s going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 62.362893][ T5080] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 62.377689][ T5083] team0: Port device team_slave_1 added [ 62.385534][ T5090] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 62.429421][ T5090] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 62.438894][ T5086] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 62.445854][ T5086] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 62.471855][ T5086] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 62.491759][ T5094] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 62.498740][ T5094] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 62.524843][ T5094] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 62.549958][ T4379] Bluetooth: hci0: command 0x0409 tx timeout [ 62.567603][ T5086] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 62.574919][ T5086] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 62.601908][ T5086] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 62.619242][ T5094] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 62.626225][ T5094] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 62.652639][ T4379] Bluetooth: hci1: command 0x0409 tx timeout [ 62.658924][ T5085] Bluetooth: hci2: command 0x0409 tx timeout [ 62.665693][ T5094] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 62.677166][ T5083] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 62.684239][ T5083] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 62.710246][ T5083] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 62.710297][ T5085] Bluetooth: hci3: command 0x0409 tx timeout [ 62.723995][ T5091] team0: Port device team_slave_0 added [ 62.757280][ T5083] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 62.764357][ T5083] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 62.790798][ T4379] Bluetooth: hci5: command 0x0409 tx timeout [ 62.797742][ T5083] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 62.808566][ T4379] Bluetooth: hci4: command 0x0409 tx timeout [ 62.817434][ T5091] team0: Port device team_slave_1 added [ 62.843438][ T5090] team0: Port device team_slave_0 added [ 62.853484][ T5080] device hsr_slave_0 entered promiscuous mode [ 62.860949][ T5080] device hsr_slave_1 entered promiscuous mode [ 62.903264][ T5091] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 62.910678][ T5091] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 62.936642][ T5091] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 62.949646][ T5090] team0: Port device team_slave_1 added [ 62.986352][ T5083] device hsr_slave_0 entered promiscuous mode [ 62.993222][ T5083] device hsr_slave_1 entered promiscuous mode [ 63.000281][ T5083] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 63.008122][ T5083] Cannot create hsr debugfs directory [ 63.014560][ T5091] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 63.021683][ T5091] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 63.048324][ T5091] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 63.079448][ T5094] device hsr_slave_0 entered promiscuous mode [ 63.086191][ T5094] device hsr_slave_1 entered promiscuous mode [ 63.094045][ T5094] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 63.101911][ T5094] Cannot create hsr debugfs directory [ 63.124537][ T5090] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 63.131672][ T5090] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 63.157682][ T5090] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 63.190066][ T5086] device hsr_slave_0 entered promiscuous mode [ 63.196660][ T5086] device hsr_slave_1 entered promiscuous mode [ 63.206588][ T5086] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 63.214817][ T5086] Cannot create hsr debugfs directory [ 63.245680][ T5090] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 63.252948][ T5090] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 63.279590][ T5090] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 63.340956][ T5091] device hsr_slave_0 entered promiscuous mode [ 63.347679][ T5091] device hsr_slave_1 entered promiscuous mode [ 63.363880][ T5091] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 63.371882][ T5091] Cannot create hsr debugfs directory [ 63.435396][ T5090] device hsr_slave_0 entered promiscuous mode [ 63.443057][ T5090] device hsr_slave_1 entered promiscuous mode [ 63.449794][ T5090] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 63.457369][ T5090] Cannot create hsr debugfs directory [ 63.790340][ T5080] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 63.805925][ T5080] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 63.815247][ T5080] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 63.826917][ T5080] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 63.887386][ T5094] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 63.915050][ T5094] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 63.942191][ T5094] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 63.952589][ T5094] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 63.993853][ T5083] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 64.007481][ T5083] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 64.037804][ T5083] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 64.058017][ T5083] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 64.134466][ T5091] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 64.144061][ T5091] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 64.177155][ T5080] 8021q: adding VLAN 0 to HW filter on device bond0 [ 64.191231][ T5091] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 64.208066][ T5091] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 64.283279][ T5080] 8021q: adding VLAN 0 to HW filter on device team0 [ 64.290861][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.303985][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.353715][ T5094] 8021q: adding VLAN 0 to HW filter on device bond0 [ 64.373661][ T5086] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 64.385686][ T5086] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 64.395545][ T5086] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 64.407635][ T5138] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 64.416683][ T5138] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 64.426463][ T5138] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.433848][ T5138] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.442979][ T5138] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.464255][ T5083] 8021q: adding VLAN 0 to HW filter on device bond0 [ 64.479184][ T5086] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 64.500369][ T5094] 8021q: adding VLAN 0 to HW filter on device team0 [ 64.530031][ T5135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 64.538668][ T5135] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 64.548685][ T5135] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.555909][ T5135] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.563772][ T5135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.571900][ T5135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.615174][ T5083] 8021q: adding VLAN 0 to HW filter on device team0 [ 64.629566][ T4379] Bluetooth: hci0: command 0x041b tx timeout [ 64.636249][ T5137] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 64.650638][ T5137] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 64.667484][ T5137] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.674680][ T5137] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.694212][ T5137] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 64.708694][ T5137] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 64.709062][ T4379] Bluetooth: hci1: command 0x041b tx timeout [ 64.717494][ T5085] Bluetooth: hci2: command 0x041b tx timeout [ 64.739205][ T5137] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.746346][ T5137] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.763085][ T5137] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 64.776514][ T5137] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 64.790025][ T5137] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 64.808939][ T5085] Bluetooth: hci3: command 0x041b tx timeout [ 64.815567][ T5137] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 64.832238][ T5137] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.846176][ T5137] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.869450][ T5085] Bluetooth: hci4: command 0x041b tx timeout [ 64.869581][ T4379] Bluetooth: hci5: command 0x041b tx timeout [ 64.939397][ T5139] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.947573][ T5139] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 64.966537][ T5139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 64.975606][ T5139] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 64.984310][ T5139] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.991476][ T5139] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.999320][ T5139] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 65.007863][ T5139] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 65.017014][ T5139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 65.026253][ T5139] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 65.035301][ T5139] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 65.044531][ T5139] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.053256][ T5139] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.060408][ T5139] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.067999][ T5139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 65.103750][ T5090] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 65.115389][ T5137] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 65.123958][ T5137] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 65.133537][ T5137] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 65.142357][ T5137] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 65.151028][ T5137] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 65.163068][ T5080] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 65.183792][ T5090] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 65.193627][ T5090] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 65.205182][ T5090] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 65.217853][ T5143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 65.227276][ T5143] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 65.236848][ T5143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 65.246620][ T5143] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 65.276269][ T5083] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 65.288550][ T5083] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 65.308020][ T5143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 65.323375][ T5143] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 65.336916][ T5143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 65.345235][ T26] kauditd_printk_skb: 10 callbacks suppressed [ 65.345252][ T26] audit: type=1400 audit(1676146775.930:95): avc: denied { sys_module } for pid=5080 comm="syz-executor.0" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 65.384849][ T5143] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 65.394426][ T5143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 65.403419][ T5143] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 65.412578][ T5143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 65.421348][ T5143] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 65.431624][ T5143] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 65.439821][ T5143] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 65.469697][ T5091] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.487136][ T5143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 65.497718][ T5143] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 65.506697][ T5143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 65.515717][ T5143] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 65.524856][ T5143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 65.533674][ T5143] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 65.542364][ T5143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.551058][ T5143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.568171][ T5094] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 65.610918][ T5091] 8021q: adding VLAN 0 to HW filter on device team0 [ 65.655141][ T5136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 65.665697][ T5136] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.675270][ T5136] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.682465][ T5136] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.702739][ T5086] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.740712][ T5138] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 65.750019][ T5138] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 65.759652][ T5138] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.768190][ T5138] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.775381][ T5138] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.783887][ T5138] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 65.831747][ T5143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.850312][ T5143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.876973][ T5143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 65.886240][ T5143] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 65.899592][ T5143] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 65.921103][ T5080] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 65.930625][ T5086] 8021q: adding VLAN 0 to HW filter on device team0 [ 65.982037][ T5138] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 66.000222][ T5138] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 66.078233][ T5138] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 66.098038][ T5138] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 66.120159][ T5138] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 66.139296][ T5138] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 66.148545][ T5138] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 66.157768][ T5138] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.164958][ T5138] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.173003][ T5138] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 66.181972][ T5138] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 66.190723][ T5138] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.197805][ T5138] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.205790][ T5138] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 66.214708][ T5138] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 66.223126][ T5138] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 66.231919][ T5138] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 66.240575][ T5138] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 66.277123][ T5136] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 66.285403][ T5136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 66.294417][ T5136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 66.303420][ T5136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 66.312778][ T5136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 66.322639][ T5136] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 66.331776][ T5136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 66.340777][ T5136] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 66.349805][ T5136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 66.358082][ T5136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 66.367218][ T5136] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 66.375370][ T5136] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 66.383693][ T5136] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 66.429437][ T5094] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 66.441350][ T5080] device veth0_vlan entered promiscuous mode [ 66.452373][ T5090] 8021q: adding VLAN 0 to HW filter on device bond0 [ 66.465977][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 66.474972][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 66.483756][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 66.492797][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 66.501469][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 66.512960][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 66.530401][ T5086] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 66.547646][ T5083] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 66.577074][ T5137] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 66.590301][ T5137] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 66.597866][ T5137] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 66.609847][ T5137] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 66.623439][ T5080] device veth1_vlan entered promiscuous mode [ 66.664772][ T5090] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.709434][ T4379] Bluetooth: hci0: command 0x040f tx timeout [ 66.769278][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 66.778167][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 66.790301][ T4379] Bluetooth: hci1: command 0x040f tx timeout [ 66.795805][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 66.804568][ T4379] Bluetooth: hci2: command 0x040f tx timeout [ 66.820089][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 66.870004][ T5081] Bluetooth: hci3: command 0x040f tx timeout [ 66.884773][ T5080] device veth0_macvtap entered promiscuous mode [ 66.903959][ T5137] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 66.913435][ T5137] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 66.922674][ T5137] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 66.931794][ T5137] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 