrag={{0x14}}], 0x148}}, {{0x0, 0x0, &(0x7f0000002c00)=[{&(0x7f00000018c0)="b6", 0x1}], 0x1, &(0x7f0000002c80)=[@rthdrdstopts={{0x18}}, @dontfrag={{0x14}}], 0x30}}], 0x3, 0x48044) 03:58:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0xffffffffffffffe9}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae897094e71b0fa1f147a8378f364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb298802d8f6c1f3b18d6d352507f7018b31a53bad1ec3533c791a753a1fef2c560001000000000000fb8005128e7e4d939955f8ac396203784000400f573fbf000000000000000761f35e959f130dec95128ce7ec033dc0a380543bfc99320be1", 0xa5}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x1e) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 03:58:38 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) preadv2(r0, &(0x7f0000001200)=[{&(0x7f00000000c0)=""/62, 0x3e}], 0x1, 0x2f, 0x0, 0x0) 03:58:38 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12}, &(0x7f0000000780)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x201) clock_gettime(0x0, &(0x7f0000000380)={0x0}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) futex(&(0x7f00000002c0)=0x1, 0x0, 0x1, &(0x7f00000003c0)={r1}, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[], 0x28}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, 0x0, 0x200440f8) clone(0x0, 0x0, 0x0, &(0x7f0000000280), &(0x7f0000000500)="bac0dc5ea0f939678b1d898a9a4618e34608ee73cc5ec9860b52033edcd2553aca7107bffc51e18a409ad573f05a66e3c7dd1b0447ff5944c49f5218ed317f5398839d074a519591b2a20ab30fd5463c4eace5c8f6818c07042e05fb0d26c0225226f0526b763fed29bfef6ab0bd19fab89888b7119fff18dd88288ccc302b79810a53cc583d6c4610a5a98905fd4698bac29f5a548e708fe80383fe13ea00ff4678a283c92289e6449086957f3598eb3adb082492b959cd66cd299e045d0572900215019c39bca7de6ab4d6d0bcf688ad1d5cf3a31ed1501748fa2f05ac660f64b33af42a3b9f23a950c2914a8fb2391bdc6fcff7eb092bb6c752dc6199ff6ad5e04d7281cc3244fb847ed1c074b8f0587e1383d70b1610174032d81202534e5efe7bada21fd3a96e886479410f2d996ca3d3ca85fea800000000") [ 388.335413][T20163] serio: Serial port pts1 03:58:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @loopback}, 0x1c) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r1, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x1802, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000180), 0x4) 03:58:38 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) r1 = socket(0x40000000002, 0x3, 0x80000000002) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)=@abs, 0x6e) preadv(0xffffffffffffffff, &(0x7f00000006c0)=[{0x0}, {&(0x7f0000000080)=""/37, 0x25}], 0x2, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0xfffffffffffffea7, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) 03:58:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @loopback}, 0x1c) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r1, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x1802, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000180), 0x4) 03:58:38 executing program 0: mlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x7) 03:58:38 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@msize={'msize', 0x3d, 0x7fffffff}}], [], 0x6b}}) 03:58:38 executing program 2: unshare(0x8020600) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r0, 0x1, 0x1f, 0x0, &(0x7f0000000580)) 03:58:38 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0xff) set_mempolicy(0x1, &(0x7f0000000000)=0x1, 0x20) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000fcb000), 0x4) 03:58:38 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae897094e785a124b5847bdf574b3164927eb5b126b097eaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d5", 0x71}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x27) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 03:58:38 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x2, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 03:58:38 executing program 0: set_mempolicy(0x1, &(0x7f0000000000)=0xffffffff7fffffff, 0x7) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000180)=[{0x6}]}, 0x10) 03:58:38 executing program 2: socketpair$unix(0x1, 0x400000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000080), 0x4) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) connect$unix(r1, &(0x7f00002ffff6)=@file={0x0, './file0\x00'}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000a8cff0)={0x1, &(0x7f0000528000)=[{0x6}]}, 0x10) close(r0) 03:58:39 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12}, &(0x7f0000000780)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x201) clock_gettime(0x0, &(0x7f0000000380)={0x0}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) futex(&(0x7f00000002c0)=0x1, 0x0, 0x1, &(0x7f00000003c0)={r1}, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[], 0x28}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, 0x0, 0x200440f8) clone(0x0, 0x0, 0x0, &(0x7f0000000280), &(0x7f0000000500)="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") 03:58:39 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'sit0\x00', &(0x7f00000000c0)=@ethtool_rxnfc={0x2a, 0x0, 0x0, {0x0, @esp_ip4_spec={@local, @remote}, {0x0, @remote}, @tcp_ip6_spec={@ipv4={'\x00', '\xff\xff', @remote}, @mcast1}, {0x0, @local}}}}) 03:58:39 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) bind$inet6(r1, &(0x7f0000f67fe4)={0xa, 0x4e20}, 0x1c) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) bind$inet6(r0, &(0x7f0000f67fe4)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 03:58:39 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x2, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 03:58:39 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1000006, 0x200000006c832, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800002, 0x2) 03:58:39 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9a05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b5877341e0e1dcc2025aa18c9228103b66e1d49d31d322dbecfa63da445b8bef5bd9125939f50bd2d4ed96a074eb04a348a666", 0x99}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 03:58:39 executing program 2: r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r0, &(0x7f0000ff9000/0x4000)=nil, 0x5000) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000ff6000/0x4000)=nil) 03:58:39 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000000)={0xfffffffb}, 0x10) write(r1, &(0x7f0000000140)="240000001a005f0014f9f407000909000a00800000000000000000000800100000000000", 0x24) 03:58:39 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66b1f147a8377d36460f812c66538d7f0f6e9fb045703260af3160df0d610b5d09000000000000006c2fef230d003ea1315b9532f3552f08000000", 0x3b}], 0x4, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x5) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 03:58:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, r0, 0x0, &(0x7f0000000040)='.\x00'}, 0x0) io_uring_enter(r1, 0x43b1, 0x0, 0x0, 0x0, 0x0) 03:58:39 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x2, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 03:58:39 executing program 1: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000040)="ff0204000000000100000000000000000000000000000205", 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, 0x0, 0x0) [ 390.855459][T20252] ================================================================== [ 390.863682][T20252] BUG: KCSAN: data-race in do_signal_stop / do_signal_stop [ 390.870857][T20252] [ 390.873157][T20252] write to 0xffff8881335e906c of 4 bytes by task 20255 on cpu 0: [ 390.880843][T20252] do_signal_stop+0x591/0x710 [ 390.885495][T20252] get_signal+0xb70/0x1610 [ 390.889886][T20252] arch_do_signal_or_restart+0x2a/0x220 [ 390.895402][T20252] exit_to_user_mode_prepare+0x109/0x190 [ 390.901015][T20252] syscall_exit_to_user_mode+0x20/0x40 [ 390.906448][T20252] do_syscall_64+0x56/0x90 [ 390.910840][T20252] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 390.916707][T20252] [ 390.919013][T20252] read to 0xffff8881335e906c of 4 bytes by task 20252 on cpu 1: [ 390.926618][T20252] do_signal_stop+0x33e/0x710 [ 390.931278][T20252] get_signal+0xa16/0x1610 [ 390.935670][T20252] arch_do_signal_or_restart+0x2a/0x220 [ 390.941198][T20252] exit_to_user_mode_prepare+0x109/0x190 [ 390.946801][T20252] irqentry_exit_to_user_mode+0x5/0x20 03:58:40 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12}, &(0x7f0000000780)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x201) clock_gettime(0x0, &(0x7f0000000380)={0x0}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) futex(&(0x7f00000002c0)=0x1, 0x0, 0x1, &(0x7f00000003c0)={r1}, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[], 0x28}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, 0x0, 0x200440f8) clone(0x0, 0x0, 0x0, &(0x7f0000000280), &(0x7f0000000500)="bac0dc5ea0f939678b1d898a9a4618e34608ee73cc5ec9860b52033edcd2553aca7107bffc51e18a409ad573f05a66e3c7dd1b0447ff5944c49f5218ed317f5398839d074a519591b2a20ab30fd5463c4eace5c8f6818c07042e05fb0d26c0225226f0526b763fed29bfef6ab0bd19fab89888b7119fff18dd88288ccc302b79810a53cc583d6c4610a5a98905fd4698bac29f5a548e708fe80383fe13ea00ff4678a283c92289e6449086957f3598eb3adb082492b959cd66cd299e045d0572900215019c39bca7de6ab4d6d0bcf688ad1d5cf3a31ed1501748fa2f05ac660f64b33af42a3b9f23a950c2914a8fb2391bdc6fcff7eb092bb6c752dc6199ff6ad5e04d7281cc3244fb847ed1c074b8f0587e1383d70b1610174032d81202534e5efe7bada21fd3a96e886479410f2d996ca3d3ca85fea800000000") 03:58:40 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x3e, &(0x7f00000001c0)="c4c6910199f7d9078a4098d1e0a593b040f7629100f083310528ff64fc2f9675bbd5da8aed164b19c82c8845a10001000000000000476c706d207f04ea5f"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 03:58:40 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66b1f147a8377d36460f812c66538d7f0f6e9fb045703260af3160df0d610b5d09000000000000006c2fef230d003ea1315b9532f3552f08000000", 0x3b}], 0x4, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x5) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 03:58:40 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x2, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 03:58:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000180)) 03:58:40 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x2000, 0x800, &(0x7f0000ffd000/0x2000)=nil) [ 390.952232][T20252] irqentry_exit+0xe/0x30 [ 390.956535][T20252] sysvec_apic_timer_interrupt+0x3e/0x80 [ 