66.943244][ T5137] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.950436][ T5137] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.958025][ T5081] Bluetooth: hci5: command 0x040f tx timeout [ 66.958036][ T4379] Bluetooth: hci4: command 0x040f tx timeout [ 66.971313][ T5137] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 66.980428][ T5137] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 66.989129][ T5137] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.996252][ T5137] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.004516][ T5137] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 67.013477][ T5137] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 67.023496][ T5083] device veth0_vlan entered promiscuous mode [ 67.039743][ T5083] device veth1_vlan entered promiscuous mode [ 67.060114][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 67.068153][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 67.076106][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 67.084384][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 67.093568][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 67.114776][ T5094] device veth0_vlan entered promiscuous mode [ 67.124448][ T5080] device veth1_macvtap entered promiscuous mode [ 67.138256][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 67.146950][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 67.155258][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 67.164694][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 67.173809][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 67.182773][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 67.191887][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 67.199760][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 67.211432][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 67.219776][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 67.227547][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 67.236678][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 67.246035][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 67.265072][ T5086] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 67.293702][ T5080] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 67.323431][ T5094] device veth1_vlan entered promiscuous mode [ 67.338064][ T5083] device veth0_macvtap entered promiscuous mode [ 67.349100][ T5140] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 67.358152][ T5140] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 67.376890][ T5140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 67.386553][ T5140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 67.396398][ T5140] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 67.405432][ T5140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 67.414105][ T5140] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 67.424218][ T5140] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 67.433175][ T5140] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 67.441130][ T5140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 67.450244][ T5140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 67.465906][ T5140] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 67.480423][ T5091] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 67.489904][ T5083] device veth1_macvtap entered promiscuous mode [ 67.501700][ T5080] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 67.534378][ T5080] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.558981][ T5080] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.567773][ T5080] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.596173][ T5080] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.645973][ T5135] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 67.655569][ T5135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 67.695130][ T5090] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 67.715553][ T5090] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 67.726052][ T5139] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 67.735658][ T5139] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 67.747743][ T5083] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 67.760185][ T5083] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 67.775951][ T5083] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 67.792043][ T5083] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 67.823189][ T5083] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 67.850430][ T5083] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 67.874298][ T5135] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 67.900031][ T5135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 67.920571][ T5135] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 67.949680][ T5135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 67.966496][ T5094] device veth0_macvtap entered promiscuous mode [ 67.998143][ T5083] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.019479][ T5083] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.028243][ T5083] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.058957][ T5083] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.085651][ T5135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 68.102422][ T5135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 68.122533][ T5094] device veth1_macvtap entered promiscuous mode [ 68.181474][ T5136] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 68.195153][ T5136] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 68.282791][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 68.299764][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 68.313438][ T5094] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 68.348049][ T5094] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 68.367420][ T5094] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 68.378036][ T5094] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 68.393091][ T5094] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 68.428763][ T5135] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 68.437940][ T5135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 68.447446][ T5135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 68.456248][ T5135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 68.471475][ T5086] device veth0_vlan entered promiscuous mode [ 68.481571][ T5094] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 68.498393][ T5094] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 68.508798][ T5094] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 68.520119][ T5094] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 68.531784][ T5094] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 68.573345][ T5090] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 68.585118][ T5086] device veth1_vlan entered promiscuous mode [ 68.594436][ T5136] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 68.602405][ T5136] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 68.610673][ T5136] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 68.619817][ T5136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 68.628447][ T5136] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 68.636106][ T5136] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 68.660287][ T5094] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.670461][ T5094] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.679596][ T5094] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.688286][ T5094] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.713586][ T45] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 68.722048][ T45] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 68.745386][ T5143] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 68.753861][ T5143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 68.765657][ T5143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 68.774920][ T5143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 68.783754][ T5143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 68.791853][ T5081] Bluetooth: hci0: command 0x0419 tx timeout [ 68.808045][ T5137] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 68.809112][ T8] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 68.816287][ T5137] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 68.830740][ T8] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 68.854743][ T5091] device veth0_vlan entered promiscuous mode [ 68.869097][ T5085] Bluetooth: hci2: command 0x0419 tx timeout [ 68.875204][ T5085] Bluetooth: hci1: command 0x0419 tx timeout [ 68.893605][ T5139] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 68.901599][ T5139] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 68.914604][ T5139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 68.945358][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 68.948347][ T5091] device veth1_vlan entered promiscuous mode [ 68.954567][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 68.960344][ T5081] Bluetooth: hci3: command 0x0419 tx timeout [ 68.998414][ T5090] device veth0_vlan entered promiscuous mode [ 69.019389][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 69.021829][ T37] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 69.027631][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 69.035669][ T37] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 69.042963][ T5081] Bluetooth: hci4: command 0x0419 tx timeout [ 69.043008][ T5081] Bluetooth: hci5: command 0x0419 tx timeout [ 69.044348][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 69.071629][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 69.079813][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 69.088312][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 69.097138][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 69.106606][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 69.114651][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 69.136130][ T5086] device veth0_macvtap entered promiscuous mode [ 69.149968][ T26] audit: type=1400 audit(1676146779.740:96): avc: denied { mounton } for pid=5080 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=2321 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 69.162076][ T5086] device veth1_macvtap entered promiscuous mode [ 69.203865][ T5090] device veth1_vlan entered promiscuous mode [ 69.204776][ T26] audit: type=1400 audit(1676146779.740:97): avc: denied { mount } for pid=5080 comm="syz-executor.0" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 69.297887][ T5086] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 69.309073][ T5086] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 69.322691][ T5086] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 69.333767][ T5086] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 69.344050][ T5086] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 69.355576][ T5086] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 69.366872][ T5086] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 69.388678][ T5086] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 69.400538][ T5086] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 69.411065][ T5086] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 69.421987][ T5086] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 69.432531][ T5086] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 69.447929][ T5086] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 69.461313][ T5086] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 69.469432][ T5136] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 69.477818][ T5136] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 69.480901][ T26] audit: type=1400 audit(1676146780.070:98): avc: denied { read write } for pid=5083 comm="syz-executor.2" name="loop2" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 69.496121][ T5136] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 69.529530][ T5136] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 69.537847][ T5136] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 69.545373][ T26] audit: type=1400 audit(1676146780.110:99): avc: denied { open } for pid=5083 comm="syz-executor.2" path="/dev/loop2" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 69.545423][ T26] audit: type=1400 audit(1676146780.110:100): avc: denied { ioctl } for pid=5083 comm="syz-executor.2" path="/dev/loop2" dev="devtmpfs" ino=650 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 69.596871][ T5136] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 69.605837][ T5136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 69.614597][ T5136] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 69.623383][ T5136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 69.652683][ T5086] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 69.659651][ T26] audit: type=1400 audit(1676146780.250:101): avc: denied { create } for pid=5183 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 69.670067][ T5086] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 69.693480][ T5086] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 69.702300][ T26] audit: type=1400 audit(1676146780.290:102): avc: denied { connect } for pid=5183 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 69.722696][ T5086] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 69.734004][ T26] audit: type=1400 audit(1676146780.290:103): avc: denied { write } for pid=5183 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 69.740627][ T5091] device veth0_macvtap entered promiscuous mode [ 69.818412][ T10] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 69.828514][ T5143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 69.859288][ T10] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 69.867641][ T5143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 69.897324][ T5143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready 20:19:40 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x68, 0x30, 0x871a15abc695fb3d, 0x0, 0x0, {}, [{0x54, 0x1, [@m_tunnel_key={0x50, 0x1, 0x0, 0x0, {{0xf}, {0x20, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x2}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) [ 69.900602][ T26] audit: type=1400 audit(1676146780.500:104): avc: denied { mounton } for pid=5185 comm="syz-executor.0" path="/root/syzkaller-testdir3326156338/syzkaller.JQdaLw/0/file0" dev="sda1" ino=1161 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 69.909143][ T5143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 69.949911][ T5143] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 69.966243][ T5143] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 69.980233][ T5090] device veth0_macvtap entered promiscuous mode [ 70.022857][ T5091] device veth1_macvtap entered promiscuous mode [ 70.129664][ T5190] loop0: detected capacity change from 0 to 256 [ 70.407281][ T37] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 70.443365][ T37] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 70.453384][ T26] kauditd_printk_skb: 2 callbacks suppressed [ 70.453419][ T26] audit: type=1400 audit(1676146781.050:107): avc: denied { read } for pid=4406 comm="syslogd" name="log" dev="sda1" ino=1125 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 20:19:41 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x68, 0x30, 0x871a15abc695fb3d, 0x0, 0x0, {}, [{0x54, 0x1, [@m_tunnel_key={0x50, 0x1, 0x0, 0x0, {{0xf}, {0x20, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x2}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) 20:19:41 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) [ 70.838138][ T26] audit: type=1400 audit(1676146781.430:108): avc: denied { unmount } for pid=5080 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 70.876194][ T5090] device veth1_macvtap entered promiscuous mode [ 70.933331][ T5138] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 70.946718][ T5138] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 70.990078][ T5138] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 70.998287][ T5138] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 71.061555][ T5091] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 71.072664][ T5091] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 71.084857][ T5091] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 71.095822][ T5091] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 71.106171][ T5091] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 71.121457][ T5091] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 71.131600][ T5091] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 71.142974][ T5091] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 71.154987][ T5091] batman_adv: batadv0: Interface activated: batadv_slave_0 20:19:41 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x68, 0x30, 0x871a15abc695fb3d, 0x0, 0x0, {}, [{0x54, 0x1, [@m_tunnel_key={0x50, 0x1, 0x0, 0x0, {{0xf}, {0x20, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x2}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) [ 71.240640][ T5198] loop0: detected capacity change from 0 to 256 [ 71.313401][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 71.331071][ T1209] ieee802154 phy0 wpan0: encryption failed: -22 [ 71.346320][ T1209] ieee802154 phy1 wpan1: encryption failed: -22 [ 71.424277][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 71.567381][ T5090] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 71.675116][ T5090] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 72.006122][ T5090] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 72.035965][ T5090] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 20:19:42 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) [ 72.094002][ T5090] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 72.134700][ T5090] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 72.158907][ T5090] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 