390.962154][T20252] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 390.968110][T20252] [ 390.970405][T20252] Reported by Kernel Concurrency Sanitizer on: [ 390.976522][T20252] CPU: 1 PID: 20252 Comm: syz-executor.5 Tainted: G W 5.13.0-rc3-syzkaller #0 [ 390.986639][T20252] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 390.996668][T20252] ================================================================== 03:58:41 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f00000001c0)={0x2000, 0x0, 0x0}) 03:58:41 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66b1f147a8377d36460f812c66538d7f0f6e9fb045703260af3160df0d610b5d09000000000000006c2fef230d003ea1315b9532f3552f08000000", 0x3b}], 0x4, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x5) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 03:58:41 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x4}, {0x14}, {0x6, 0x0, 0x0, 0x7fffffff}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6}]}) 03:58:41 executing program 3: add_key(&(0x7f0000000300)='asymmetric\x00', 0x0, &(0x7f0000000380)="307f3f1ce3303da9fa37a3cbaa35dd01f6fd68f4a08dbc20313c29b65ff1c9d98cdf5f81b3cc4951245581f0a04f30da16160efa1fae6d626bc1491cacf656bae20395c605cf1790dfb3b56e98c5d9052df278699c1fb53f3fe89c8eb5a6756b0d78560944e3d236dd89505179d2f9161a2aebc145f161f7573d5d6e019b8f5c1c", 0x81, 0xfffffffffffffffc) [ 391.072874][ T25] audit: type=1326 audit(1621915121.015:534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=20312 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 03:58:41 executing program 4: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000001400)="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"/3584, 0xe00) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fallocate(r0, 0x11, 0x7, 0x10000e38) sendfile(r0, r1, 0x0, 0x11f08) 03:58:41 executing program 2: rt_sigprocmask(0x0, &(0x7f0000000100)={[0xfffffffffffe]}, 0x0, 0x8) r0 = gettid() timer_create(0x3, &(0x7f0000000180)={0x0, 0x17, 0x4, @tid=r0}, &(0x7f0000000080)) timer_settime(0x0, 0x236bd4336e4642df, &(0x7f0000000300)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) ppoll(0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x8) [ 391.169580][ T25] audit: type=1326 audit(1621915121.045:535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=20312 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=56 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 391.200616][ T25] audit: type=1326 audit(1621915121.045:536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=20312 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 391.224805][ T25] audit: type=1326 audit(1621915121.045:537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=20312 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=186 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 391.249693][ T25] audit: type=1326 audit(1621915121.045:538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=20312 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 391.274086][ T25] audit: type=1326 audit(1621915121.045:539): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=20312 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=1 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 391.298251][ T25] audit: type=1326 audit(1621915121.045:540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=20312 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 391.322478][ T25] audit: type=1326 audit(1621915121.045:541): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=20312 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=61 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 391.346638][ T25] audit: type=1326 audit(1621915121.055:542): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=20333 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 391.374693][ T25] audit: type=1326 audit(1621915121.055:543): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=20333 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 03:58:41 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x8915, 0x0) 03:58:41 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x1a, &(0x7f0000000280)={{{@in6=@private0, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}, {{@in=@local}, 0x0, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0xe8) 03:58:41 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12}, &(0x7f0000000780)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x201) clock_gettime(0x0, &(0x7f0000000380)={0x0}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) futex(&(0x7f00000002c0)=0x1, 0x0, 0x1, &(0x7f00000003c0)={r1}, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[], 0x28}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, 0x0, 0x200440f8) clone(0x0, 0x0, 0x0, &(0x7f0000000280), &(0x7f0000000500)="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") 03:58:41 executing program 4: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000002400), 0x0, 0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x3, 0xffffffffffffffff}) 03:58:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000080)=[{&(0x7f0000000180)="bad75e693175ff4ccfc4", 0xfffffec5}, {&(0x7f0000000300)="76df8cfefa7ddac22dcfcf9e00c693a47524fbfa60133f4bf9500ca94f344e4dd28a9ec9014befb0ea01a514ea8c7c66e5e88e77a778affc2a2030f7fbfa96fe6c14a0c75aee26637a81e3bcb693e7513645eb550c7adad4103ebae473f42372227fa59722490bdd9f2774cffe4bd181ffffffffffffffc3788e745965108c770cc26d1936bcc660d3ccbf2feaeb4603347ab0", 0x93}], 0x2, 0x8) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000000000000000000000600000008000300", @ANYRES32=0x0, @ANYBLOB='\v'], 0x24}}, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000180)="220000001400256304000000000000040208031301000000080002", 0x1b) splice(r1, 0x0, r2, 0x0, 0x100000000, 0x0) 03:58:41 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66b1f147a8377d36460f812c66538d7f0f6e9fb045703260af3160df0d610b5d09000000000000006c2fef230d003ea1315b9532f3552f08000000", 0x3b}], 0x4, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x5) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 03:58:41 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x125, &(0x7f0000001340)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 03:58:41 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="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", 0xfc) 03:58:41 executing program 3: clock_gettime(0x0, &(0x7f0000002940)) mlock(&(0x7f0000bfe000/0x400000)=nil, 0x400000) pkey_mprotect(&(0x7f0000d0b000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) syz_io_uring_setup(0x4995, &(0x7f00000003c0), &(0x7f0000c88000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000140)) 03:58:41 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x61, &(0x7f0000000180)="c4c691017bd5960104e77ef888feaf096d016a14c579937a4391f2b98670dcf40f5a09752b0175b212e01c15bc26a21c10dd0afa02c06c25bc63285a6e36c18cfd160d816229848abd5b94f4287132e225244ad80c4e7e3a96cfa29d56f3094134"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1e681e6e61197c7582265beb6311c2daf20eaebeeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 391.613612][T20370] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'. 03:58:41 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x138) close(r0) r2 = socket$inet(0x2, 0x1, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x8972, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f00009322c4)={0x2, 0x0, @broadcast}, 0x10) setsockopt$inet_tcp_int(r2, 0x6, 0x19, &(0x7f0000000000)=0x1, 0x4) ioctl$int_in(r2, 0x5452, &(0x7f0000000040)=0x10000) 03:58:41 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="c563b94cb9b85b0732cc12"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 03:58:41 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) remap_file_pages(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) [ 391.674746][T20391] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.4'. 03:58:42 executing program 2: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x2, 0x0, 0x0) 03:58:42 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000000)={0x3, 0x0, 0x0, 0x0, 0x7fffffff}) 03:58:42 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x481) close(r0) 03:58:42 executing program 0: rt_sigprocmask(0xf9, &(0x7f0000000000), 0x0, 0x8) 03:58:42 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="66530700ae897094e71b0fa1f107000000364603812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb298802d8f6c1f3b18d6d352507f7018b311fef2c560001000000000000fb8005128e7e4d939955f8ac396203784000400f573fbf000000", 0x7c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x6) 03:58:42 executing program 5: setresuid(0x0, 0xee01, 0xee00) timer_create(0x9, 0x0, &(0x7f0000000080)) 03:58:43 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000380)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x10, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_VALUE={0x4}]}]}, 0x3c}}, 0x0) 03:58:43 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x2, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2000004, 0x12, r1, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, r0, 0x0) 03:58:43 executing program 0: prctl$PR_GET_SPECULATION_CTRL(0x35, 0x0, 0x8) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) 03:58:43 executing program 2: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x2, 0x0, 0x0) 03:58:43 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_io_uring_setup(0x15b4, &(0x7f0000000340), &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r1, 0x6deb, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) clock_nanosleep(0x0, 0x0, &(0x7f00000000c0)={0x0, r4+10000000}, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "1d4b9d847c2cc87dd438128d010687f92a18a9"}) 03:58:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000d6f4655fd6f4655f0100ffff53ef010001000000d5f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000f4e089668a0d4000840a22d1089d0f04010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="02000000030000000400000019000f", 0xf, 0x800}, {&(0x7f0000011500)="ed41000000080000d5f4655fd6f4655fd6f4655f000000000000040040", 0x1d, 0x2100}, {&(0x7f0000012800)="504d4d00504d4dff", 0x8, 0x20000}], 0x0, &(0x7f0000012e00)) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000007c0)={{}, {}, [], {}, [{}, {0x8, 0x0, 0xee00}, {}, {0x8, 0x3}, {}, {}, {0x8, 0x0, 0xee00}], {0x10, 0x6}}, 0x5c, 0x0) 