72.175861][ T5090] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 72.194721][ T5090] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 72.221091][ T5090] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 72.247003][ T5090] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 72.284484][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready 20:19:42 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) [ 72.297412][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 72.355852][ T5090] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 72.359825][ T26] audit: type=1400 audit(1676146782.950:109): avc: denied { create } for pid=5205 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 20:19:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x1d8, 0x98, 0x98, 0x98, 0x0, 0x98, 0x140, 0x140, 0x140, 0x140, 0x140, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0x2}}}, {{@uncond, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffff}, {0xffff}, {0xffff}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x238) [ 72.398980][ T5090] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 72.421642][ T26] audit: type=1400 audit(1676146783.000:110): avc: denied { setopt } for pid=5205 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 72.441689][ T5090] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 72.484848][ T5090] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 72.515141][ T5090] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 72.526393][ T5090] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 72.773146][ T5218] loop0: detected capacity change from 0 to 256 [ 72.773362][ T5217] loop2: detected capacity change from 0 to 256 [ 73.986454][ T5216] sched: RT throttling activated [ 74.993742][ T5090] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 75.589569][ T5090] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.606582][ T5090] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 75.645211][ T5091] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 75.674868][ T5091] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.703105][ T5091] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 75.734054][ T5091] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.745439][ T5091] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 75.757625][ T5091] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.767822][ T5091] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 75.778628][ T5091] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.788731][ T5091] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 75.801166][ T5091] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.820294][ T5091] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 75.839220][ T5191] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 75.847256][ T5191] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 75.857719][ T5135] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 75.884240][ T5135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 75.893934][ T5135] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 75.902805][ T5135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 75.912892][ T5135] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 75.939545][ T5090] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.954522][ T5090] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.964052][ T5090] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.973024][ T5090] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 76.000787][ T5091] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 76.010079][ T5091] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 76.020588][ T5091] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 76.030291][ T5091] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 76.082324][ T5191] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 76.090818][ T5191] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 76.118817][ T5134] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 76.229534][ T37] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 76.237613][ T37] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 20:19:46 executing program 5: r0 = syz_open_dev$ndb(&(0x7f0000000300), 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0x401870c8, 0xffffffffffffffff) 20:19:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x1d8, 0x98, 0x98, 0x98, 0x0, 0x98, 0x140, 0x140, 0x140, 0x140, 0x140, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0x2}}}, {{@uncond, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffff}, {0xffff}, {0xffff}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x238) 20:19:46 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) [ 76.268816][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 76.313286][ T5191] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 76.346426][ T5191] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 76.402050][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 76.427071][ T1151] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 76.461537][ T1151] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 76.492949][ T10] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 76.502128][ T10] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 76.507628][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 76.588303][ T5230] loop0: detected capacity change from 0 to 256 [ 76.889204][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 77.413188][ T5235] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 20:19:48 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000440), 0x0, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000040)) 20:19:48 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) 20:19:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x1d8, 0x98, 0x98, 0x98, 0x0, 0x98, 0x140, 0x140, 0x140, 0x140, 0x140, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0x2}}}, {{@uncond, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffff}, {0xffff}, {0xffff}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x238) 20:19:48 executing program 5: r0 = syz_open_dev$ndb(&(0x7f0000000300), 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0x401870c8, 0xffffffffffffffff) 20:19:48 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000300), 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0x401870c8, 0xffffffffffffffff) 20:19:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000200000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000500)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_atm={0x8}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=@delchain={0x24, 0x2e, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x4, 0xffff}}}, 0x24}}, 0x0) [ 77.523970][ T26] audit: type=1400 audit(1676146788.120:111): avc: denied { read } for pid=5236 comm="syz-executor.3" name="card0" dev="devtmpfs" ino=628 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 20:19:48 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000440), 0x0, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000040)) 20:19:48 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000300), 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0x401870c8, 0xffffffffffffffff) [ 77.627943][ T26] audit: type=1400 audit(1676146788.120:112): avc: denied { open } for pid=5236 comm="syz-executor.3" path="/dev/dri/card0" dev="devtmpfs" ino=628 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 77.699345][ T5249] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 20:19:48 executing program 5: r0 = syz_open_dev$ndb(&(0x7f0000000300), 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0x401870c8, 0xffffffffffffffff) [ 77.781221][ T5253] loop2: detected capacity change from 0 to 256 [ 78.410594][ T26] audit: type=1400 audit(1676146788.150:113): avc: denied { ioctl } for pid=5236 comm="syz-executor.3" path="/dev/dri/card0" dev="devtmpfs" ino=628 ioctlcmd=0x643a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 20:19:49 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) 20:19:49 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000440), 0x0, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000040)) 20:19:49 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000440), 0x0, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000040)) 20:19:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000200000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000500)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_atm={0x8}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=@delchain={0x24, 0x2e, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x4, 0xffff}}}, 0x24}}, 0x0) 20:19:49 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000440), 0x0, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000040)) 20:19:49 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000200000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000500)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_atm={0x8}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=@delchain={0x24, 0x2e, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x4, 0xffff}}}, 0x24}}, 0x0) 20:19:49 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000300), 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0x401870c8, 0xffffffffffffffff) [ 78.728329][ T5265] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 20:19:49 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000440), 0x0, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000040)) 20:19:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000200000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000500)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_atm={0x8}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=@delchain={0x24, 0x2e, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x4, 0xffff}}}, 0x24}}, 0x0) [ 78.854418][ T5274] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 20:19:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000200000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000500)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_atm={0x8}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=@delchain={0x24, 0x2e, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x4, 0xffff}}}, 0x24}}, 0x0) 20:19:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000200000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000500)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_atm={0x8}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=@delchain={0x24, 0x2e, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x4, 0xffff}}}, 0x24}}, 0x0) [ 78.987132][ T5281] loop2: detected capacity change from 0 to 256 [ 79.242436][ T5280] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 20:19:50 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000200000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000500)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_atm={0x8}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=@delchain={0x24, 0x2e, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x4, 0xffff}}}, 0x24}}, 0x0) 20:19:50 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000200000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000500)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_atm={0x8}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=@delchain={0x24, 0x2e, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x4, 0xffff}}}, 0x24}}, 0x0) 20:19:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x1d8, 0x98, 0x98, 0x98, 0x0, 0x98, 0x140, 0x140, 0x140, 0x140, 0x140, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0x2}}}, {{@uncond, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffff}, {0xffff}, {0xffff}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x238) 20:19:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000200000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000500)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_atm={0x8}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=@delchain={0x24, 0x2e, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x4, 0xffff}}}, 0x24}}, 0x0) [ 79.951401][ T5286] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 79.978246][ T5288] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 79.999740][ T5287] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 20:19:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x1d8, 0x98, 0x98, 0x98, 0x0, 0x98, 0x140, 0x140, 0x140, 0x140, 0x140, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0x2}}}, {{@uncond, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffff}, {0xffff}, {0xffff}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x238) [ 80.063630][ T5290] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 20:19:50 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000200000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000500)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_atm={0x8}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=@delchain={0x24, 0x2e, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x4, 0xffff}}}, 0x24}}, 0x0) 20:19:50 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) 20:19:50 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000200000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000500)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_atm={0x8}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=@delchain={0x24, 0x2e, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x4, 0xffff}}}, 0x24}}, 0x0) [ 80.149306][ T5301] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 20:19:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000200000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000500)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_atm={0x8}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=@delchain={0x24, 0x2e, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x4, 0xffff}}}, 0x24}}, 0x0) 20:19:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000200000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000500)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_atm={0x8}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=@delchain={0x24, 0x2e, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x4, 0xffff}}}, 0x24}}, 0x0) 20:19:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x1d8, 0x98, 0x98, 0x98, 0x0, 0x98, 0x140, 0x140, 0x140, 0x140, 0x140, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0x2}}}, {{@uncond, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffff}, {0xffff}, {0xffff}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x238) 20:19:50 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000200000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000500)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_atm={0x8}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=@delchain={0x24, 0x2e, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x4, 0xffff}}}, 0x24}}, 0x0) [ 80.494609][ T5320] loop4: detected capacity change from 0 to 256 20:19:51 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$eJzs3TFr1GAcBvCnterhcjc4iUNAB6fQ6ydokQpiQFBu0EmxLUhzFCwcKGJ18vv5DfwGjh2EiI3etSUODjXS+/2WPPDmgfddkin/vLg93d85ONz79P5rBoOVrG5mM8crGWU1v30MAHCZHDdNvjWtvvcCAPwb3v8AsHyePnv+aKuqtp8UxSCZfp5NZpP22q5v7eV16uxmPcN8T5q5Nj94WG2vFydGuTs9+tU/mk2unO2PM8youz9u+8XZ/tXcON3fyDA3u/sbnf1ruXfnVL/MMF9e5SB1dvKzu+h/GBfF/cfVuf71k/sAAAAAAAAAAAAAAAAAAAAAAOAilMVc5/yesvzTetv/i/lA5+brrOXWWr9nBwAAAAAAAAAAAAAAAAAAgP/F4dt3+y/reveNIAjCPPT9ZAIAAAAAAAAAAAAAAAAAgOWz+Oi3750AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQH8W//+/uND3GQEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALj8fgQAAP//xVOTag==") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) 20:19:51 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) 20:19:51 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$eJzs3TFr1GAcBvCnterhcjc4iUNAB6fQ6ydokQpiQFBu0EmxLUhzFCwcKGJ18vv5DfwGjh2EiI3etSUODjXS+/2WPPDmgfddkin/vLg93d85ONz79P5rBoOVrG5mM8crGWU1v30MAHCZHDdNvjWtvvcCAPwb3v8AsHyePnv+aKuqtp8UxSCZfp5NZpP22q5v7eV16uxmPcN8T5q5Nj94WG2vFydGuTs9+tU/mk2unO2PM8youz9u+8XZ/tXcON3fyDA3u/sbnf1ruXfnVL/MMF9e5SB1dvKzu+h/GBfF/cfVuf71k/sAAAAAAAAAAAAAAAAAAAAAAOAilMVc5/yesvzTetv/i/lA5+brrOXWWr9nBwAAAAAAAAAAAAAAAAAAgP/F4dt3+y/reveNIAjCPPT9ZAIAAAAAAAAAAAAAAAAAgOWz+Oi3750AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQH8W//+/uND3GQEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALj8fgQAAP//xVOTag==") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) 20:19:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000200000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000500)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_atm={0x8}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=@delchain={0x24, 0x2e, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x4, 0xffff}}}, 0x24}}, 0x0) 20:19:51 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) [ 81.511902][ T1127] cfg80211: failed to load regulatory.db [ 81.648295][ T5335] loop5: detected capacity change from 0 to 256 [ 81.704599][ T5337] loop2: detected capacity change from 0 to 256 [ 81.925000][ T5338] loop1: detected capacity change from 0 to 256 20:19:53 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) 20:19:55 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) [ 84.722511][ T5347] loop4: detected capacity change from 0 to 256 20:19:55 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) 20:19:55 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$eJzs3TFr1GAcBvCnterhcjc4iUNAB6fQ6ydokQpiQFBu0EmxLUhzFCwcKGJ18vv5DfwGjh2EiI3etSUODjXS+/2WPPDmgfddkin/vLg93d85ONz79P5rBoOVrG5mM8crGWU1v30MAHCZHDdNvjWtvvcCAPwb3v8AsHyePnv+aKuqtp8UxSCZfp5NZpP22q5v7eV16uxmPcN8T5q5Nj94WG2vFydGuTs9+tU/mk2unO2PM8youz9u+8XZ/tXcON3fyDA3u/sbnf1ruXfnVL/MMF9e5SB1dvKzu+h/GBfF/cfVuf71k/sAAAAAAAAAAAAAAAAAAAAAAOAilMVc5/yesvzTetv/i/lA5+brrOXWWr9nBwAAAAAAAAAAAAAAAAAAgP/F4dt3+y/reveNIAjCPPT9ZAIAAAAAAAAAAAAAAAAAgOWz+Oi3750AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQH8W//+/uND3GQEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALj8fgQAAP//xVOTag==") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) [ 