03:58:43 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) accept4(r2, 0xfffffffffffffffd, 0x0, 0x0) 03:58:43 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) mbind(&(0x7f000098e000/0x4000)=nil, 0x4000, 0x4001, &(0x7f0000000040)=0xf43, 0x2, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x10000000002) 03:58:43 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}], 0x0, &(0x7f00000000c0)={[{@shortname_lower}, {@fat=@check_strict}]}) truncate(&(0x7f0000000080)='./file0/file0\x00', 0x7cfc) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x2) 03:58:43 executing program 2: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x2, 0x0, 0x0) 03:58:43 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2fc903c2b54", 0x40}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:58:43 executing program 2: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x2, 0x0, 0x0) 03:58:43 executing program 4: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000400)="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", 0xfc) [ 393.227692][T20459] loop3: detected capacity change from 0 to 2048 03:58:43 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') writev(r1, &(0x7f0000000080)=[{&(0x7f0000000180)='4', 0x1}, {&(0x7f0000000040)='0', 0x1}], 0x8) [ 393.291461][T20459] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 03:58:43 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000000)=0x1, 0x4) sendto$inet(r0, 0x0, 0x0, 0x20020001, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendmmsg$inet(r0, &(0x7f00000018c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000480)="e6", 0x8005}], 0x1}}, {{0x0, 0x240, &(0x7f0000000340)=[{&(0x7f0000000100)=']', 0x1}, {&(0x7f0000000200)='@', 0x1}, {&(0x7f0000000240)="13", 0x1}, {&(0x7f0000000280)="f2", 0x1}], 0x4}}, {{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000c00)='A', 0x1}, {&(0x7f0000000cc0)='^', 0x1}, {&(0x7f0000000040)='w', 0x1}, {&(0x7f0000000180)="1555fbf93cd1", 0xfffffd7c}], 0x4}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001100)="f7", 0x1}, {&(0x7f00000011c0)="8e", 0x1}, {&(0x7f0000001240)="d2", 0x1}, {&(0x7f0000001300)='e', 0x1}, {&(0x7f0000000140)='h', 0x1}, {&(0x7f0000001380)='N', 0x1}], 0x6}}, {{0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000001700)="93", 0x1}, {&(0x7f0000001740)='b', 0x1}], 0x2}}], 0x5, 0x60cd800) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 03:58:43 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)="0908000000004cfcd3b6c9b338a9d17bf8d5a6fc539c33af15ffde510321", 0x1e}], 0x3, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x120, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x22) 03:58:43 executing program 5: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r0, r0, 0x15, &(0x7f0000000300)) ptrace(0x10, r1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$getregset(0x4205, r1, 0x200, &(0x7f0000000100)={0x0}) 03:58:43 executing program 0: r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011020500e1000c040009101a020200", 0x33a) 03:58:43 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000000c0)=0x10d060000) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000001800)) [ 393.356342][T20493] netlink: 224 bytes leftover after parsing attributes in process `syz-executor.4'. [ 393.381909][T20499] netlink: 224 bytes leftover after parsing attributes in process `syz-executor.4'. 03:58:43 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) madvise(&(0x7f00002a5000/0x2000)=nil, 0x2000, 0x0) 03:58:43 executing program 4: prctl$PR_MCE_KILL(0x23, 0x3, 0x550000) 03:58:43 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000093c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) connect$unix(r0, &(0x7f0000000080)=@abs, 0x6e) [ 393.439225][T20510] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 393.447330][T20510] netlink: 254 bytes leftover after parsing attributes in process `syz-executor.0'. 03:58:43 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x20, 0x0, 0x2, 0x3, 0x0, 0x0, {}, [@CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_TUPLE={0x4}, @CTA_EXPECT_MASTER={0x4}]}, 0x20}}, 0x0) 03:58:43 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000280), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f00000016c0)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x7000, 0x0}, &(0x7f0000000040)="9c746fd373defbb2c259e7e8458a914350987227a4ac1756778c10bb03fb256931", 0x0, 0x0, 0x0, 0x0, 0x0}) 03:58:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000001700)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffddffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000300)=ANY=[]) chdir(&(0x7f00000001c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x23) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) 03:58:43 executing program 4: prctl$PR_MCE_KILL(0x23, 0x3, 0x550000) [ 393.571645][T20544] loop3: detected capacity change from 0 to 512 [ 393.596049][T20544] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 393.607590][T20544] EXT4-fs error (device loop3): ext4_mb_generate_buddy:1140: group 0, block bitmap and bg descriptor inconsistent: 50 vs 48 free clusters 03:58:44 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000000)=0x1, 