85.379910][ T5349] loop3: detected capacity change from 0 to 256 20:19:56 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) [ 85.540890][ T5352] loop0: detected capacity change from 0 to 256 [ 86.166048][ T5358] loop2: detected capacity change from 0 to 256 20:19:56 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$eJzs3TFr1GAcBvCnterhcjc4iUNAB6fQ6ydokQpiQFBu0EmxLUhzFCwcKGJ18vv5DfwGjh2EiI3etSUODjXS+/2WPPDmgfddkin/vLg93d85ONz79P5rBoOVrG5mM8crGWU1v30MAHCZHDdNvjWtvvcCAPwb3v8AsHyePnv+aKuqtp8UxSCZfp5NZpP22q5v7eV16uxmPcN8T5q5Nj94WG2vFydGuTs9+tU/mk2unO2PM8youz9u+8XZ/tXcON3fyDA3u/sbnf1ruXfnVL/MMF9e5SB1dvKzu+h/GBfF/cfVuf71k/sAAAAAAAAAAAAAAAAAAAAAAOAilMVc5/yesvzTetv/i/lA5+brrOXWWr9nBwAAAAAAAAAAAAAAAAAAgP/F4dt3+y/reveNIAjCPPT9ZAIAAAAAAAAAAAAAAAAAgOWz+Oi3750AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQH8W//+/uND3GQEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALj8fgQAAP//xVOTag==") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) [ 86.854161][ T5360] loop1: detected capacity change from 0 to 256 20:19:58 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$eJzs3TFr1GAcBvCnterhcjc4iUNAB6fQ6ydokQpiQFBu0EmxLUhzFCwcKGJ18vv5DfwGjh2EiI3etSUODjXS+/2WPPDmgfddkin/vLg93d85ONz79P5rBoOVrG5mM8crGWU1v30MAHCZHDdNvjWtvvcCAPwb3v8AsHyePnv+aKuqtp8UxSCZfp5NZpP22q5v7eV16uxmPcN8T5q5Nj94WG2vFydGuTs9+tU/mk2unO2PM8youz9u+8XZ/tXcON3fyDA3u/sbnf1ruXfnVL/MMF9e5SB1dvKzu+h/GBfF/cfVuf71k/sAAAAAAAAAAAAAAAAAAAAAAOAilMVc5/yesvzTetv/i/lA5+brrOXWWr9nBwAAAAAAAAAAAAAAAAAAgP/F4dt3+y/reveNIAjCPPT9ZAIAAAAAAAAAAAAAAAAAgOWz+Oi3750AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQH8W//+/uND3GQEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALj8fgQAAP//xVOTag==") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) [ 88.272367][ T5368] loop4: detected capacity change from 0 to 256 [ 88.373619][ T5369] loop0: detected capacity change from 0 to 256 [ 90.556621][ T5371] loop2: detected capacity change from 0 to 256 20:20:02 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) 20:20:02 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) 20:20:02 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) 20:20:02 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$eJzs3TFr1GAcBvCnterhcjc4iUNAB6fQ6ydokQpiQFBu0EmxLUhzFCwcKGJ18vv5DfwGjh2EiI3etSUODjXS+/2WPPDmgfddkin/vLg93d85ONz79P5rBoOVrG5mM8crGWU1v30MAHCZHDdNvjWtvvcCAPwb3v8AsHyePnv+aKuqtp8UxSCZfp5NZpP22q5v7eV16uxmPcN8T5q5Nj94WG2vFydGuTs9+tU/mk2unO2PM8youz9u+8XZ/tXcON3fyDA3u/sbnf1ruXfnVL/MMF9e5SB1dvKzu+h/GBfF/cfVuf71k/sAAAAAAAAAAAAAAAAAAAAAAOAilMVc5/yesvzTetv/i/lA5+brrOXWWr9nBwAAAAAAAAAAAAAAAAAAgP/F4dt3+y/reveNIAjCPPT9ZAIAAAAAAAAAAAAAAAAAgOWz+Oi3750AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQH8W//+/uND3GQEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALj8fgQAAP//xVOTag==") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) 20:20:02 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$eJzs3TFr1GAcBvCnterhcjc4iUNAB6fQ6ydokQpiQFBu0EmxLUhzFCwcKGJ18vv5DfwGjh2EiI3etSUODjXS+/2WPPDmgfddkin/vLg93d85ONz79P5rBoOVrG5mM8crGWU1v30MAHCZHDdNvjWtvvcCAPwb3v8AsHyePnv+aKuqtp8UxSCZfp5NZpP22q5v7eV16uxmPcN8T5q5Nj94WG2vFydGuTs9+tU/mk2unO2PM8youz9u+8XZ/tXcON3fyDA3u/sbnf1ruXfnVL/MMF9e5SB1dvKzu+h/GBfF/cfVuf71k/sAAAAAAAAAAAAAAAAAAAAAAOAilMVc5/yesvzTetv/i/lA5+brrOXWWr9nBwAAAAAAAAAAAAAAAAAAgP/F4dt3+y/reveNIAjCPPT9ZAIAAAAAAAAAAAAAAAAAgOWz+Oi3750AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQH8W//+/uND3GQEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALj8fgQAAP//xVOTag==") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) 20:20:02 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) [ 92.227561][ T5219] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 92.745267][ T5393] loop2: detected capacity change from 0 to 256 [ 92.796911][ T5394] loop4: detected capacity change from 0 to 256 [ 93.130007][ T5395] loop0: detected capacity change from 0 to 256 [ 93.142760][ T5396] loop3: detected capacity change from 0 to 256 [ 93.355366][ T5397] loop1: detected capacity change from 0 to 256 20:20:10 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) 20:20:10 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) 20:20:10 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) 20:20:10 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) 20:20:10 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) 20:20:10 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) [ 99.740228][ T5406] loop5: detected capacity change from 0 to 256 20:20:11 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) [ 101.106318][ T5425] loop2: detected capacity change from 0 to 256 [ 101.366499][ T5428] loop0: detected capacity change from 0 to 256 [ 101.489755][ T5427] loop1: detected capacity change from 0 to 256 [ 101.925420][ T5429] loop5: detected capacity change from 0 to 256 [ 101.939884][ T5430] loop3: detected capacity change from 0 to 256 [ 103.505684][ T5431] loop4: detected capacity change from 0 to 256 20:20:19 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) 20:20:19 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) 20:20:19 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$eJzs3TFr1GAcBvCnterhcjc4iUNAB6fQ6ydokQpiQFBu0EmxLUhzFCwcKGJ18vv5DfwGjh2EiI3etSUODjXS+/2WPPDmgfddkin/vLg93d85ONz79P5rBoOVrG5mM8crGWU1v30MAHCZHDdNvjWtvvcCAPwb3v8AsHyePnv+aKuqtp8UxSCZfp5NZpP22q5v7eV16uxmPcN8T5q5Nj94WG2vFydGuTs9+tU/mk2unO2PM8youz9u+8XZ/tXcON3fyDA3u/sbnf1ruXfnVL/MMF9e5SB1dvKzu+h/GBfF/cfVuf71k/sAAAAAAAAAAAAAAAAAAAAAAOAilMVc5/yesvzTetv/i/lA5+brrOXWWr9nBwAAAAAAAAAAAAAAAAAAgP/F4dt3+y/reveNIAjCPPT9ZAIAAAAAAAAAAAAAAAAAgOWz+Oi3750AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQH8W//+/uND3GQEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALj8fgQAAP//xVOTag==") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) 20:20:19 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) 20:20:19 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) 20:20:19 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) [ 109.840765][ T5455] loop3: detected capacity change from 0 to 256 [ 109.842320][ T5454] loop1: detected capacity change from 0 to 256 [ 112.502348][ T5460] loop5: detected capacity change from 0 to 256 [ 112.562433][ T5461] loop0: detected capacity change from 0 to 256 [ 112.593433][ T5462] loop2: detected capacity change from 0 to 256 20:20:23 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) 20:20:23 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$eJzs3TFr1GAcBvCnterhcjc4iUNAB6fQ6ydokQpiQFBu0EmxLUhzFCwcKGJ18vv5DfwGjh2EiI3etSUODjXS+/2WPPDmgfddkin/vLg93d85ONz79P5rBoOVrG5mM8crGWU1v30MAHCZHDdNvjWtvvcCAPwb3v8AsHyePnv+aKuqtp8UxSCZfp5NZpP22q5v7eV16uxmPcN8T5q5Nj94WG2vFydGuTs9+tU/mk2unO2PM8youz9u+8XZ/tXcON3fyDA3u/sbnf1ruXfnVL/MMF9e5SB1dvKzu+h/GBfF/cfVuf71k/sAAAAAAAAAAAAAAAAAAAAAAOAilMVc5/yesvzTetv/i/lA5+brrOXWWr9nBwAAAAAAAAAAAAAAAAAAgP/F4dt3+y/reveNIAjCPPT9ZAIAAAAAAAAAAAAAAAAAgOWz+Oi3750AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQH8W//+/uND3GQEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALj8fgQAAP//xVOTag==") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) 20:20:23 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) 20:20:23 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) [ 113.762487][ T5474] loop1: detected capacity change from 0 to 256 [ 113.762487][ T5475] loop4: detected capacity change from 0 to 256 [ 114.023550][ T5476] loop3: detected capacity change from 0 to 256 20:20:27 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) 20:20:27 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) [ 117.584210][ T5484] loop2: detected capacity change from 0 to 256 [ 117.683576][ T5485] loop3: detected capacity change from 0 to 256 20:20:31 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$eJzs3TFr1GAcBvCnterhcjc4iUNAB6fQ6ydokQpiQFBu0EmxLUhzFCwcKGJ18vv5DfwGjh2EiI3etSUODjXS+/2WPPDmgfddkin/vLg93d85ONz79P5rBoOVrG5mM8crGWU1v30MAHCZHDdNvjWtvvcCAPwb3v8AsHyePnv+aKuqtp8UxSCZfp5NZpP22q5v7eV16uxmPcN8T5q5Nj94WG2vFydGuTs9+tU/mk2unO2PM8youz9u+8XZ/tXcON3fyDA3u/sbnf1ruXfnVL/MMF9e5SB1dvKzu+h/GBfF/cfVuf71k/sAAAAAAAAAAAAAAAAAAAAAAOAilMVc5/yesvzTetv/i/lA5+brrOXWWr9nBwAAAAAAAAAAAAAAAAAAgP/F4dt3+y/reveNIAjCPPT9ZAIAAAAAAAAAAAAAAAAAgOWz+Oi3750AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQH8W//+/uND3GQEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALj8fgQAAP//xVOTag==") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) 20:20:31 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$eJzs3TFr1GAcBvCnterhcjc4iUNAB6fQ6ydokQpiQFBu0EmxLUhzFCwcKGJ18vv5DfwGjh2EiI3etSUODjXS+/2WPPDmgfddkin/vLg93d85ONz79P5rBoOVrG5mM8crGWU1v30MAHCZHDdNvjWtvvcCAPwb3v8AsHyePnv+aKuqtp8UxSCZfp5NZpP22q5v7eV16uxmPcN8T5q5Nj94WG2vFydGuTs9+tU/mk2unO2PM8youz9u+8XZ/tXcON3fyDA3u/sbnf1ruXfnVL/MMF9e5SB1dvKzu+h/GBfF/cfVuf71k/sAAAAAAAAAAAAAAAAAAAAAAOAilMVc5/yesvzTetv/i/lA5+brrOXWWr9nBwAAAAAAAAAAAAAAAAAAgP/F4dt3+y/reveNIAjCPPT9ZAIAAAAAAAAAAAAAAAAAgOWz+Oi3750AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQH8W//+/uND3GQEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALj8fgQAAP//xVOTag==") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) 20:20:31 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) 20:20:31 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$eJzs3TFr1GAcBvCnterhcjc4iUNAB6fQ6ydokQpiQFBu0EmxLUhzFCwcKGJ18vv5DfwGjh2EiI3etSUODjXS+/2WPPDmgfddkin/vLg93d85ONz79P5rBoOVrG5mM8crGWU1v30MAHCZHDdNvjWtvvcCAPwb3v8AsHyePnv+aKuqtp8UxSCZfp5NZpP22q5v7eV16uxmPcN8T5q5Nj94WG2vFydGuTs9+tU/mk2unO2PM8youz9u+8XZ/tXcON3fyDA3u/sbnf1ruXfnVL/MMF9e5SB1dvKzu+h/GBfF/cfVuf71k/sAAAAAAAAAAAAAAAAAAAAAAOAilMVc5/yesvzTetv/i/lA5+brrOXWWr9nBwAAAAAAAAAAAAAAAAAAgP/F4dt3+y/reveNIAjCPPT9ZAIAAAAAAAAAAAAAAAAAgOWz+Oi3750AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQH8W//+/uND3GQEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALj8fgQAAP//xVOTag==") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) 20:20:31 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) 20:20:31 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x68, 0x30, 0x871a15abc695fb3d, 0x0, 0x0, {}, [{0x54, 0x1, [@m_tunnel_key={0x50, 0x1, 0x0, 0x0, {{0xf}, {0x20, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x2}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) [ 121.490801][ T5498] loop0: detected capacity change from 0 to 256 [ 121.492423][ T5501] loop2: detected capacity change from 0 to 256 [ 121.893527][ T5502] loop4: detected capacity change from 0 to 256 [ 121.917841][ T5503] loop1: detected capacity change from 0 to 256 20:20:35 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x68, 0x30, 0x871a15abc695fb3d, 0x0, 0x0, {}, [{0x54, 0x1, [@m_tunnel_key={0x50, 0x1, 0x0, 0x0, {{0xf}, {0x20, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x2}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) 20:20:35 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) 20:20:35 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) 20:20:35 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$eJzs3TFr1GAcBvCnterhcjc4iUNAB6fQ6ydokQpiQFBu0EmxLUhzFCwcKGJ18vv5DfwGjh2EiI3etSUODjXS+/2WPPDmgfddkin/vLg93d85ONz79P5rBoOVrG5mM8crGWU1v30MAHCZHDdNvjWtvvcCAPwb3v8AsHyePnv+aKuqtp8UxSCZfp5NZpP22q5v7eV16uxmPcN8T5q5Nj94WG2vFydGuTs9+tU/mk2unO2PM8youz9u+8XZ/tXcON3fyDA3u/sbnf1ruXfnVL/MMF9e5SB1dvKzu+h/GBfF/cfVuf71k/sAAAAAAAAAAAAAAAAAAAAAAOAilMVc5/yesvzTetv/i/lA5+brrOXWWr9nBwAAAAAAAAAAAAAAAAAAgP/F4dt3+y/reveNIAjCPPT9ZAIAAAAAAAAAAAAAAAAAgOWz+Oi3750AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQH8W//+/uND3GQEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALj8fgQAAP//xVOTag==") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) 20:20:35 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x68, 0x30, 0x871a15abc695fb3d, 0x0, 0x0, {}, [{0x54, 0x1, [@m_tunnel_key={0x50, 0x1, 0x0, 0x0, {{0xf}, {0x20, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x2}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) [ 125.419788][ T5510] loop5: detected capacity change from 0 to 256 20:20:36 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x68, 0x30, 0x871a15abc695fb3d, 0x0, 0x0, {}, [{0x54, 0x1, [@m_tunnel_key={0x50, 0x1, 0x0, 0x0, {{0xf}, {0x20, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x2}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) 20:20:36 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x68, 0x30, 0x871a15abc695fb3d, 0x0, 0x0, {}, [{0x54, 0x1, [@m_tunnel_key={0x50, 0x1, 0x0, 0x0, {{0xf}, {0x20, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x2}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) 20:20:36 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x68, 0x30, 0x871a15abc695fb3d, 0x0, 0x0, {}, [{0x54, 0x1, [@m_tunnel_key={0x50, 0x1, 0x0, 0x0, {{0xf}, {0x20, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x2}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) 20:20:36 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x68, 0x30, 0x871a15abc695fb3d, 0x0, 0x0, {}, [{0x54, 0x1, [@m_tunnel_key={0x50, 0x1, 0x0, 0x0, {{0xf}, {0x20, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x2}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) [ 126.711460][ T5526] loop0: detected capacity change from 0 to 256 [ 126.712390][ T5527] loop1: detected capacity change from 0 to 256 [ 126.983928][ T5528] loop4: detected capacity change from 0 to 256 20:20:39 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) 20:20:40 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x68, 0x30, 0x871a15abc695fb3d, 0x0, 0x0, {}, [{0x54, 0x1, [@m_tunnel_key={0x50, 0x1, 0x0, 0x0, {{0xf}, {0x20, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x2}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) 20:20:40 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) 20:20:40 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x68, 0x30, 0x871a15abc695fb3d, 0x0, 0x0, {}, [{0x54, 0x1, [@m_tunnel_key={0x50, 0x1, 0x0, 0x0, {{0xf}, {0x20, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x2}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) 20:20:40 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) getpid() open(0x0, 0x34000, 0x191) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00b3c50d667c94d5fdba810734f784483bd59866"], 0x1, 0x1a5, &(0x7f0000000280)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000500)=ANY=[@ANYBLOB="8ec00e0008000000000000"], 0x208e24b) 20:20:40 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x68, 0x30, 0x871a15abc695fb3d, 0x0, 0x0, {}, [{0x54, 0x1, [@m_tunnel_key={0x50, 0x1, 0x0, 0x0, {{0xf}, {0x20, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x2}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) 20:20:40 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x68, 0x30, 0x871a15abc695fb3d, 0x0, 0x0, {}, [{0x54, 0x1, [@m_tunnel_key={0x50, 0x1, 0x0, 0x0, {{0xf}, {0x20, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x2}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) [ 130.252484][ T5547] loop1: detected capacity change from 0 to 256 [ 130.252491][ T5546] loop0: detected capacity change from 0 to 256 [ 130.514046][ T5548] loop4: detected capacity change from 0 to 256 [ 132.989634][ T1209] ieee802154 phy0 wpan0: encryption failed: -22 [ 132.996994][ T1209] ieee802154 phy1 wpan1: encryption failed: -22 20:20:43 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x68, 0x30, 0x871a15abc695fb3d, 0x0, 0x0, {}, [{0x54, 0x1, [@m_tunnel_key={0x50, 0x1, 0x0, 0x0, {{0xf}, {0x20, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x2}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) 20:20:43 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x14, r1, 0x19de81d7e454a767}, 0x14}}, 0x0) 20:20:43 executing program 0: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x5) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x2002) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f00000000c0), 0x2, 0x410800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0x1, &(0x7f0000000100)="4066dc829b8fbcadc8e52b141a528aae1c21b4fb2eb906105a4d009debdd8011331090f54c46c52b54f44143c4f2dbfacce6c423ed25b407e8fdb9239b463c68cab0dc0dbfa6a1042df475799d4c827f3557907c1ace3aae70211cb2f5e5a021422f2924f3db37cc97138dc5ccd9c136ebb996d3545938415313923b9ffffcaee2f011d283bd52da7704d461a912968743d75fdaaaa9c69ae41765ff3a8b84dd5c4509d02fddfbbe6dbb7c019858c43eb9afa31e5f2247bac26c8f5cc575927074f751b29fb673fc0e", &(0x7f0000000200)=@udp6, 0x1}, 0x20) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000280)=0xff) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000002c0)={0x8, {0x7, 0xa3ef, 0x3f, 0x0, 0x2, 0x3}}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x11) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x300, 0x70bd2d, 0xffffff83, {0x4, 0x1, 0x5, [0x6, 0x5, 0x5, 0x10000, 0x0, 0x1, 0x5, 0x6, 0x7, 0x9, 0x4, 0x91c7, 0x3f, 0x81, 0x6c95, 0x0, 0xffff, 0x1, 0x200, 0xc5, 0x401, 0x800, 0x8, 0x80000001, 0x2, 0xac0c, 0xfc6, 0x3, 0x7, 0x400, 0x7fff, 0x6, 0x7fff, 0x5, 0x2, 0x10000, 0x81, 0x5867, 0x100, 0x0, 0xffffffff, 0x2, 0x800, 0x1, 0x182, 0x7, 0x16, 0x4, 0x6, 0x6212, 0x0, 0x1, 0xffffffe1, 0x8001, 0xffff, 0x0, 0x81, 0x8, 0x0, 0x101, 0x400, 0xfffffffd, 0x5], [0x10001, 0x800, 0x9, 0x10001, 0x0, 0xf2, 0x64d, 0xca5, 0x5, 0x4, 0xffffffff, 0x9, 0x0, 0xfffffff8, 0x400, 0xffffffff, 0x8, 0x81, 0x0, 0x836, 0xffff, 0x4, 0x1, 0xffff, 0x7, 0x1, 0x70000000, 0x80000001, 0x80000001, 0x3e566ffd, 0x2, 0x5, 0x0, 0xe199, 0x101, 0x20, 0xab94, 0x8020000, 0x0, 0xff, 0x1, 0x80000001, 0x1d31, 0x3, 0x884, 0x5, 0x7, 0x5, 0x8, 0x6, 0x1, 0x3, 0x7, 0xfffffe01, 0xfd6f, 0xffff4337, 0x5, 0x7f, 0x739acb7a, 0x68c3, 0x8, 0xc0, 0x9a2, 0x2], [0x2, 0x80000000, 0xd473, 0x5, 0xfffff801, 0x0, 0x81, 0x901, 0x7, 0xa4, 0x8, 0x7, 0x3a, 0x1, 0x2, 0xfff, 0x5, 0xffffffff, 0x8, 0x3, 0x4, 0x2, 0x3f, 0x0, 0xfffffff8, 0x8, 0x4, 0x6, 0x6, 0x4, 0xc6, 0x4ba, 0x385146b, 0x4, 0x1, 0x81, 0xb6, 0x7, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x6, 0x0, 0x7, 0x5, 0x9, 0x6, 0x1bf15fba, 0x3, 0x7fff, 0x9, 0xfffffffb, 0x2, 0x9, 0xff, 0x9a, 0x7fff, 0x6, 0x3, 0x1, 0x2, 0x1f], [0x4, 0x1000, 0x0, 0x80000000, 0x4, 0x6, 0x542, 0x100, 0x8001, 0x87, 0x4, 0x0, 0x99, 