0x4) sendto$inet(r0, 0x0, 0x0, 0x20020001, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendmmsg$inet(r0, &(0x7f00000018c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000480)="e6", 0x8005}], 0x1}}, {{0x0, 0x240, &(0x7f0000000340)=[{&(0x7f0000000100)=']', 0x1}, {&(0x7f0000000200)='@', 0x1}, {&(0x7f0000000240)="13", 0x1}, {&(0x7f0000000280)="f2", 0x1}], 0x4}}, {{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000c00)='A', 0x1}, {&(0x7f0000000cc0)='^', 0x1}, {&(0x7f0000000040)='w', 0x1}, {&(0x7f0000000180)="1555fbf93cd1", 0xfffffd7c}], 0x4}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001100)="f7", 0x1}, {&(0x7f00000011c0)="8e", 0x1}, {&(0x7f0000001240)="d2", 0x1}, {&(0x7f0000001300)='e', 0x1}, {&(0x7f0000000140)='h', 0x1}, {&(0x7f0000001380)='N', 0x1}], 0x6}}, {{0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000001700)="93", 0x1}, {&(0x7f0000001740)='b', 0x1}], 0x2}}], 0x5, 0x60cd800) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 03:58:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000380)={0x28, 0x1a, 0x1, 0x0, 0x0, "", [@nested={0xa, 0x0, 0x0, 0x1, [@generic="880200020010"]}, @nested={0xc, 0x1b, 0x0, 0x1, [@typed={0x6, 0x0, 0x0, 0x0, @str='@\x00'}]}]}, 0x28}], 0x1}, 0x0) 03:58:44 executing program 1: ioprio_set$uid(0x0, 0xee00, 0x2) 03:58:44 executing program 4: prctl$PR_MCE_KILL(0x23, 0x3, 0x550000) 03:58:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000001700)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffddffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000300)=ANY=[]) chdir(&(0x7f00000001c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x23) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) 03:58:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000000)=0x1, 0x4) sendto$inet(r0, 0x0, 0x0, 0x20020001, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendmmsg$inet(r0, &(0x7f00000018c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000480)="e6", 0x8005}], 0x1}}, {{0x0, 0x240, &(0x7f0000000340)=[{&(0x7f0000000100)=']', 0x1}, {&(0x7f0000000200)='@', 0x1}, {&(0x7f0000000240)="13", 0x1}, {&(0x7f0000000280)="f2", 0x1}], 0x4}}, {{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000c00)='A', 0x1}, {&(0x7f0000000cc0)='^', 0x1}, {&(0x7f0000000040)='w', 0x1}, {&(0x7f0000000180)="1555fbf93cd1", 0xfffffd7c}], 0x4}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001100)="f7", 0x1}, {&(0x7f00000011c0)="8e", 0x1}, {&(0x7f0000001240)="d2", 0x1}, {&(0x7f0000001300)='e', 0x1}, {&(0x7f0000000140)='h', 0x1}, {&(0x7f0000001380)='N', 0x1}], 0x6}}, {{0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000001700)="93", 0x1}, {&(0x7f0000001740)='b', 0x1}], 0x2}}], 0x5, 0x60cd800) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 03:58:44 executing program 1: open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r0 = syz_io_uring_setup(0x2de7, &(0x7f0000001600)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000020c0)={0x0, 0x0, {}, {0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x3, 0x0, 0x0) [ 394.273297][T20566] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 394.285890][T20569] loop3: detected capacity change from 0 to 512 [ 394.331764][T20569] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 394.352804][T20569] EXT4-fs error (device loop3): ext4_mb_generate_buddy:1140: group 0, block bitmap and bg descriptor inconsistent: 50 vs 48 free clusters 03:58:44 executing program 5: futex(0x0, 0x6, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f00000000c0), 0x8c, 0x1, 0x0, &(0x7f0000000180), 0x0) 03:58:44 executing program 4: prctl$PR_MCE_KILL(0x23, 0x3, 0x550000) 03:58:44 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) mmap(&(0x7f00004d6000/0x2000)=nil, 0x2000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) openat(0xffffffffffffffff, &(0x7f0000002440)='./file0\x00', 0x0, 0x0) 03:58:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000001700)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffddffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000300)=ANY=[]) chdir(&(0x7f00000001c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x23) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) 03:58:44 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) unshare(0x2c020000) semget$private(0x0, 0x403, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 394.483779][T20601] loop3: detected capacity change from 0 to 512 [ 394.508789][T20601] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 394.539354][T20601] EXT4-fs error (device loop3): ext4_mb_generate_buddy:1140: group 0, block bitmap and bg descriptor inconsistent: 50 vs 48 free clusters 03:58:45 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000000)=0x1, 0x4) sendto$inet(r0, 0x0, 0x0, 0x20020001, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendmmsg$inet(r0, &(0x7f00000018c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000480)="e6", 0x8005}], 0x1}}, {{0x0, 0x240, &(0x7f0000000340)=[{&(0x7f0000000100)=']', 0x1}, {&(0x7f0000000200)='@', 0x1}, {&(0x7f0000000240)="13", 0x1}, {&(0x7f0000000280)="f2", 0x1}], 0x4}}, {{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000c00)='A', 