0x1, 0x0, 0x20, 0xdab6, 0x9, 0x40, 0x0, 0x2, 0x20, 0xffffffe0, 0x100, 0x1, 0x601, 0x3, 0x1, 0x401, 0x7fffffff, 0x5, 0x3, 0x200, 0x8001, 0x101, 0x9, 0x0, 0x1000, 0x2, 0x9, 0x6, 0x4, 0x1ff, 0x401, 0x1, 0xdcf, 0xfe, 0xe44, 0x0, 0x5, 0x89a, 0x80, 0x3, 0x9, 0x7fff, 0x6, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3], 0x16, ['/dev/loop#\x00', '/dev/loop#\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x438}, 0x1, 0x0, 0x0, 0x88b4}, 0x480c4) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x9, 0x2c24c0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000840)={0x3216, 0x100000001, 0x8, 0xc266}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0xbde5, 0xbf, 0xafa, 0x800, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4, 0xd}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a40)={r2, &(0x7f0000000900)="78dee0e489793816ec84ba173c78663054b9a8db80cd4b8a5eb8c99d81a2169eb8d7e1366c5a9118af65abef2455ffe0d6b7622d8c85ea69796102d6db8ba808be998aff5d8d973d9c37e44c66867eade0bfd8015d61f804123e104edf1f092e6effbec23ebc6a27852f0e34ccfed9", &(0x7f0000000980)=@buf="d1ac4e15aacf11e696771bd3afcf45bdd733580fe5b8c129f1af7e1cbfcbc1396e968ad112e616192011974a258a89e9ed31c688067d0148b63dab817484c4e1f82b257c858b9116e8757591a03d33a4d8ab444cbd77f91ca147c03e626688d8b6ba7c4058806b2229fca459660f8189802b86a1cce78899c82953aa7a016f76da0b057b461e60f083eb7b55fc86bbf714107dfcdc9765a9e2582a79d69b4b44a45a52045b59", 0x4}, 0x20) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000a80)={0x1f, 0x1b7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=@ipv4_getnexthop={0x2c, 0x6a, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x4800) r3 = getpgrp(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000bc0)='ns/time\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c00), 0x101000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000c40)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x94, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xff, 0x1f}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}]}, 0x94}, 0x1, 0x0, 0x0, 0x44084}, 0x4000000) syz_clone(0x6200a100, &(0x7f0000000e00)="b75705726f985ac68a0af625268ee05996c76b7051f1aa020981446b4bc81a54410155f350eb2a524c2bb2c660cd4bb3ebc5141101bd9d964a96c2c443da7fbd5c7a1094ef1c752a1fa492667958355e28bd746dceb9dda8ea4087aa6155e4b854d95a644b17e0a08b2d03c52a7a8a152b7329e8b60a068caaff713ed158b400d0cc93d978ee920d9fa78601f25f92a2215ab88624fe175b56694e5b15588c5572b90ca1e3b26c6fd75f27e5026531ec7323b5f2a1d62ebb142ba20883c8689e73d014dc403f0576972a7f81bd4319ee73cf0d96a707b3700c8f1701d5202dfc044d1f28729854be721129822f4d520e427d5d", 0xf3, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="be18c14ef67ab28965b53ce1ab80ddbc0736819a9636a12f3900df8d47adddd8b805ed8884ac8fb0a2154cf52262b39e579725a19c9901dad8ddd6cd5f5cfeaa7583a25523ca4b25838fb73a39576b4b43163174a351") r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001640)) 20:20:43 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000e80), 0x2, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) [ 133.359541][ T26] audit: type=1400 audit(1676146843.960:114): avc: denied { read write } for pid=5554 comm="syz-executor.2" name="vhost-vsock" dev="devtmpfs" ino=1084 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 20:20:44 executing program 5: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x40046205, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x4, 0x0, &(0x7f0000000200)=[@enter_looper], 0x1, 0x0, &(0x7f0000000240)="bd"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000280)="da"}) 20:20:44 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x68, 0x30, 0x871a15abc695fb3d, 0x0, 0x0, {}, [{0x54, 0x1, [@m_tunnel_key={0x50, 0x1, 0x0, 0x0, {{0xf}, {0x20, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x2}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) [ 133.387383][ T26] audit: type=1400 audit(1676146843.980:115): avc: denied { open } for pid=5554 comm="syz-executor.2" path="/dev/vhost-vsock" dev="devtmpfs" ino=1084 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 133.413039][ T5375] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 20:20:44 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000e80), 0x2, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) 20:20:44 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x68, 0x30, 0x871a15abc695fb3d, 0x0, 0x0, {}, [{0x54, 0x1, [@m_tunnel_key={0x50, 0x1, 0x0, 0x0, {{0xf}, {0x20, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x2}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) [ 133.480246][ T5561] binder: 5558:5561 ioctl 40046205 0 returned -22 [ 133.496391][ T26] audit: type=1400 audit(1676146843.980:116): avc: denied { ioctl } for pid=5554 comm="syz-executor.2" path="/dev/vhost-vsock" dev="devtmpfs" ino=1084 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 20:20:44 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x14, r1, 0x19de81d7e454a767}, 0x14}}, 0x0) [ 133.569871][ T26] audit: type=1400 audit(1676146844.050:117): avc: denied { read } for pid=5558 comm="syz-executor.5" name="binder0" dev="binder" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 133.614596][ T26] audit: type=1400 audit(1676146844.050:118): avc: denied { open } for pid=5558 comm="syz-executor.5" path="/dev/binderfs/binder0" dev="binder" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 20:20:44 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x14, r1, 0x19de81d7e454a767}, 0x14}}, 0x0) [ 133.644223][ T26] audit: type=1400 audit(1676146844.050:119): avc: denied { ioctl } for pid=5558 comm="syz-executor.5" path="/dev/binderfs/binder0" dev="binder" ino=13 ioctlcmd=0x6205 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 20:20:44 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000e80), 0x2, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) [ 133.741500][ T26] audit: type=1400 audit(1676146844.080:120): avc: denied { bpf } for pid=5559 comm="syz-executor.0" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 20:20:44 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r0, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x68, 0x30, 0x871a15abc695fb3d, 0x0, 0x0, {}, [{0x54, 0x1, [@m_tunnel_key={0x50, 0x1, 0x0, 0x0, {{0xf}, {0x20, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x2}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) 20:20:44 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x14, r1, 0x19de81d7e454a767}, 0x14}}, 0x0) 20:20:44 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x14, r1, 0x19de81d7e454a767}, 0x14}}, 0x0) [ 133.791746][ T26] audit: type=1400 audit(1676146844.090:121): avc: denied { map_create } for pid=5559 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 133.896859][ T26] audit: type=1400 audit(1676146844.090:122): avc: denied { ioctl } for pid=5558 comm="syz-executor.5" path="/dev/binderfs/binder0" dev="binder" ino=13 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 20:20:44 executing program 0: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x5) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x2002) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f00000000c0), 0x2, 0x410800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0x1, &(0x7f0000000100)="4066dc829b8fbcadc8e52b141a528aae1c21b4fb2eb906105a4d009debdd8011331090f54c46c52b54f44143c4f2dbfacce6c423ed25b407e8fdb9239b463c68cab0dc0dbfa6a1042df475799d4c827f3557907c1ace3aae70211cb2f5e5a021422f2924f3db37cc97138dc5ccd9c136ebb996d3545938415313923b9ffffcaee2f011d283bd52da7704d461a912968743d75fdaaaa9c69ae41765ff3a8b84dd5c4509d02fddfbbe6dbb7c019858c43eb9afa31e5f2247bac26c8f5cc575927074f751b29fb673fc0e", &(0x7f0000000200)=@udp6, 0x1}, 0x20) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000280)=0xff) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000002c0)={0x8, {0x7, 0xa3ef, 0x3f, 0x0, 0x2, 0x3}}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x11) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x300, 0x70bd2d, 0xffffff83, {0x4, 0x1, 0x5, [0x6, 0x5, 0x5, 0x10000, 0x0, 0x1, 0x5, 0x6, 0x7, 0x9, 0x4, 0x91c7, 0x3f, 0x81, 0x6c95, 0x0, 0xffff, 0x1, 0x200, 0xc5, 0x401, 0x800, 0x8, 0x80000001, 0x2, 0xac0c, 0xfc6, 0x3, 0x7, 0x400, 0x7fff, 0x6, 0x7fff, 0x5, 0x2, 0x10000, 0x81, 0x5867, 0x100, 0x0, 0xffffffff, 0x2, 0x800, 0x1, 0x182, 0x7, 0x16, 0x4, 0x6, 0x6212, 0x0, 0x1, 0xffffffe1, 0x8001, 0xffff, 0x0, 0x81, 0x8, 0x0, 0x101, 0x400, 0xfffffffd, 0x5], [0x10001, 0x800, 0x9, 0x10001, 0x0, 0xf2, 0x64d, 0xca5, 0x5, 0x4, 0xffffffff, 0x9, 0x0, 0xfffffff8, 0x400, 0xffffffff, 0x8, 0x81, 0x0, 0x836, 0xffff, 0x4, 0x1, 0xffff, 0x7, 0x1, 0x70000000, 0x80000001, 0x80000001, 0x3e566ffd, 0x2, 0x5, 0x0, 0xe199, 0x101, 0x20, 0xab94, 0x8020000, 0x0, 0xff, 0x1, 0x80000001, 0x1d31, 0x3, 0x884, 0x5, 0x7, 0x5, 0x8, 0x6, 0x1, 0x3, 0x7, 0xfffffe01, 0xfd6f, 0xffff4337, 0x5, 0x7f, 0x739acb7a, 0x68c3, 0x8, 0xc0, 0x9a2, 0x2], [0x2, 0x80000000, 0xd473, 0x5, 0xfffff801, 0x0, 0x81, 0x901, 0x7, 0xa4, 0x8, 0x7, 0x3a, 0x1, 0x2, 0xfff, 0x5, 0xffffffff, 0x8, 0x3, 0x4, 0x2, 0x3f, 0x0, 0xfffffff8, 0x8, 0x4, 0x6, 0x6, 0x4, 0xc6, 0x4ba, 0x385146b, 0x4, 0x1, 0x81, 0xb6, 0x7, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x6, 0x0, 0x7, 0x5, 0x9, 0x6, 0x1bf15fba, 0x3, 0x7fff, 0x9, 0xfffffffb, 0x2, 0x9, 0xff, 0x9a, 0x7fff, 0x6, 0x3, 0x1, 0x2, 0x1f], [0x4, 0x1000, 0x0, 0x80000000, 0x4, 0x6, 0x542, 0x100, 0x8001, 0x87, 0x4, 0x0, 0x99, 0x1, 0x0, 0x20, 0xdab6, 0x9, 0x40, 0x0, 0x2, 0x20, 0xffffffe0, 0x100, 0x1, 0x601, 0x3, 0x1, 0x401, 0x7fffffff, 0x5, 0x3, 0x200, 0x8001, 0x101, 0x9, 0x0, 0x1000, 0x2, 0x9, 0x6, 0x4, 0x1ff, 0x401, 0x1, 0xdcf, 0xfe, 0xe44, 0x0, 0x5, 0x89a, 0x80, 0x3, 0x9, 0x7fff, 0x6, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3], 0x16, ['/dev/loop#\x00', '/dev/loop#\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x438}, 0x1, 0x0, 0x0, 0x88b4}, 0x480c4) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x9, 0x2c24c0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000840)={0x3216, 0x100000001, 0x8, 0xc266}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0xbde5, 0xbf, 0xafa, 0x800, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4, 0xd}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a40)={r2, &(0x7f0000000900)="78dee0e489793816ec84ba173c78663054b9a8db80cd4b8a5eb8c99d81a2169eb8d7e1366c5a9118af65abef2455ffe0d6b7622d8c85ea69796102d6db8ba808be998aff5d8d973d9c37e44c66867eade0bfd8015d61f804123e104edf1f092e6effbec23ebc6a27852f0e34ccfed9", &(0x7f0000000980)=@buf="d1ac4e15aacf11e696771bd3afcf45bdd733580fe5b8c129f1af7e1cbfcbc1396e968ad112e616192011974a258a89e9ed31c688067d0148b63dab817484c4e1f82b257c858b9116e8757591a03d33a4d8ab444cbd77f91ca147c03e626688d8b6ba7c4058806b2229fca459660f8189802b86a1cce78899c82953aa7a016f76da0b057b461e60f083eb7b55fc86bbf714107dfcdc9765a9e2582a79d69b4b44a45a52045b59", 0x4}, 0x20) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000a80)={0x1f, 0x1b7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=@ipv4_getnexthop={0x2c, 0x6a, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x4800) r3 = getpgrp(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000bc0)='ns/time\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c00), 0x101000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000c40)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x94, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xff, 0x1f}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}]}, 0x94}, 0x1, 0x0, 0x0, 0x44084}, 0x4000000) syz_clone(0x6200a100, &(0x7f0000000e00)="b75705726f985ac68a0af625268ee05996c76b7051f1aa020981446b4bc81a54410155f350eb2a524c2bb2c660cd4bb3ebc5141101bd9d964a96c2c443da7fbd5c7a1094ef1c752a1fa492667958355e28bd746dceb9dda8ea4087aa6155e4b854d95a644b17e0a08b2d03c52a7a8a152b7329e8b60a068caaff713ed158b400d0cc93d978ee920d9fa78601f25f92a2215ab88624fe175b56694e5b15588c5572b90ca1e3b26c6fd75f27e5026531ec7323b5f2a1d62ebb142ba20883c8689e73d014dc403f0576972a7f81bd4319ee73cf0d96a707b3700c8f1701d5202dfc044d1f28729854be721129822f4d520e427d5d", 0xf3, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="be18c14ef67ab28965b53ce1ab80ddbc0736819a9636a12f3900df8d47adddd8b805ed8884ac8fb0a2154cf52262b39e579725a19c9901dad8ddd6cd5f5cfeaa7583a25523ca4b25838fb73a39576b4b43163174a351") r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001640)) 20:20:44 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x14, r1, 0x19de81d7e454a767}, 0x14}}, 0x0) [ 133.970763][ T26] audit: type=1400 audit(1676146844.130:123): avc: denied { create } for pid=5565 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 20:20:44 executing program 5: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x40046205, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x4, 0x0, &(0x7f0000000200)=[@enter_looper], 0x1, 0x0, &(0x7f0000000240)="bd"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000280)="da"}) 20:20:44 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000e80), 0x2, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) 20:20:44 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x14, r1, 0x19de81d7e454a767}, 0x14}}, 0x0) 20:20:44 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x14, r1, 0x19de81d7e454a767}, 0x14}}, 0x0) 20:20:44 executing program 1: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x5) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x2002) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f00000000c0), 0x2, 0x410800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0x1, &(0x7f0000000100)="4066dc829b8fbcadc8e52b141a528aae1c21b4fb2eb906105a4d009debdd8011331090f54c46c52b54f44143c4f2dbfacce6c423ed25b407e8fdb9239b463c68cab0dc0dbfa6a1042df475799d4c827f3557907c1ace3aae70211cb2f5e5a021422f2924f3db37cc97138dc5ccd9c136ebb996d3545938415313923b9ffffcaee2f011d283bd52da7704d461a912968743d75fdaaaa9c69ae41765ff3a8b84dd5c4509d02fddfbbe6dbb7c019858c43eb9afa31e5f2247bac26c8f5cc575927074f751b29fb673fc0e", &(0x7f0000000200)=@udp6, 0x1}, 0x20) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000280)=0xff) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000002c0)={0x8, {0x7, 0xa3ef, 0x3f, 0x0, 0x2, 0x3}}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x11) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x300, 0x70bd2d, 0xffffff83, {0x4, 0x1, 0x5, [0x6, 0x5, 0x5, 0x10000, 0x0, 0x1, 0x5, 0x6, 0x7, 0x9, 0x4, 0x91c7, 0x3f, 0x81, 0x6c95, 0x0, 0xffff, 0x1, 0x200, 0xc5, 0x401, 0x800, 0x8, 0x80000001, 0x2, 0xac0c, 0xfc6, 0x3, 0x7, 0x400, 0x7fff, 0x6, 0x7fff, 0x5, 0x2, 0x10000, 0x81, 0x5867, 0x100, 0x0, 0xffffffff, 0x2, 0x800, 0x1, 0x182, 0x7, 0x16, 0x4, 0x6, 0x6212, 0x0, 0x1, 0xffffffe1, 0x8001, 0xffff, 0x0, 0x81, 0x8, 0x0, 0x101, 0x400, 0xfffffffd, 0x5], [0x10001, 0x800, 0x9, 0x10001, 0x0, 0xf2, 0x64d, 0xca5, 0x5, 0x4, 0xffffffff, 0x9, 0x0, 0xfffffff8, 0x400, 0xffffffff, 0x8, 0x81, 0x0, 0x836, 0xffff, 0x4, 0x1, 0xffff, 0x7, 0x1, 0x70000000, 0x80000001, 0x80000001, 0x3e566ffd, 0x2, 0x5, 0x0, 0xe199, 0x101, 0x20, 0xab94, 0x8020000, 0x0, 0xff, 0x1, 0x80000001, 0x1d31, 0x3, 0x884, 0x5, 0x7, 0x5, 0x8, 0x6, 0x1, 0x3, 0x7, 0xfffffe01, 0xfd6f, 0xffff4337, 0x5, 0x7f, 0x739acb7a, 0x68c3, 0x8, 0xc0, 0x9a2, 0x2], [0x2, 0x80000000, 0xd473, 0x5, 0xfffff801, 0x0, 0x81, 0x901, 0x7, 0xa4, 0x8, 0x7, 0x3a, 0x1, 0x2, 0xfff, 0x5, 0xffffffff, 0x8, 0x3, 0x4, 0x2, 0x3f, 0x0, 0xfffffff8, 0x8, 0x4, 0x6, 0x6, 0x4, 0xc6, 0x4ba, 0x385146b, 0x4, 0x1, 0x81, 0xb6, 0x7, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x6, 0x0, 0x7, 0x5, 0x9, 0x6, 0x1bf15fba, 0x3, 0x7fff, 0x9, 0xfffffffb, 0x2, 0x9, 0xff, 0x9a, 0x7fff, 0x6, 0x3, 0x1, 0x2, 0x1f], [0x4, 0x1000, 0x0, 0x80000000, 0x4, 0x6, 0x542, 0x100, 0x8001, 0x87, 0x4, 0x0, 0x99, 0x1, 0x0, 0x20, 0xdab6, 0x9, 0x40, 0x0, 0x2, 0x20, 0xffffffe0, 0x100, 0x1, 0x601, 0x3, 0x1, 0x401, 0x7fffffff, 0x5, 0x3, 0x200, 0x8001, 0x101, 0x9, 0x0, 0x1000, 0x2, 0x9, 0x6, 0x4, 0x1ff, 0x401, 0x1, 0xdcf, 0xfe, 0xe44, 0x0, 0x5, 0x89a, 0x80, 0x3, 0x9, 0x7fff, 0x6, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3], 0x16, ['/dev/loop#\x00', '/dev/loop#\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x438}, 0x1, 0x0, 0x0, 0x88b4}, 0x480c4) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x9, 0x2c24c0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000840)={0x3216, 0x100000001, 0x8, 0xc266}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0xbde5, 0xbf, 0xafa, 0x800, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4, 0xd}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a40)={r2, &(0x7f0000000900)="78dee0e489793816ec84ba173c78663054b9a8db80cd4b8a5eb8c99d81a2169eb8d7e1366c5a9118af65abef2455ffe0d6b7622d8c85ea69796102d6db8ba808be998aff5d8d973d9c37e44c66867eade0bfd8015d61f804123e104edf1f092e6effbec23ebc6a27852f0e34ccfed9", &(0x7f0000000980)=@buf="d1ac4e15aacf11e696771bd3afcf45bdd733580fe5b8c129f1af7e1cbfcbc1396e968ad112e616192011974a258a89e9ed31c688067d0148b63dab817484c4e1f82b257c858b9116e8757591a03d33a4d8ab444cbd77f91ca147c03e626688d8b6ba7c4058806b2229fca459660f8189802b86a1cce78899c82953aa7a016f76da0b057b461e60f083eb7b55fc86bbf714107dfcdc9765a9e2582a79d69b4b44a45a52045b59", 0x4}, 0x20) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000a80)={0x1f, 0x1b7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=@ipv4_getnexthop={0x2c, 0x6a, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x4800) r3 = getpgrp(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000bc0)='ns/time\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c00), 0x101000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000c40)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x94, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xff, 0x1f}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}]}, 0x94}, 0x1, 0x0, 0x0, 0x44084}, 0x4000000) syz_clone(0x6200a100, &(0x7f0000000e00)="b75705726f985ac68a0af625268ee05996c76b7051f1aa020981446b4bc81a54410155f350eb2a524c2bb2c660cd4bb3ebc5141101bd9d964a96c2c443da7fbd5c7a1094ef1c752a1fa492667958355e28bd746dceb9dda8ea4087aa6155e4b854d95a644b17e0a08b2d03c52a7a8a152b7329e8b60a068caaff713ed158b400d0cc93d978ee920d9fa78601f25f92a2215ab88624fe175b56694e5b15588c5572b90ca1e3b26c6fd75f27e5026531ec7323b5f2a1d62ebb142ba20883c8689e73d014dc403f0576972a7f81bd4319ee73cf0d96a707b3700c8f1701d5202dfc044d1f28729854be721129822f4d520e427d5d", 