0x1}, {&(0x7f0000000cc0)='^', 0x1}, {&(0x7f0000000040)='w', 0x1}, {&(0x7f0000000180)="1555fbf93cd1", 0xfffffd7c}], 0x4}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001100)="f7", 0x1}, {&(0x7f00000011c0)="8e", 0x1}, {&(0x7f0000001240)="d2", 0x1}, {&(0x7f0000001300)='e', 0x1}, {&(0x7f0000000140)='h', 0x1}, {&(0x7f0000001380)='N', 0x1}], 0x6}}, {{0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000001700)="93", 0x1}, {&(0x7f0000001740)='b', 0x1}], 0x2}}], 0x5, 0x60cd800) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 03:58:45 executing program 5: r0 = socket$inet(0x2, 0x3, 0x8) ioctl$sock_SIOCADDRT(r0, 0x8915, &(0x7f0000003880)={0x0, @l2tp, @can, @l2tp={0x2, 0x0, @broadcast}}) 03:58:45 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) unshare(0x2c020000) semget$private(0x0, 0x403, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 03:58:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000001700)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffddffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000300)=ANY=[]) chdir(&(0x7f00000001c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x23) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) 03:58:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000000)=0x1, 0x4) sendto$inet(r0, 0x0, 0x0, 0x20020001, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendmmsg$inet(r0, &(0x7f00000018c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000480)="e6", 0x8005}], 0x1}}, {{0x0, 0x240, &(0x7f0000000340)=[{&(0x7f0000000100)=']', 0x1}, {&(0x7f0000000200)='@', 0x1}, {&(0x7f0000000240)="13", 0x1}, {&(0x7f0000000280)="f2", 0x1}], 0x4}}, {{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000c00)='A', 0x1}, {&(0x7f0000000cc0)='^', 0x1}, {&(0x7f0000000040)='w', 0x1}, {&(0x7f0000000180)="1555fbf93cd1", 0xfffffd7c}], 0x4}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001100)="f7", 0x1}, {&(0x7f00000011c0)="8e", 0x1}, {&(0x7f0000001240)="d2", 0x1}, {&(0x7f0000001300)='e', 0x1}, {&(0x7f0000000140)='h', 0x1}, {&(0x7f0000001380)='N', 0x1}], 0x6}}, {{0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000001700)="93", 0x1}, {&(0x7f0000001740)='b', 0x1}], 0x2}}], 0x5, 0x60cd800) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 03:58:45 executing program 1: set_mempolicy(0x3, &(0x7f0000000000)=0x5, 0x2) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000040)=""/200) 03:58:45 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x200441, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fstatfs(r1, &(0x7f0000002540)=""/89) 03:58:45 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) unshare(0x2c020000) semget$private(0x0, 0x403, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 03:58:45 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0x1, 0x4, 0x401, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x1}]}, 0x1c}}, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, 0x1, 0x4, 0x401, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5}]}, 0x1c}}, 0x0) [ 395.196713][T20629] loop3: detected capacity change from 0 to 512 03:58:45 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0, 0x0, 0xfffffffe}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff94ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffab2888d050d6b86e50bfffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x2000000, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x4042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) getdents64(r0, &(0x7f0000000280)=""/66, 0x42) 03:58:45 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) unshare(0x2c020000) semget$private(0x0, 0x403, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 03:58:45 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080), 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x410000, 0x8, 0x210000, 0x8}, 0x1c) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000140)=@req3={0x0, 0x0, 0x0, 0x0, 0x1000}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 395.250470][T20629] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 395.330449][T20662] loop1: detected capacity change from 0 to 264192 [ 395.356807][T20662] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 395.369058][T20662] EXT4-fs error (device loop1): ext4_readdir:260: inode #2: block 17: comm syz-executor.1: path /root/syzkaller-testdir780868959/syzkaller.gNBL9K/578/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=4096 fake=0 03:58:45 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000000)=0x1, 0x4) sendto$inet(r0, 0x0, 0x0, 0x20020001, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendmmsg$inet(r0, &(0x7f00000018c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000480)="e6", 0x8005}], 0x1}}, {{0x0, 0x240, &(0x7f0000000340)=[{&(0x7f0000000100)=']', 0x1}, {&(0x7f0000000200)='@', 0x1}, {&(0x7f0000000240)="13", 0x1}, {&(0x7f0000000280)="f2", 0x1}], 0x4}}, {{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000c00)='A', 0x1}, {&(0x7f0000000cc0)='^', 0x1}, {&(0x7f0000000040)='w', 0x1}, {&(0x7f0000000180)="1555fbf93cd1", 0xfffffd7c}], 0x4}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001100)="f7", 0x1}, {&(0x7f00000011c0)="8e", 