0xf3, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="be18c14ef67ab28965b53ce1ab80ddbc0736819a9636a12f3900df8d47adddd8b805ed8884ac8fb0a2154cf52262b39e579725a19c9901dad8ddd6cd5f5cfeaa7583a25523ca4b25838fb73a39576b4b43163174a351") r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001640)) 20:20:45 executing program 0: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x5) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x2002) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f00000000c0), 0x2, 0x410800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0x1, &(0x7f0000000100)="4066dc829b8fbcadc8e52b141a528aae1c21b4fb2eb906105a4d009debdd8011331090f54c46c52b54f44143c4f2dbfacce6c423ed25b407e8fdb9239b463c68cab0dc0dbfa6a1042df475799d4c827f3557907c1ace3aae70211cb2f5e5a021422f2924f3db37cc97138dc5ccd9c136ebb996d3545938415313923b9ffffcaee2f011d283bd52da7704d461a912968743d75fdaaaa9c69ae41765ff3a8b84dd5c4509d02fddfbbe6dbb7c019858c43eb9afa31e5f2247bac26c8f5cc575927074f751b29fb673fc0e", &(0x7f0000000200)=@udp6, 0x1}, 0x20) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000280)=0xff) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000002c0)={0x8, {0x7, 0xa3ef, 0x3f, 0x0, 0x2, 0x3}}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x11) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x300, 0x70bd2d, 0xffffff83, {0x4, 0x1, 0x5, [0x6, 0x5, 0x5, 0x10000, 0x0, 0x1, 0x5, 0x6, 0x7, 0x9, 0x4, 0x91c7, 0x3f, 0x81, 0x6c95, 0x0, 0xffff, 0x1, 0x200, 0xc5, 0x401, 0x800, 0x8, 0x80000001, 0x2, 0xac0c, 0xfc6, 0x3, 0x7, 0x400, 0x7fff, 0x6, 0x7fff, 0x5, 0x2, 0x10000, 0x81, 0x5867, 0x100, 0x0, 0xffffffff, 0x2, 0x800, 0x1, 0x182, 0x7, 0x16, 0x4, 0x6, 0x6212, 0x0, 0x1, 0xffffffe1, 0x8001, 0xffff, 0x0, 0x81, 0x8, 0x0, 0x101, 0x400, 0xfffffffd, 0x5], [0x10001, 0x800, 0x9, 0x10001, 0x0, 0xf2, 0x64d, 0xca5, 0x5, 0x4, 0xffffffff, 0x9, 0x0, 0xfffffff8, 0x400, 0xffffffff, 0x8, 0x81, 0x0, 0x836, 0xffff, 0x4, 0x1, 0xffff, 0x7, 0x1, 0x70000000, 0x80000001, 0x80000001, 0x3e566ffd, 0x2, 0x5, 0x0, 0xe199, 0x101, 0x20, 0xab94, 0x8020000, 0x0, 0xff, 0x1, 0x80000001, 0x1d31, 0x3, 0x884, 0x5, 0x7, 0x5, 0x8, 0x6, 0x1, 0x3, 0x7, 0xfffffe01, 0xfd6f, 0xffff4337, 0x5, 0x7f, 0x739acb7a, 0x68c3, 0x8, 0xc0, 0x9a2, 0x2], [0x2, 0x80000000, 0xd473, 0x5, 0xfffff801, 0x0, 0x81, 0x901, 0x7, 0xa4, 0x8, 0x7, 0x3a, 0x1, 0x2, 0xfff, 0x5, 0xffffffff, 0x8, 0x3, 0x4, 0x2, 0x3f, 0x0, 0xfffffff8, 0x8, 0x4, 0x6, 0x6, 0x4, 0xc6, 0x4ba, 0x385146b, 0x4, 0x1, 0x81, 0xb6, 0x7, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x6, 0x0, 0x7, 0x5, 0x9, 0x6, 0x1bf15fba, 0x3, 0x7fff, 0x9, 0xfffffffb, 0x2, 0x9, 0xff, 0x9a, 0x7fff, 0x6, 0x3, 0x1, 0x2, 0x1f], [0x4, 0x1000, 0x0, 0x80000000, 0x4, 0x6, 0x542, 0x100, 0x8001, 0x87, 0x4, 0x0, 0x99, 0x1, 0x0, 0x20, 0xdab6, 0x9, 0x40, 0x0, 0x2, 0x20, 0xffffffe0, 0x100, 0x1, 0x601, 0x3, 0x1, 0x401, 0x7fffffff, 0x5, 0x3, 0x200, 0x8001, 0x101, 0x9, 0x0, 0x1000, 0x2, 0x9, 0x6, 0x4, 0x1ff, 0x401, 0x1, 0xdcf, 0xfe, 0xe44, 0x0, 0x5, 0x89a, 0x80, 0x3, 0x9, 0x7fff, 0x6, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3], 0x16, ['/dev/loop#\x00', '/dev/loop#\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x438}, 0x1, 0x0, 0x0, 0x88b4}, 0x480c4) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x9, 0x2c24c0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000840)={0x3216, 0x100000001, 0x8, 0xc266}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0xbde5, 0xbf, 0xafa, 0x800, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4, 0xd}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a40)={r2, &(0x7f0000000900)="78dee0e489793816ec84ba173c78663054b9a8db80cd4b8a5eb8c99d81a2169eb8d7e1366c5a9118af65abef2455ffe0d6b7622d8c85ea69796102d6db8ba808be998aff5d8d973d9c37e44c66867eade0bfd8015d61f804123e104edf1f092e6effbec23ebc6a27852f0e34ccfed9", &(0x7f0000000980)=@buf="d1ac4e15aacf11e696771bd3afcf45bdd733580fe5b8c129f1af7e1cbfcbc1396e968ad112e616192011974a258a89e9ed31c688067d0148b63dab817484c4e1f82b257c858b9116e8757591a03d33a4d8ab444cbd77f91ca147c03e626688d8b6ba7c4058806b2229fca459660f8189802b86a1cce78899c82953aa7a016f76da0b057b461e60f083eb7b55fc86bbf714107dfcdc9765a9e2582a79d69b4b44a45a52045b59", 0x4}, 0x20) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000a80)={0x1f, 0x1b7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=@ipv4_getnexthop={0x2c, 0x6a, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x4800) r3 = getpgrp(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000bc0)='ns/time\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c00), 0x101000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000c40)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x94, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xff, 0x1f}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}]}, 0x94}, 0x1, 0x0, 0x0, 0x44084}, 0x4000000) syz_clone(0x6200a100, &(0x7f0000000e00)="b75705726f985ac68a0af625268ee05996c76b7051f1aa020981446b4bc81a54410155f350eb2a524c2bb2c660cd4bb3ebc5141101bd9d964a96c2c443da7fbd5c7a1094ef1c752a1fa492667958355e28bd746dceb9dda8ea4087aa6155e4b854d95a644b17e0a08b2d03c52a7a8a152b7329e8b60a068caaff713ed158b400d0cc93d978ee920d9fa78601f25f92a2215ab88624fe175b56694e5b15588c5572b90ca1e3b26c6fd75f27e5026531ec7323b5f2a1d62ebb142ba20883c8689e73d014dc403f0576972a7f81bd4319ee73cf0d96a707b3700c8f1701d5202dfc044d1f28729854be721129822f4d520e427d5d", 0xf3, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="be18c14ef67ab28965b53ce1ab80ddbc0736819a9636a12f3900df8d47adddd8b805ed8884ac8fb0a2154cf52262b39e579725a19c9901dad8ddd6cd5f5cfeaa7583a25523ca4b25838fb73a39576b4b43163174a351") r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001640)) 20:20:45 executing program 2: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x40046205, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x4, 0x0, &(0x7f0000000200)=[@enter_looper], 0x1, 0x0, &(0x7f0000000240)="bd"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000280)="da"}) 20:20:45 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x14, r1, 0x19de81d7e454a767}, 0x14}}, 0x0) 20:20:45 executing program 3: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x40046205, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x4, 0x0, &(0x7f0000000200)=[@enter_looper], 0x1, 0x0, &(0x7f0000000240)="bd"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000280)="da"}) [ 134.463693][ T5608] binder: 5607:5608 ioctl 40046205 0 returned -22 [ 134.576559][ T5616] binder: 5611:5616 ioctl 40046205 0 returned -22 [ 134.595239][ T5617] binder: 5614:5617 ioctl 40046205 0 returned -22 20:20:45 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x14, r1, 0x19de81d7e454a767}, 0x14}}, 0x0) 20:20:45 executing program 4: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x40046205, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x4, 0x0, &(0x7f0000000200)=[@enter_looper], 0x1, 0x0, &(0x7f0000000240)="bd"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000280)="da"}) [ 135.022161][ T5625] binder: 5624:5625 ioctl 40046205 0 returned -22 20:20:45 executing program 0: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x5) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x2002) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f00000000c0), 0x2, 0x410800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0x1, &(0x7f0000000100)="4066dc829b8fbcadc8e52b141a528aae1c21b4fb2eb906105a4d009debdd8011331090f54c46c52b54f44143c4f2dbfacce6c423ed25b407e8fdb9239b463c68cab0dc0dbfa6a1042df475799d4c827f3557907c1ace3aae70211cb2f5e5a021422f2924f3db37cc97138dc5ccd9c136ebb996d3545938415313923b9ffffcaee2f011d283bd52da7704d461a912968743d75fdaaaa9c69ae41765ff3a8b84dd5c4509d02fddfbbe6dbb7c019858c43eb9afa31e5f2247bac26c8f5cc575927074f751b29fb673fc0e", &(0x7f0000000200)=@udp6, 0x1}, 0x20) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000280)=0xff) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000002c0)={0x8, {0x7, 0xa3ef, 0x3f, 0x0, 0x2, 0x3}}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x11) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x300, 0x70bd2d, 0xffffff83, {0x4, 0x1, 0x5, [0x6, 0x5, 0x5, 0x10000, 0x0, 0x1, 0x5, 0x6, 0x7, 0x9, 0x4, 0x91c7, 0x3f, 0x81, 0x6c95, 0x0, 0xffff, 0x1, 0x200, 0xc5, 0x401, 0x800, 0x8, 0x80000001, 0x2, 0xac0c, 0xfc6, 0x3, 0x7, 0x400, 0x7fff, 0x6, 0x7fff, 0x5, 0x2, 0x10000, 0x81, 0x5867, 0x100, 0x0, 0xffffffff, 0x2, 0x800, 0x1, 0x182, 0x7, 0x16, 0x4, 0x6, 0x6212, 0x0, 0x1, 0xffffffe1, 0x8001, 0xffff, 0x0, 0x81, 0x8, 0x0, 0x101, 0x400, 0xfffffffd, 0x5], [0x10001, 0x800, 0x9, 0x10001, 0x0, 0xf2, 0x64d, 0xca5, 0x5, 0x4, 0xffffffff, 0x9, 0x0, 0xfffffff8, 0x400, 0xffffffff, 0x8, 0x81, 0x0, 0x836, 0xffff, 0x4, 0x1, 0xffff, 0x7, 0x1, 0x70000000, 0x80000001, 0x80000001, 0x3e566ffd, 0x2, 0x5, 0x0, 0xe199, 0x101, 0x20, 0xab94, 0x8020000, 0x0, 0xff, 0x1, 0x80000001, 0x1d31, 0x3, 0x884, 0x5, 0x7, 0x5, 0x8, 0x6, 0x1, 0x3, 0x7, 0xfffffe01, 0xfd6f, 0xffff4337, 0x5, 0x7f, 0x739acb7a, 0x68c3, 0x8, 0xc0, 0x9a2, 0x2], [0x2, 0x80000000, 0xd473, 0x5, 0xfffff801, 0x0, 0x81, 0x901, 0x7, 0xa4, 0x8, 0x7, 0x3a, 0x1, 0x2, 0xfff, 0x5, 0xffffffff, 0x8, 0x3, 0x4, 0x2, 0x3f, 0x0, 0xfffffff8, 0x8, 0x4, 0x6, 0x6, 0x4, 0xc6, 0x4ba, 0x385146b, 0x4, 0x1, 0x81, 0xb6, 0x7, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x6, 0x0, 0x7, 0x5, 0x9, 0x6, 0x1bf15fba, 0x3, 0x7fff, 0x9, 0xfffffffb, 0x2, 0x9, 0xff, 0x9a, 0x7fff, 0x6, 0x3, 0x1, 0x2, 0x1f], [0x4, 0x1000, 0x0, 0x80000000, 0x4, 0x6, 0x542, 0x100, 0x8001, 0x87, 0x4, 0x0, 0x99, 0x1, 0x0, 0x20, 0xdab6, 0x9, 0x40, 0x0, 0x2, 0x20, 0xffffffe0, 0x100, 0x1, 0x601, 0x3, 0x1, 0x401, 0x7fffffff, 0x5, 0x3, 0x200, 0x8001, 0x101, 0x9, 0x0, 0x1000, 0x2, 0x9, 0x6, 0x4, 0x1ff, 0x401, 0x1, 0xdcf, 0xfe, 0xe44, 0x0, 0x5, 0x89a, 0x80, 0x3, 0x9, 0x7fff, 0x6, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3], 0x16, ['/dev/loop#\x00', '/dev/loop#\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x438}, 0x1, 0x0, 0x0, 0x88b4}, 0x480c4) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x9, 0x2c24c0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000840)={0x3216, 0x100000001, 0x8, 0xc266}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0xbde5, 0xbf, 0xafa, 0x800, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4, 0xd}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a40)={r2, &(0x7f0000000900)="78dee0e489793816ec84ba173c78663054b9a8db80cd4b8a5eb8c99d81a2169eb8d7e1366c5a9118af65abef2455ffe0d6b7622d8c85ea69796102d6db8ba808be998aff5d8d973d9c37e44c66867eade0bfd8015d61f804123e104edf1f092e6effbec23ebc6a27852f0e34ccfed9", &(0x7f0000000980)=@buf="d1ac4e15aacf11e696771bd3afcf45bdd733580fe5b8c129f1af7e1cbfcbc1396e968ad112e616192011974a258a89e9ed31c688067d0148b63dab817484c4e1f82b257c858b9116e8757591a03d33a4d8ab444cbd77f91ca147c03e626688d8b6ba7c4058806b2229fca459660f8189802b86a1cce78899c82953aa7a016f76da0b057b461e60f083eb7b55fc86bbf714107dfcdc9765a9e2582a79d69b4b44a45a52045b59", 0x4}, 0x20) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000a80)={0x1f, 0x1b7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=@ipv4_getnexthop={0x2c, 0x6a, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x4800) r3 = getpgrp(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000bc0)='ns/time\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c00), 0x101000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000c40)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x94, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xff, 0x1f}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}]}, 0x94}, 0x1, 0x0, 0x0, 0x44084}, 0x4000000) syz_clone(0x6200a100, &(0x7f0000000e00)="b75705726f985ac68a0af625268ee05996c76b7051f1aa020981446b4bc81a54410155f350eb2a524c2bb2c660cd4bb3ebc5141101bd9d964a96c2c443da7fbd5c7a1094ef1c752a1fa492667958355e28bd746dceb9dda8ea4087aa6155e4b854d95a644b17e0a08b2d03c52a7a8a152b7329e8b60a068caaff713ed158b400d0cc93d978ee920d9fa78601f25f92a2215ab88624fe175b56694e5b15588c5572b90ca1e3b26c6fd75f27e5026531ec7323b5f2a1d62ebb142ba20883c8689e73d014dc403f0576972a7f81bd4319ee73cf0d96a707b3700c8f1701d5202dfc044d1f28729854be721129822f4d520e427d5d", 0xf3, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="be18c14ef67ab28965b53ce1ab80ddbc0736819a9636a12f3900df8d47adddd8b805ed8884ac8fb0a2154cf52262b39e579725a19c9901dad8ddd6cd5f5cfeaa7583a25523ca4b25838fb73a39576b4b43163174a351") r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001640)) 20:20:45 executing program 5: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x40046205, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x4, 0x0, &(0x7f0000000200)=[@enter_looper], 0x1, 0x0, &(0x7f0000000240)="bd"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000280)="da"}) 20:20:45 executing program 1: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x5) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x2002) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f00000000c0), 0x2, 0x410800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0x1, &(0x7f0000000100)="4066dc829b8fbcadc8e52b141a528aae1c21b4fb2eb906105a4d009debdd8011331090f54c46c52b54f44143c4f2dbfacce6c423ed25b407e8fdb9239b463c68cab0dc0dbfa6a1042df475799d4c827f3557907c1ace3aae70211cb2f5e5a021422f2924f3db37cc97138dc5ccd9c136ebb996d3545938415313923b9ffffcaee2f011d283bd52da7704d461a912968743d75fdaaaa9c69ae41765ff3a8b84dd5c4509d02fddfbbe6dbb7c019858c43eb9afa31e5f2247bac26c8f5cc575927074f751b29fb673fc0e", &(0x7f0000000200)=@udp6, 0x1}, 0x20) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000280)=0xff) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000002c0)={0x8, {0x7, 0xa3ef, 0x3f, 0x0, 0x2, 0x3}}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x11) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x300, 0x70bd2d, 0xffffff83, {0x4, 0x1, 0x5, [0x6, 0x5, 0x5, 0x10000, 0x0, 0x1, 0x5, 0x6, 0x7, 0x9, 0x4, 0x91c7, 0x3f, 0x81, 0x6c95, 0x0, 0xffff, 0x1, 0x200, 0xc5, 0x401, 0x800, 0x8, 0x80000001, 0x2, 0xac0c, 0xfc6, 0x3, 0x7, 0x400, 0x7fff, 0x6, 0x7fff, 0x5, 0x2, 0x10000, 0x81, 0x5867, 0x100, 0x0, 0xffffffff, 0x2, 0x800, 0x1, 0x182, 0x7, 0x16, 0x4, 0x6, 0x6212, 0x0, 0x1, 0xffffffe1, 0x8001, 0xffff, 0x0, 0x81, 0x8, 0x0, 0x101, 0x400, 0xfffffffd, 0x5], [0x10001, 0x800, 0x9, 0x10001, 0x0, 0xf2, 0x64d, 0xca5, 0x5, 0x4, 0xffffffff, 0x9, 0x0, 0xfffffff8, 0x400, 0xffffffff, 0x8, 0x81, 0x0, 0x836, 0xffff, 0x4, 0x1, 0xffff, 0x7, 0x1, 0x70000000, 0x80000001, 0x80000001, 0x3e566ffd, 0x2, 0x5, 0x0, 0xe199, 0x101, 0x20, 0xab94, 0x8020000, 0x0, 0xff, 0x1, 0x80000001, 0x1d31, 0x3, 0x884, 0x5, 0x7, 0x5, 0x8, 0x6, 0x1, 0x3, 0x7, 0xfffffe01, 0xfd6f, 0xffff4337, 0x5, 0x7f, 0x739acb7a, 0x68c3, 0x8, 0xc0, 0x9a2, 0x2], [0x2, 0x80000000, 0xd473, 0x5, 0xfffff801, 0x0, 0x81, 0x901, 0x7, 0xa4, 0x8, 0x7, 0x3a, 0x1, 0x2, 0xfff, 0x5, 0xffffffff, 0x8, 0x3, 0x4, 0x2, 0x3f, 0x0, 0xfffffff8, 0x8, 0x4, 0x6, 0x6, 0x4, 0xc6, 0x4ba, 0x385146b, 0x4, 0x1, 0x81, 0xb6, 0x7, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x6, 0x0, 0x7, 0x5, 0x9, 0x6, 0x1bf15fba, 0x3, 0x7fff, 0x9, 0xfffffffb, 0x2, 0x9, 0xff, 0x9a, 0x7fff, 0x6, 0x3, 0x1, 0x2, 0x1f], [0x4, 0x1000, 0x0, 0x80000000, 0x4, 0x6, 0x542, 0x100, 0x8001, 0x87, 0x4, 0x0, 0x99, 0x1, 0x0, 0x20, 0xdab6, 0x9, 0x40, 0x0, 0x2, 0x20, 0xffffffe0, 0x100, 0x1, 0x601, 0x3, 0x1, 0x401, 0x7fffffff, 0x5, 0x3, 0x200, 0x8001, 0x101, 0x9, 0x0, 0x1000, 0x2, 0x9, 0x6, 0x4, 0x1ff, 0x401, 0x1, 0xdcf, 0xfe, 0xe44, 0x0, 0x5, 0x89a, 0x80, 0x3, 0x9, 0x7fff, 0x6, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3], 0x16, ['/dev/loop#\x00', '/dev/loop#\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x438}, 0x1, 0x0, 0x0, 0x88b4}, 0x480c4) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x9, 0x2c24c0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000840)={0x3216, 0x100000001, 0x8, 0xc266}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0xbde5, 0xbf, 0xafa, 0x800, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4, 0xd}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a40)={r2, &(0x7f0000000900)="78dee0e489793816ec84ba173c78663054b9a8db80cd4b8a5eb8c99d81a2169eb8d7e1366c5a9118af65abef2455ffe0d6b7622d8c85ea69796102d6db8ba808be998aff5d8d973d9c37e44c66867eade0bfd8015d61f804123e104edf1f092e6effbec23ebc6a27852f0e34ccfed9", &(0x7f0000000980)=@buf="d1ac4e15aacf11e696771bd3afcf45bdd733580fe5b8c129f1af7e1cbfcbc1396e968ad112e616192011974a258a89e9ed31c688067d0148b63dab817484c4e1f82b257c858b9116e8757591a03d33a4d8ab444cbd77f91ca147c03e626688d8b6ba7c4058806b2229fca459660f8189802b86a1cce78899c82953aa7a016f76da0b057b461e60f083eb7b55fc86bbf714107dfcdc9765a9e2582a79d69b4b44a45a52045b59", 0x4}, 0x20) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000a80)={0x1f, 0x1b7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=@ipv4_getnexthop={0x2c, 0x6a, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x4800) r3 = getpgrp(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000bc0)='ns/time\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c00), 0x101000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000c40)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x94, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xff, 0x1f}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}]}, 0x94}, 0x1, 0x0, 0x0, 0x44084}, 0x4000000) syz_clone(0x6200a100, &(0x7f0000000e00)="b75705726f985ac68a0af625268ee05996c76b7051f1aa020981446b4bc81a54410155f350eb2a524c2bb2c660cd4bb3ebc5141101bd9d964a96c2c443da7fbd5c7a1094ef1c752a1fa492667958355e28bd746dceb9dda8ea4087aa6155e4b854d95a644b17e0a08b2d03c52a7a8a152b7329e8b60a068caaff713ed158b400d0cc93d978ee920d9fa78601f25f92a2215ab88624fe175b56694e5b15588c5572b90ca1e3b26c6fd75f27e5026531ec7323b5f2a1d62ebb142ba20883c8689e73d014dc403f0576972a7f81bd4319ee73cf0d96a707b3700c8f1701d5202dfc044d1f28729854be721129822f4d520e427d5d", 0xf3, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="be18c14ef67ab28965b53ce1ab80ddbc0736819a9636a12f3900df8d47adddd8b805ed8884ac8fb0a2154cf52262b39e579725a19c9901dad8ddd6cd5f5cfeaa7583a25523ca4b25838fb73a39576b4b43163174a351") r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001640)) 20:20:46 executing program 2: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x40046205, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x4, 0x0, &(0x7f0000000200)=[@enter_looper], 0x1, 0x0, &(0x7f0000000240)="bd"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000280)="da"}) [ 135.368001][ T5633] binder: 5632:5633 ioctl 40046205 0 returned -22 20:20:46 executing program 3: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x40046205, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x4, 0x0, &(0x7f0000000200)=[@enter_looper], 0x1, 0x0, &(0x7f0000000240)="bd"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000280)="da"}) 20:20:46 executing program 0: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x5) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x2002) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f00000000c0), 0x2, 0x410800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0x1, &(0x7f0000000100)="4066dc829b8fbcadc8e52b141a528aae1c21b4fb2eb906105a4d009debdd8011331090f54c46c52b54f44143c4f2dbfacce6c423ed25b407e8fdb9239b463c68cab0dc0dbfa6a1042df475799d4c827f3557907c1ace3aae70211cb2f5e5a021422f2924f3db37cc97138dc5ccd9c136ebb996d3545938415313923b9ffffcaee2f011d283bd52da7704d461a912968743d75fdaaaa9c69ae41765ff3a8b84dd5c4509d02fddfbbe6dbb7c019858c43eb9afa31e5f2247bac26c8f5cc575927074f751b29fb673fc0e", &(0x7f0000000200)=@udp6, 0x1}, 0x20) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000280)=0xff) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000002c0)={0x8, {0x7, 0xa3ef, 0x3f, 0x0, 0x2, 0x3}}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x11) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x300, 0x70bd2d, 0xffffff83, {0x4, 0x1, 0x5, [0x6, 0x5, 0x5, 0x10000, 0x0, 0x1, 0x5, 0x6, 0x7, 0x9, 0x4, 0x91c7, 0x3f, 0x81, 0x6c95, 0x0, 0xffff, 0x1, 0x200, 0xc5, 0x401, 0x800, 0x8, 0x80000001, 0x2, 0xac0c, 0xfc6, 0x3, 0x7, 0x400, 0x7fff, 0x6, 0x7fff, 0x5, 0x2, 0x10000, 0x81, 0x5867, 0x100, 0x0, 0xffffffff, 0x2, 0x800, 0x1, 0x182, 0x7, 0x16, 0x4, 0x6, 0x6212, 0x0, 0x1, 0xffffffe1, 0x8001, 0xffff, 0x0, 0x81, 0x8, 0x0, 0x101, 0x400, 0xfffffffd, 0x5], [0x10001, 0x800, 0x9, 0x10001, 0x0, 0xf2, 0x64d, 0xca5, 0x5, 0x4, 0xffffffff, 0x9, 0x0, 0xfffffff8, 0x400, 0xffffffff, 0x8, 0x81, 0x0, 0x836, 0xffff, 0x4, 0x1, 0xffff, 0x7, 0x1, 0x70000000, 0x80000001, 0x80000001, 0x3e566ffd, 0x2, 0x5, 0x0, 0xe199, 0x101, 0x20, 0xab94, 0x8020000, 0x0, 0xff, 0x1, 0x80000001, 0x1d31, 0x3, 0x884, 0x5, 0x7, 0x5, 0x8, 0x6, 0x1, 0x3, 0x7, 0xfffffe01, 0xfd6f, 0xffff4337, 0x5, 0x7f, 0x739acb7a, 0x68c3, 0x8, 0xc0, 0x9a2, 0x2], [0x2, 0x80000000, 0xd473, 0x5, 0xfffff801, 0x0, 0x81, 0x901, 0x7, 0xa4, 0x8, 0x7, 0x3a, 0x1, 0x2, 0xfff, 0x5, 0xffffffff, 0x8, 0x3, 0x4, 0x2, 0x3f, 0x0, 0xfffffff8, 0x8, 0x4, 0x6, 0x6, 0x4, 0xc6, 0x4ba, 0x385146b, 0x4, 0x1, 0x81, 0xb6, 0x7, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x6, 0x0, 0x7, 0x5, 0x9, 0x6, 0x1bf15fba, 0x3, 0x7fff, 0x9, 0xfffffffb, 0x2, 0x9, 0xff, 0x9a, 0x7fff, 0x6, 0x3, 0x1, 0x2, 0x1f], [0x4, 0x1000, 0x0, 0x80000000, 0x4, 0x6, 0x542, 0x100, 0x8001, 0x87, 0x4, 0x0, 0x99, 0x1, 0x0, 0x20, 0xdab6, 0x9, 0x40, 0x0, 0x2, 0x20, 0xffffffe0, 0x100, 0x1, 0x601, 0x3, 0x1, 0x401, 0x7fffffff, 0x5, 0x3, 0x200, 0x8001, 0x101, 0x9, 0x0, 0x1000, 0x2, 0x9, 0x6, 0x4, 0x1ff, 0x401, 0x1, 0xdcf, 0xfe, 0xe44, 0x0, 0x5, 0x89a, 0x80, 0x3, 0x9, 0x7fff, 0x6, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3], 0x16, ['/dev/loop#\x00', '/dev/loop#\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x438}, 0x1, 0x0, 0x0, 0x88b4}, 0x480c4) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x9, 0x2c24c0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000840)={0x3216, 0x100000001, 0x8, 0xc266}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0xbde5, 0xbf, 0xafa, 0x800, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4, 0xd}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a40)={r2, &(0x7f0000000900)="78dee0e489793816ec84ba173c78663054b9a8db80cd4b8a5eb8c99d81a2169eb8d7e1366c5a9118af65abef2455ffe0d6b7622d8c85ea69796102d6db8ba808be998aff5d8d973d9c37e44c66867eade0bfd8015d61f804123e104edf1f092e6effbec23ebc6a27852f0e34ccfed9", &(0x7f0000000980)=@buf="d1ac4e15aacf11e696771bd3afcf45bdd733580fe5b8c129f1af7e1cbfcbc1396e968ad112e616192011974a258a89e9ed31c688067d0148b63dab817484c4e1f82b257c858b9116e8757591a03d33a4d8ab444cbd77f91ca147c03e626688d8b6ba7c4058806b2229fca459660f8189802b86a1cce78899c82953aa7a016f76da0b057b461e60f083eb7b55fc86bbf714107dfcdc9765a9e2582a79d69b4b44a45a52045b59", 0x4}, 0x20) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000a80)={0x1f, 0x1b7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=@ipv4_getnexthop={0x2c, 0x6a, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x4800) r3 = getpgrp(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000bc0)='ns/time\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c00), 0x101000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000c40)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x94, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xff, 0x1f}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}]}, 0x94}, 0x1, 0x0, 0x0, 0x44084}, 0x4000000) syz_clone(0x6200a100, &(0x7f0000000e00)="b75705726f985ac68a0af625268ee05996c76b7051f1aa020981446b4bc81a54410155f350eb2a524c2bb2c660cd4bb3ebc5141101bd9d964a96c2c443da7fbd5c7a1094ef1c752a1fa492667958355e28bd746dceb9dda8ea4087aa6155e4b854d95a644b17e0a08b2d03c52a7a8a152b7329e8b60a068caaff713ed158b400d0cc93d978ee920d9fa78601f25f92a2215ab88624fe175b56694e5b15588c5572b90ca1e3b26c6fd75f27e5026531ec7323b5f2a1d62ebb142ba20883c8689e73d014dc403f0576972a7f81bd4319ee73cf0d96a707b3700c8f1701d5202dfc044d1f28729854be721129822f4d520e427d5d", 0xf3, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="be18c14ef67ab28965b53ce1ab80ddbc0736819a9636a12f3900df8d47adddd8b805ed8884ac8fb0a2154cf52262b39e579725a19c9901dad8ddd6cd5f5cfeaa7583a25523ca4b25838fb73a39576b4b43163174a351") r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001640)) [ 135.529837][ T5640] binder: 5638:5640 ioctl 40046205 0 returned -22 [ 135.563204][ T5643] binder: 5642:5643 ioctl 40046205 0 returned -22 20:20:46 executing program 4: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x40046205, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x4, 0x0, &(0x7f0000000200)=[@enter_looper], 0x1, 0x0, &(0x7f0000000240)="bd"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000280)="da"}) 20:20:46 executing program 1: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x5) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x2002) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f00000000c0), 0x2, 0x410800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0x1, &(0x7f0000000100)="4066dc829b8fbcadc8e52b141a528aae1c21b4fb2eb906105a4d009debdd8011331090f54c46c52b54f44143c4f2dbfacce6c423ed25b407e8fdb9239b463c68cab0dc0dbfa6a1042df475799d4c827f3557907c1ace3aae70211cb2f5e5a021422f2924f3db37cc97138dc5ccd9c136ebb996d3545938415313923b9ffffcaee2f011d283bd52da7704d461a912968743d75fdaaaa9c69ae41765ff3a8b84dd5c4509d02fddfbbe6dbb7c019858c43eb9afa31e5f2247bac26c8f5cc575927074f751b29fb673fc0e", &(0x7f0000000200)=@udp6, 0x1}, 0x20) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000280)=0xff) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000002c0)={0x8, {0x7, 0xa3ef, 0x3f, 0x0, 0x2, 0x3}}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x11) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x300, 0x70bd2d, 0xffffff83, {0x4, 0x1, 0x5, [0x6, 0x5, 0x5, 0x10000, 0x0, 0x1, 0x5, 0x6, 0x7, 0x9, 0x4, 0x91c7, 0x3f, 0x81, 0x6c95, 0x0, 0xffff, 0x1, 0x200, 0xc5, 0x401, 0x800, 0x8, 0x80000001, 0x2, 0xac0c, 0xfc6, 0x3, 0x7, 0x400, 0x7fff, 0x6, 0x7fff, 0x5, 0x2, 0x10000, 0x81, 0x5867, 0x100, 0x0, 0xffffffff, 0x2, 0x800, 0x1, 0x182, 0x7, 0x16, 0x4, 0x6, 0x6212, 0x0, 0x1, 0xffffffe1, 0x8001, 0xffff, 0x0, 0x81, 0x8, 0x0, 0x101, 0x400, 0xfffffffd, 0x5], [0x10001, 0x800, 0x9, 0x10001, 0x0, 0xf2, 0x64d, 0xca5, 0x5, 0x4, 0xffffffff, 0x9, 0x0, 0xfffffff8, 0x400, 0xffffffff, 0x8, 0x81, 0x0, 0x836, 0xffff, 0x4, 0x1, 0xffff, 0x7, 0x1, 0x70000000, 0x80000001, 0x80000001, 0x3e566ffd, 0x2, 0x5, 0x0, 0xe199, 0x101, 0x20, 0xab94, 0x8020000, 0x0, 0xff, 0x1, 0x80000001, 0x1d31, 0x3, 0x884, 0x5, 0x7, 0x5, 0x8, 0x6, 0x1, 0x3, 0x7, 0xfffffe01, 0xfd6f, 0xffff4337, 0x5, 0x7f, 0x739acb7a, 0x68c3, 0x8, 0xc0, 0x9a2, 0x2], [0x2, 0x80000000, 0xd473, 0x5, 0xfffff801, 0x0, 0x81, 0x901, 0x7, 0xa4, 0x8, 0x7, 0x3a, 0x1, 0x2, 0xfff, 0x5, 0xffffffff, 0x8, 0x3, 0x4, 0x2, 0x3f, 0x0, 0xfffffff8, 0x8, 0x4, 0x6, 0x6, 0x4, 0xc6, 0x4ba, 0x385146b, 0x4, 0x1, 0x81, 0xb6, 0x7, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x6, 0x0, 0x7, 0x5, 0x9, 0x6, 0x1bf15fba, 0x3, 0x7fff, 0x9, 0xfffffffb, 0x2, 0x9, 0xff, 0x9a, 0x7fff, 0x6, 0x3, 0x1, 0x2, 0x1f], [0x4, 0x1000, 0x0, 0x80000000, 0x4, 0x6, 0x542, 0x100, 0x8001, 0x87, 0x4, 0x0, 0x99, 0x1, 0x0, 0x20, 0xdab6, 0x9, 0x40, 0x0, 0x2, 0x20, 0xffffffe0, 0x100, 0x1, 0x601, 0x3, 0x1, 0x401, 0x7fffffff, 0x5, 0x3, 0x200, 0x8001, 0x101, 0x9, 0x0, 0x1000, 0x2, 0x9, 0x6, 0x4, 0x1ff, 0x401, 0x1, 0xdcf, 0xfe, 0xe44, 0x0, 0x5, 0x89a, 0x80, 0x3, 0x9, 0x7fff, 0x6, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3], 0x16, ['/dev/loop#\x00', '/dev/loop#\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x438}, 0x1, 0x0, 0x0, 0x88b4}, 0x480c4) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x9, 0x2c24c0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000840)={0x3216, 0x100000001, 0x8, 0xc266}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0xbde5, 0xbf, 0xafa, 0x800, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4, 0xd}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a40)={r2, &(0x7f0000000900)="78dee0e489793816ec84ba173c78663054b9a8db80cd4b8a5eb8c99d81a2169eb8d7e1366c5a9118af65abef2455ffe0d6b7622d8c85ea69796102d6db8ba808be998aff5d8d973d9c37e44c66867eade0bfd8015d61f804123e104edf1f092e6effbec23ebc6a27852f0e34ccfed9", &(0x7f0000000980)=@buf="d1ac4e15aacf11e696771bd3afcf45bdd733580fe5b8c129f1af7e1cbfcbc1396e968ad112e616192011974a258a89e9ed31c688067d0148b63dab817484c4e1f82b257c858b9116e8757591a03d33a4d8ab444cbd77f91ca147c03e626688d8b6ba7c4058806b2229fca459660f8189802b86a1cce78899c82953aa7a016f76da0b057b461e60f083eb7b55fc86bbf714107dfcdc9765a9e2582a79d69b4b44a45a52045b59", 0x4}, 0x20) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000a80)={0x1f, 0x1b7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=@ipv4_getnexthop={0x2c, 0x6a, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x4800) r3 = getpgrp(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000bc0)='ns/time\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c00), 0x101000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000c40)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x94, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xff, 0x1f}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}]}, 0x94}, 0x1, 0x0, 0x0, 0x44084}, 0x4000000) syz_clone(0x6200a100, &(0x7f0000000e00)="b75705726f985ac68a0af625268ee05996c76b7051f1aa020981446b4bc81a54410155f350eb2a524c2bb2c660cd4bb3ebc5141101bd9d964a96c2c443da7fbd5c7a1094ef1c752a1fa492667958355e28bd746dceb9dda8ea4087aa6155e4b854d95a644b17e0a08b2d03c52a7a8a152b7329e8b60a068caaff713ed158b400d0cc93d978ee920d9fa78601f25f92a2215ab88624fe175b56694e5b15588c5572b90ca1e3b26c6fd75f27e5026531ec7323b5f2a1d62ebb142ba20883c8689e73d014dc403f0576972a7f81bd4319ee73cf0d96a707b3700c8f1701d5202dfc044d1f28729854be721129822f4d520e427d5d", 0xf3, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="be18c14ef67ab28965b53ce1ab80ddbc0736819a9636a12f3900df8d47adddd8b805ed8884ac8fb0a2154cf52262b39e579725a19c9901dad8ddd6cd5f5cfeaa7583a25523ca4b25838fb73a39576b4b43163174a351") r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001640)) [ 135.918784][ T5653] binder: 5652:5653 ioctl 40046205 0 returned -22 20:20:46 executing program 1: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x5) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x2002) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f00000000c0), 0x2, 0x410800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0x1, &(0x7f0000000100)="4066dc829b8fbcadc8e52b141a528aae1c21b4fb2eb906105a4d009debdd8011331090f54c46c52b54f44143c4f2dbfacce6c423ed25b407e8fdb9239b463c68cab0dc0dbfa6a1042df475799d4c827f3557907c1ace3aae70211cb2f5e5a021422f2924f3db37cc97138dc5ccd9c136ebb996d3545938415313923b9ffffcaee2f011d283bd52da7704d461a912968743d75fdaaaa9c69ae41765ff3a8b84dd5c4509d02fddfbbe6dbb7c019858c43eb9afa31e5f2247bac26c8f5cc575927074f751b29fb673fc0e", &(0x7f0000000200)=@udp6, 0x1}, 0x20) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000280)=0xff) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000002c0)={0x8, {0x7, 0xa3ef, 0x3f, 0x0, 0x2, 0x3}}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x11) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x300, 0x70bd2d, 0xffffff83, {0x4, 0x1, 0x5, [0x6, 0x5, 0x5, 0x10000, 0x0, 0x1, 0x5, 0x6, 0x7, 0x9, 0x4, 0x91c7, 0x3f, 0x81, 0x6c95, 0x0, 0xffff, 0x1, 0x200, 0xc5, 0x401, 0x800, 0x8, 0x80000001, 0x2, 0xac0c, 0xfc6, 0x3, 0x7, 0x400, 0x7fff, 0x6, 0x7fff, 0x5, 0x2, 0x10000, 0x81, 0x5867, 0x100, 0x0, 0xffffffff, 0x2, 0x800, 0x1, 0x182, 0x7, 0x16, 0x4, 0x6, 0x6212, 0x0, 0x1, 0xffffffe1, 0x8001, 0xffff, 0x0, 0x81, 0x8, 0x0, 0x101, 0x400, 0xfffffffd, 0x5], [0x10001, 0x800, 0x9, 0x10001, 0x0, 0xf2, 0x64d, 0xca5, 0x5, 0x4, 0xffffffff, 0x9, 0x0, 0xfffffff8, 0x400, 0xffffffff, 0x8, 0x81, 0x0, 0x836, 0xffff, 0x4, 0x1, 0xffff, 0x7, 0x1, 0x70000000, 0x80000001, 0x80000001, 0x3e566ffd, 0x2, 0x5, 0x0, 0xe199, 0x101, 0x20, 0xab94, 0x8020000, 0x0, 0xff, 0x1, 0x80000001, 0x1d31, 0x3, 0x884, 0x5, 0x7, 0x5, 0x8, 0x6, 0x1, 0x3, 0x7, 0xfffffe01, 0xfd6f, 0xffff4337, 0x5, 0x7f, 0x739acb7a, 0x68c3, 0x8, 0xc0, 0x9a2, 0x2], [0x2, 0x80000000, 0xd473, 0x5, 0xfffff801, 0x0, 0x81, 0x901, 0x7, 0xa4, 0x8, 0x7, 0x3a, 0x1, 0x2, 0xfff, 0x5, 0xffffffff, 0x8, 0x3, 0x4, 0x2, 0x3f, 0x0, 0xfffffff8, 0x8, 0x4, 0x6, 0x6, 0x4, 0xc6, 0x4ba, 0x385146b, 0x4, 0x1, 0x81, 0xb6, 0x7, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x6, 0x0, 0x7, 0x5, 0x9, 0x6, 0x1bf15fba, 0x3, 0x7fff, 0x9, 0xfffffffb, 0x2, 0x9, 0xff, 0x9a, 0x7fff, 0x6, 0x3, 0x1, 0x2, 0x1f], [0x4, 0x1000, 0x0, 0x80000000, 0x4, 0x6, 0x542, 0x100, 0x8001, 0x87, 0x4, 0x0, 0x99, 0x1, 0x0, 0x20, 0xdab6, 0x9, 0x40, 0x0, 0x2, 0x20, 0xffffffe0, 0x100, 0x1, 0x601, 0x3, 0x1, 0x401, 0x7fffffff, 0x5, 0x3, 0x200, 0x8001, 0x101, 0x9, 0x0, 0x1000, 0x2, 0x9, 0x6, 0x4, 0x1ff, 0x401, 0x1, 0xdcf, 0xfe, 0xe44, 0x0, 0x5, 0x89a, 0x80, 0x3, 0x9, 0x7fff, 0x6, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3], 0x16, ['/dev/loop#\x00', '/dev/loop#\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x438}, 0x1, 0x0, 0x0, 0x88b4}, 0x480c4) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x9, 0x2c24c0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000840)={0x3216, 0x100000001, 0x8, 0xc266}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0xbde5, 0xbf, 0xafa, 0x800, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4, 0xd}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a40)={r2, &(0x7f0000000900)="78dee0e489793816ec84ba173c78663054b9a8db80cd4b8a5eb8c99d81a2169eb8d7e1366c5a9118af65abef2455ffe0d6b7622d8c85ea69796102d6db8ba808be998aff5d8d973d9c37e44c66867eade0bfd8015d61f804123e104edf1f092e6effbec23ebc6a27852f0e34ccfed9", &(0x7f0000000980)=@buf="d1ac4e15aacf11e696771bd3afcf45bdd733580fe5b8c129f1af7e1cbfcbc1396e968ad112e616192011974a258a89e9ed31c688067d0148b63dab817484c4e1f82b257c858b9116e8757591a03d33a4d8ab444cbd77f91ca147c03e626688d8b6ba7c4058806b2229fca459660f8189802b86a1cce78899c82953aa7a016f76da0b057b461e60f083eb7b55fc86bbf714107dfcdc9765a9e2582a79d69b4b44a45a52045b59", 0x4}, 0x20) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000a80)={0x1f, 0x1b7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=@ipv4_getnexthop={0x2c, 0x6a, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x4800) r3 = getpgrp(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000bc0)='ns/time\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c00), 0x101000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000c40)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x94, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xff, 0x1f}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}]}, 0x94}, 0x1, 0x0, 0x0, 0x44084}, 0x4000000) syz_clone(0x6200a100, &(0x7f0000000e00)="b75705726f985ac68a0af625268ee05996c76b7051f1aa020981446b4bc81a54410155f350eb2a524c2bb2c660cd4bb3ebc5141101bd9d964a96c2c443da7fbd5c7a1094ef1c752a1fa492667958355e28bd746dceb9dda8ea4087aa6155e4b854d95a644b17e0a08b2d03c52a7a8a152b7329e8b60a068caaff713ed158b400d0cc93d978ee920d9fa78601f25f92a2215ab88624fe175b56694e5b15588c5572b90ca1e3b26c6fd75f27e5026531ec7323b5f2a1d62ebb142ba20883c8689e73d014dc403f0576972a7f81bd4319ee73cf0d96a707b3700c8f1701d5202dfc044d1f28729854be721129822f4d520e427d5d", 0xf3, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="be18c14ef67ab28965b53ce1ab80ddbc0736819a9636a12f3900df8d47adddd8b805ed8884ac8fb0a2154cf52262b39e579725a19c9901dad8ddd6cd5f5cfeaa7583a25523ca4b25838fb73a39576b4b43163174a351") r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001640)) 20:20:46 executing program 0: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x5) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x2002) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f00000000c0), 0x2, 0x410800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0x1, &(0x7f0000000100)="4066dc829b8fbcadc8e52b141a528aae1c21b4fb2eb906105a4d009debdd8011331090f54c46c52b54f44143c4f2dbfacce6c423ed25b407e8fdb9239b463c68cab0dc0dbfa6a1042df475799d4c827f3557907c1ace3aae70211cb2f5e5a021422f2924f3db37cc97138dc5ccd9c136ebb996d3545938415313923b9ffffcaee2f011d283bd52da7704d461a912968743d75fdaaaa9c69ae41765ff3a8b84dd5c4509d02fddfbbe6dbb7c019858c43eb9afa31e5f2247bac26c8f5cc575927074f751b29fb673fc0e", &(0x7f0000000200)=@udp6, 0x1}, 0x20) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000280)=0xff) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000002c0)={0x8, {0x7, 0xa3ef, 0x3f, 0x0, 0x2, 0x3}}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x11) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x300, 0x70bd2d, 0xffffff83, {0x4, 0x1, 0x5, [0x6, 0x5, 0x5, 0x10000, 0x0, 0x1, 0x5, 0x6, 0x7, 0x9, 0x4, 0x91c7, 0x3f, 0x81, 0x6c95, 0x0, 0xffff, 0x1, 0x200, 0xc5, 0x401, 0x800, 0x8, 0x80000001, 0x2, 0xac0c, 0xfc6, 0x3, 0x7, 0x400, 0x7fff, 0x6, 0x7fff, 0x5, 0x2, 0x10000, 0x81, 0x5867, 0x100, 0x0, 0xffffffff, 0x2, 0x800, 0x1, 0x182, 0x7, 0x16, 0x4, 0x6, 0x6212, 0x0, 0x1, 0xffffffe1, 0x8001, 0xffff, 0x0, 0x81, 0x8, 0x0, 0x101, 0x400, 0xfffffffd, 0x5], [0x10001, 0x800, 0x9, 0x10001, 0x0, 0xf2, 0x64d, 0xca5, 0x5, 0x4, 0xffffffff, 0x9, 0x0, 0xfffffff8, 0x400, 0xffffffff, 0x8, 0x81, 0x0, 0x836, 0xffff, 0x4, 0x1, 0xffff, 0x7, 0x1, 0x70000000, 0x80000001, 0x80000001, 0x3e566ffd, 0x2, 0x5, 0x0, 0xe199, 0x101, 0x20, 0xab94, 0x8020000, 0x0, 0xff, 0x1, 0x80000001, 0x1d31, 0x3, 0x884, 0x5, 0x7, 0x5, 0x8, 0x6, 0x1, 0x3, 0x7, 0xfffffe01, 0xfd6f, 0xffff4337, 0x5, 0x7f, 0x739acb7a, 0x68c3, 0x8, 0xc0, 0x9a2, 0x2], [0x2, 0x80000000, 0xd473, 0x5, 0xfffff801, 0x0, 0x81, 0x901, 0x7, 0xa4, 0x8, 0x7, 0x3a, 0x1, 0x2, 0xfff, 0x5, 0xffffffff, 0x8, 0x3, 0x4, 0x2, 0x3f, 0x0, 0xfffffff8, 0x8, 0x4, 0x6, 0x6, 0x4, 0xc6, 0x4ba, 0x385146b, 0x4, 0x1, 0x81, 0xb6, 0x7, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x6, 0x0, 0x7, 0x5, 0x9, 0x6, 0x1bf15fba, 0x3, 0x7fff, 0x9, 0xfffffffb, 0x2, 0x9, 0xff, 0x9a, 0x7fff, 0x6, 0x3, 0x1, 0x2, 0x1f], [0x4, 0x1000, 0x0, 0x80000000, 0x4, 0x6, 0x542, 0x100, 0x8001, 0x87, 0x4, 0x0, 0x99, 0x1, 0x0, 0x20, 0xdab6, 0x9, 0x40, 0x0, 0x2, 0x20, 0xffffffe0, 0x100, 0x1, 0x601, 0x3, 0x1, 0x401, 0x7fffffff, 0x5, 0x3, 0x200, 0x8001, 0x101, 0x9, 0x0, 0x1000, 0x2, 0x9, 0x6, 0x4, 0x1ff, 0x401, 0x1, 0xdcf, 0xfe, 0xe44, 0x0, 0x5, 0x89a, 0x80, 0x3, 0x9, 0x7fff, 0x6, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3], 0x16, ['/dev/loop#\x00', '/dev/loop#\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x438}, 0x1, 0x0, 0x0, 0x88b4}, 0x480c4) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x9, 0x2c24c0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000840)={0x3216, 0x100000001, 0x8, 0xc266}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0xbde5, 0xbf, 0xafa, 0x800, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4, 0xd}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a40)={r2, &(0x7f0000000900)="78dee0e489793816ec84ba173c78663054b9a8db80cd4b8a5eb8c99d81a2169eb8d7e1366c5a9118af65abef2455ffe0d6b7622d8c85ea69796102d6db8ba808be998aff5d8d973d9c37e44c66867eade0bfd8015d61f804123e104edf1f092e6effbec23ebc6a27852f0e34ccfed9", &(0x7f0000000980)=@buf="d1ac4e15aacf11e696771bd3afcf45bdd733580fe5b8c129f1af7e1cbfcbc1396e968ad112e616192011974a258a89e9ed31c688067d0148b63dab817484c4e1f82b257c858b9116e8757591a03d33a4d8ab444cbd77f91ca147c03e626688d8b6ba7c4058806b2229fca459660f8189802b86a1cce78899c82953aa7a016f76da0b057b461e60f083eb7b55fc86bbf714107dfcdc9765a9e2582a79d69b4b44a45a52045b59", 0x4}, 0x20) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000a80)={0x1f, 0x1b7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=@ipv4_getnexthop={0x2c, 0x6a, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x4800) r3 = getpgrp(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000bc0)='ns/time\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c00), 0x101000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000c40)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x94, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xff, 0x1f}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}]}, 0x94}, 0x1, 0x0, 0x0, 0x44084}, 0x4000000) syz_clone(0x6200a100, &(0x7f0000000e00)="b75705726f985ac68a0af625268ee05996c76b7051f1aa020981446b4bc81a54410155f350eb2a524c2bb2c660cd4bb3ebc5141101bd9d964a96c2c443da7fbd5c7a1094ef1c752a1fa492667958355e28bd746dceb9dda8ea4087aa6155e4b854d95a644b17e0a08b2d03c52a7a8a152b7329e8b60a068caaff713ed158b400d0cc93d978ee920d9fa78601f25f92a2215ab88624fe175b56694e5b15588c5572b90ca1e3b26c6fd75f27e5026531ec7323b5f2a1d62ebb142ba20883c8689e73d014dc403f0576972a7f81bd4319ee73cf0d96a707b3700c8f1701d5202dfc044d1f28729854be721129822f4d520e427d5d", 0xf3, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="be18c14ef67ab28965b53ce1ab80ddbc0736819a9636a12f3900df8d47adddd8b805ed8884ac8fb0a2154cf52262b39e579725a19c9901dad8ddd6cd5f5cfeaa7583a25523ca4b25838fb73a39576b4b43163174a351") r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001640)) 20:20:46 executing program 5: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x40046205, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x4, 0x0, &(0x7f0000000200)=[@enter_looper], 0x1, 0x0, &(0x7f0000000240)="bd"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000280)="da"}) [ 136.278090][ T5669] binder: 5667:5669 ioctl 40046205 0 returned -22 20:20:46 executing program 2: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x40046205, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x4, 0x0, &(0x7f0000000200)=[@enter_looper], 0x1, 0x0, &(0x7f0000000240)="bd"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000280)="da"}) 20:20:47 executing program 3: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x40046205, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x4, 0x0, &(0x7f0000000200)=[@enter_looper], 0x1, 0x0, &(0x7f0000000240)="bd"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000280)="da"}) [ 136.439043][ T5673] binder: 5672:5673 ioctl 40046205 0 returned -22 20:20:47 executing program 0: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x5) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x2002) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f00000000c0), 0x2, 0x410800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0x1, &(0x7f0000000100)="4066dc829b8fbcadc8e52b141a528aae1c21b4fb2eb906105a4d009debdd8011331090f54c46c52b54f44143c4f2dbfacce6c423ed25b407e8fdb9239b463c68cab0dc0dbfa6a1042df475799d4c827f3557907c1ace3aae70211cb2f5e5a021422f2924f3db37cc97138dc5ccd9c136ebb996d3545938415313923b9ffffcaee2f011d283bd52da7704d461a912968743d75fdaaaa9c69ae41765ff3a8b84dd5c4509d02fddfbbe6dbb7c019858c43eb9afa31e5f2247bac26c8f5cc575927074f751b29fb673fc0e", &(0x7f0000000200)=@udp6, 0x1}, 0x20) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000280)=0xff) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000002c0)={0x8, {0x7, 0xa3ef, 0x3f, 0x0, 0x2, 0x3}}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x11) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x300, 0x70bd2d, 0xffffff83, {0x4, 0x1, 0x5, [0x6, 0x5, 0x5, 0x10000, 0x0, 0x1, 0x5, 0x6, 0x7, 0x9, 0x4, 0x91c7, 0x3f, 0x81, 0x6c95, 0x0, 0xffff, 0x1, 0x200, 0xc5, 0x401, 0x800, 0x8, 0x80000001, 0x2, 0xac0c, 0xfc6, 0x3, 0x7, 0x400, 0x7fff, 0x6, 0x7fff, 0x5, 0x2, 0x10000, 0x81, 0x5867, 0x100, 0x0, 0xffffffff, 0x2, 0x800, 0x1, 0x182, 0x7, 0x16, 0x4, 0x6, 0x6212, 0x0, 0x1, 0xffffffe1, 0x8001, 0xffff, 0x0, 0x81, 0x8, 0x0, 0x101, 0x400, 0xfffffffd, 0x5], [0x10001, 0x800, 0x9, 0x10001, 0x0, 0xf2, 0x64d, 0xca5, 0x5, 0x4, 0xffffffff, 0x9, 0x0, 0xfffffff8, 0x400, 0xffffffff, 0x8, 0x81, 0x0, 0x836, 0xffff, 0x4, 0x1, 0xffff, 0x7, 0x1, 0x70000000, 0x80000001, 0x80000001, 0x3e566ffd, 0x2, 0x5, 0x0, 0xe199, 0x101, 0x20, 0xab94, 0x8020000, 0x0, 0xff, 0x1, 0x80000001, 0x1d31, 0x3, 0x884, 0x5, 0x7, 0x5, 0x8, 0x6, 0x1, 0x3, 0x7, 0xfffffe01, 0xfd6f, 0xffff4337, 0x5, 0x7f, 0x739acb7a, 0x68c3, 0x8, 0xc0, 0x9a2, 0x2], [0x2, 0x80000000, 0xd473, 0x5, 0xfffff801, 0x0, 0x81, 0x901, 0x7, 0xa4, 0x8, 0x7, 0x3a, 0x1, 0x2, 0xfff, 0x5, 0xffffffff, 0x8, 0x3, 0x4, 0x2, 0x3f, 0x0, 0xfffffff8, 0x8, 0x4, 0x6, 0x6, 0x4, 0xc6, 0x4ba, 0x385146b, 0x4, 0x1, 0x81, 0xb6, 0x7, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x6, 0x0, 0x7, 0x5, 0x9, 0x6, 0x1bf15fba, 0x3, 0x7fff, 0x9, 0xfffffffb, 0x2, 0x9, 0xff, 0x9a, 0x7fff, 0x6, 0x3, 0x1, 0x2, 0x1f], [0x4, 0x1000, 0x0, 0x80000000, 0x4, 0x6, 0x542, 0x100, 0x8001, 0x87, 0x4, 0x0, 0x99, 0x1, 0x0, 0x20, 0xdab6, 0x9, 0x40, 0x0, 0x2, 0x20, 0xffffffe0, 0x100, 0x1, 0x601, 0x3, 0x1, 0x401, 0x7fffffff, 0x5, 0x3, 0x200, 0x8001, 0x101, 0x9, 0x0, 0x1000, 0x2, 0x9, 0x6, 0x4, 0x1ff, 0x401, 0x1, 0xdcf, 0xfe, 0xe44, 0x0, 0x5, 0x89a, 0x80, 0x3, 0x9, 0x7fff, 0x6, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3], 0x16, ['/dev/loop#\x00', '/dev/loop#\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x438}, 0x1, 0x0, 0x0, 0x88b4}, 0x480c4) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x9, 0x2c24c0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000840)={0x3216, 0x100000001, 0x8, 0xc266}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0xbde5, 0xbf, 0xafa, 0x800, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4, 0xd}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a40)={r2, &(0x7f0000000900)="78dee0e489793816ec84ba173c78663054b9a8db80cd4b8a5eb8c99d81a2169eb8d7e1366c5a9118af65abef2455ffe0d6b7622d8c85ea69796102d6db8ba808be998aff5d8d973d9c37e44c66867eade0bfd8015d61f804123e104edf1f092e6effbec23ebc6a27852f0e34ccfed9", &(0x7f0000000980)=@buf="d1ac4e15aacf11e696771bd3afcf45bdd733580fe5b8c129f1af7e1cbfcbc1396e968ad112e616192011974a258a89e9ed31c688067d0148b63dab817484c4e1f82b257c858b9116e8757591a03d33a4d8ab444cbd77f91ca147c03e626688d8b6ba7c4058806b2229fca459660f8189802b86a1cce78899c82953aa7a016f76da0b057b461e60f083eb7b55fc86bbf714107dfcdc9765a9e2582a79d69b4b44a45a52045b59", 0x4}, 0x20) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000a80)={0x1f, 0x1b7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=@ipv4_getnexthop={0x2c, 0x6a, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x4800) r3 = getpgrp(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000bc0)='ns/time\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c00), 0x101000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000c40)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x94, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xff, 0x1f}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}]}, 0x94}, 0x1, 0x0, 0x0, 0x44084}, 0x4000000) syz_clone(0x6200a100, &(0x7f0000000e00)="b75705726f985ac68a0af625268ee05996c76b7051f1aa020981446b4bc81a54410155f350eb2a524c2bb2c660cd4bb3ebc5141101bd9d964a96c2c443da7fbd5c7a1094ef1c752a1fa492667958355e28bd746dceb9dda8ea4087aa6155e4b854d95a644b17e0a08b2d03c52a7a8a152b7329e8b60a068caaff713ed158b400d0cc93d978ee920d9fa78601f25f92a2215ab88624fe175b56694e5b15588c5572b90ca1e3b26c6fd75f27e5026531ec7323b5f2a1d62ebb142ba20883c8689e73d014dc403f0576972a7f81bd4319ee73cf0d96a707b3700c8f1701d5202dfc044d1f28729854be721129822f4d520e427d5d", 0xf3, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="be18c14ef67ab28965b53ce1ab80ddbc0736819a9636a12f3900df8d47adddd8b805ed8884ac8fb0a2154cf52262b39e579725a19c9901dad8ddd6cd5f5cfeaa7583a25523ca4b25838fb73a39576b4b43163174a351") r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001640)) [ 136.491354][ T5675] binder: 5674:5675 ioctl 40046205 0 returned -22 20:20:47 executing program 1: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x5) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x2002) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f00000000c0), 0x2, 0x410800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0x1, &(0x7f0000000100)="4066dc829b8fbcadc8e52b141a528aae1c21b4fb2eb906105a4d009debdd8011331090f54c46c52b54f44143c4f2dbfacce6c423ed25b407e8fdb9239b463c68cab0dc0dbfa6a1042df475799d4c827f3557907c1ace3aae70211cb2f5e5a021422f2924f3db37cc97138dc5ccd9c136ebb996d3545938415313923b9ffffcaee2f011d283bd52da7704d461a912968743d75fdaaaa9c69ae41765ff3a8b84dd5c4509d02fddfbbe6dbb7c019858c43eb9afa31e5f2247bac26c8f5cc575927074f751b29fb673fc0e", &(0x7f0000000200)=@udp6, 0x1}, 0x20) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000280)=0xff) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000002c0)={0x8, {0x7, 0xa3ef, 0x3f, 0x0, 0x2, 0x3}}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x11) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x300, 0x70bd2d, 0xffffff83, {0x4, 0x1, 0x5, [0x6, 0x5, 0x5, 0x10000, 0x0, 0x1, 0x5, 0x6, 0x7, 0x9, 0x4, 0x91c7, 0x3f, 0x81, 0x6c95, 0x0, 0xffff, 0x1, 0x200, 0xc5, 0x401, 0x800, 0x8, 0x80000001, 0x2, 0xac0c, 0xfc6, 0x3, 0x7, 0x400, 0x7fff, 0x6, 0x7fff, 0x5, 0x2, 0x10000, 0x81, 0x5867, 0x100, 0x0, 0xffffffff, 0x2, 0x800, 0x1, 0x182, 0x7, 0x16, 0x4, 0x6, 0x6212, 0x0, 0x1, 0xffffffe1, 0x8001, 0xffff, 0x0, 0x81, 0x8, 0x0, 0x101, 0x400, 0xfffffffd, 0x5], [0x10001, 0x800, 0x9, 0x10001, 0x0, 0xf2, 0x64d, 0xca5, 0x5, 0x4, 0xffffffff, 0x9, 0x0, 0xfffffff8, 0x400, 0xffffffff, 0x8, 0x81, 0x0, 0x836, 0xffff, 0x4, 0x1, 0xffff, 0x7, 0x1, 0x70000000, 0x80000001, 0x80000001, 0x3e566ffd, 0x2, 0x5, 0x0, 0xe199, 0x101, 0x20, 0xab94, 0x8020000, 0x0, 0xff, 0x1, 0x80000001, 0x1d31, 0x3, 0x884, 0x5, 0x7, 0x5, 0x8, 0x6, 0x1, 0x3, 0x7, 0xfffffe01, 0xfd6f, 0xffff4337, 0x5, 0x7f, 0x739acb7a, 0x68c3, 0x8, 0xc0, 0x9a2, 0x2], [0x2, 0x80000000, 0xd473, 0x5, 0xfffff801, 0x0, 0x81, 0x901, 0x7, 0xa4, 0x8, 0x7, 0x3a, 0x1, 0x2, 0xfff, 0x5, 0xffffffff, 0x8, 0x3, 0x4, 0x2, 0x3f, 0x0, 0xfffffff8, 0x8, 0x4, 0x6, 0x6, 0x4, 0xc6, 0x4ba, 0x385146b, 0x4, 0x1, 0x81, 0xb6, 0x7, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x6, 0x0, 0x7, 0x5, 0x9, 0x6, 0x1bf15fba, 0x3, 0x7fff, 0x9, 0xfffffffb, 0x2, 0x9, 0xff, 0x9a, 0x7fff, 0x6, 0x3, 0x1, 0x2, 0x1f], [0x4, 0x1000, 0x0, 0x80000000, 0x4, 0x6, 0x542, 0x100, 0x8001, 0x87, 0x4, 0x0, 0x99, 0x1, 0x0, 0x20, 0xdab6, 0x9, 0x40, 0x0, 0x2, 0x20, 0xffffffe0, 0x100, 0x1, 0x601, 0x3, 0x1, 0x401, 0x7fffffff, 0x5, 0x3, 0x200, 0x8001, 0x101, 0x9, 0x0, 0x1000, 0x2, 0x9, 0x6, 0x4, 0x1ff, 0x401, 0x1, 0xdcf, 0xfe, 0xe44, 0x0, 0x5, 0x89a, 0x80, 0x3, 0x9, 0x7fff, 0x6, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3], 0x16, ['/dev/loop#\x00', '/dev/loop#\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x438}, 0x1, 0x0, 0x0, 0x88b4}, 0x480c4) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x9, 0x2c24c0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000840)={0x3216, 0x100000001, 0x8, 0xc266}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0xbde5, 0xbf, 0xafa, 0x800, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4, 0xd}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a40)={r2, &(0x7f0000000900)="78dee0e489793816ec84ba173c78663054b9a8db80cd4b8a5eb8c99d81a2169eb8d7e1366c5a9118af65abef2455ffe0d6b7622d8c85ea69796102d6db8ba808be998aff5d8d973d9c37e44c66867eade0bfd8015d61f804123e104edf1f092e6effbec23ebc6a27852f0e34ccfed9", &(0x7f0000000980)=@buf="d1ac4e15aacf11e696771bd3afcf45bdd733580fe5b8c129f1af7e1cbfcbc1396e968ad112e616192011974a258a89e9ed31c688067d0148b63dab817484c4e1f82b257c858b9116e8757591a03d33a4d8ab444cbd77f91ca147c03e626688d8b6ba7c4058806b2229fca459660f8189802b86a1cce78899c82953aa7a016f76da0b057b461e60f083eb7b55fc86bbf714107dfcdc9765a9e2582a79d69b4b44a45a52045b59", 0x4}, 0x20) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000a80)={0x1f, 0x1b7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=@ipv4_getnexthop={0x2c, 0x6a, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x4800) r3 = getpgrp(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000bc0)='ns/time\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c00), 0x101000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000c40)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x94, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xff, 0x1f}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}]}, 0x94}, 0x1, 0x0, 0x0, 0x44084}, 0x4000000) syz_clone(0x6200a100, &(0x7f0000000e00)="b75705726f985ac68a0af625268ee05996c76b7051f1aa020981446b4bc81a54410155f350eb2a524c2bb2c660cd4bb3ebc5141101bd9d964a96c2c443da7fbd5c7a1094ef1c752a1fa492667958355e28bd746dceb9dda8ea4087aa6155e4b854d95a644b17e0a08b2d03c52a7a8a152b7329e8b60a068caaff713ed158b400d0cc93d978ee920d9fa78601f25f92a2215ab88624fe175b56694e5b15588c5572b90ca1e3b26c6fd75f27e5026531ec7323b5f2a1d62ebb142ba20883c8689e73d014dc403f0576972a7f81bd4319ee73cf0d96a707b3700c8f1701d5202dfc044d1f28729854be721129822f4d520e427d5d", 0xf3, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="be18c14ef67ab28965b53ce1ab80ddbc0736819a9636a12f3900df8d47adddd8b805ed8884ac8fb0a2154cf52262b39e579725a19c9901dad8ddd6cd5f5cfeaa7583a25523ca4b25838fb73a39576b4b43163174a351") r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001640)) 20:20:47 executing program 4: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x40046205, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x4, 0x0, &(0x7f0000000200)=[@enter_looper], 0x1, 0x0, &(0x7f0000000240)="bd"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000280)="da"}) [ 136.895645][ T5688] binder: 5687:5688 ioctl 40046205 0 returned -22 20:20:47 executing program 0: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x5) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x2002) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f00000000c0), 0x2, 0x410800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0x1, &(0x7f0000000100)="4066dc829b8fbcadc8e52b141a528aae1c21b4fb2eb906105a4d009debdd8011331090f54c46c52b54f44143c4f2dbfacce6c423ed25b407e8fdb9239b463c68cab0dc0dbfa6a1042df475799d4c827f3557907c1ace3aae70211cb2f5e5a021422f2924f3db37cc97138dc5ccd9c136ebb996d3545938415313923b9ffffcaee2f011d283bd52da7704d461a912968743d75fdaaaa9c69ae41765ff3a8b84dd5c4509d02fddfbbe6dbb7c019858c43eb9afa31e5f2247bac26c8f5cc575927074f751b29fb673fc0e", &(0x7f0000000200)=@udp6, 0x1}, 0x20) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000280)=0xff) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000002c0)={0x8, {0x7, 0xa3ef, 0x3f, 0x0, 0x2, 0x3}}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x11) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x300, 0x70bd2d, 0xffffff83, {0x4, 0x1, 0x5, [0x6, 0x5, 0x5, 0x10000, 0x0, 0x1, 0x5, 0x6, 0x7, 0x9, 0x4, 0x91c7, 0x3f, 0x81, 0x6c95, 0x0, 0xffff, 0x1, 0x200, 0xc5, 0x401, 0x800, 0x8, 0x80000001, 0x2, 0xac0c, 0xfc6, 0x3, 0x7, 0x400, 0x7fff, 0x6, 0x7fff, 0x5, 0x2, 0x10000, 0x81, 0x5867, 0x100, 0x0, 0xffffffff, 0x2, 0x800, 0x1, 0x182, 0x7, 0x16, 0x4, 0x6, 0x6212, 0x0, 0x1, 0xffffffe1, 0x8001, 0xffff, 0x0, 0x81, 0x8, 0x0, 0x101, 0x400, 0xfffffffd, 0x5], [0x10001, 0x800, 0x9, 0x10001, 0x0, 0xf2, 0x64d, 0xca5, 0x5, 0x4, 0xffffffff, 0x9, 0x0, 0xfffffff8, 0x400, 0xffffffff, 0x8, 0x81, 0x0, 0x