0x1}, {&(0x7f0000001240)="d2", 0x1}, {&(0x7f0000001300)='e', 0x1}, {&(0x7f0000000140)='h', 0x1}, {&(0x7f0000001380)='N', 0x1}], 0x6}}, {{0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000001700)="93", 0x1}, {&(0x7f0000001740)='b', 0x1}], 0x2}}], 0x5, 0x60cd800) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 03:58:45 executing program 3: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x80000001}, 0x1c) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@updpolicy={0xb8, 0x19, 0x21, 0x0, 0x0, {{@in=@loopback, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x32, &(0x7f0000000040)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x20) 03:58:45 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) connect(r0, &(0x7f0000001100)=@in={0x2, 0x0, @remote}, 0x80) getsockname(r0, 0x0, &(0x7f0000000080)) 03:58:45 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0, 0x0, 0xfffffffe}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff94ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffab2888d050d6b86e50bfffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x2000000, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x4042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) getdents64(r0, &(0x7f0000000280)=""/66, 0x42) 03:58:45 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080), 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x410000, 0x8, 0x210000, 0x8}, 0x1c) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000140)=@req3={0x0, 0x0, 0x0, 0x0, 0x1000}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 03:58:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000000)=0x1, 0x4) sendto$inet(r0, 0x0, 0x0, 0x20020001, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendmmsg$inet(r0, &(0x7f00000018c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000480)="e6", 0x8005}], 0x1}}, {{0x0, 0x240, &(0x7f0000000340)=[{&(0x7f0000000100)=']', 0x1}, {&(0x7f0000000200)='@', 0x1}, {&(0x7f0000000240)="13", 0x1}, {&(0x7f0000000280)="f2", 0x1}], 0x4}}, {{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000c00)='A', 0x1}, {&(0x7f0000000cc0)='^', 0x1}, {&(0x7f0000000040)='w', 0x1}, {&(0x7f0000000180)="1555fbf93cd1", 0xfffffd7c}], 0x4}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001100)="f7", 0x1}, {&(0x7f00000011c0)="8e", 0x1}, {&(0x7f0000001240)="d2", 0x1}, {&(0x7f0000001300)='e', 0x1}, {&(0x7f0000000140)='h', 0x1}, {&(0x7f0000001380)='N', 0x1}], 0x6}}, {{0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000001700)="93", 0x1}, {&(0x7f0000001740)='b', 0x1}], 0x2}}], 0x5, 0x60cd800) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 03:58:46 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080), 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x410000, 0x8, 0x210000, 0x8}, 0x1c) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000140)=@req3={0x0, 0x0, 0x0, 0x0, 0x1000}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 03:58:46 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=@acquire={0x134, 0x17, 0x811, 0x0, 0x0, {{@in6=@empty}, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', {@in=@private, @in=@multicast1}, {{@in6=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}, [@mark={0xc}]}, 0x134}}, 0x0) [ 396.080568][T20685] loop1: detected capacity change from 0 to 264192 [ 396.108372][T20685] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 03:58:46 executing program 3: r0 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f610500020c010a1f00ff050c10080008000b000a000000", 0x24}], 0x1}, 0x0) [ 396.153652][T20685] EXT4-fs error (device loop1): ext4_readdir:260: inode #2: block 17: comm syz-executor.1: path /root/syzkaller-testdir780868959/syzkaller.gNBL9K/579/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=4096 fake=0 03:58:46 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080), 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x410000, 0x8, 0x210000, 0x8}, 0x1c) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000140)=@req3={0x0, 0x0, 0x0, 0x0, 0x1000}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 03:58:46 executing program 3: rseq(&(0x7f0000000000), 0x20, 0x0, 0x0) rseq(&(0x7f0000000000), 0x20, 0x0, 0x0) 03:58:46 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0, 0x0, 0xfffffffe}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff94ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffab2888d050d6b86e50bfffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x2000000, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x4042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) getdents64(r0, &(0x7f0000000280)=""/66, 0x42) [ 396.347416][T20731] loop1: detected capacity change from 0 to 264192 [ 396.358215][T20731] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 396.374202][T20731] EXT4-fs error (device loop1): ext4_readdir:260: inode #2: block 17: comm syz-executor.1: path /root/syzkaller-testdir780868959/syzkaller.gNBL9K/580/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=4096 fake=0 03:58:46 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0, 0x0, 0xfffffffe}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff94fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff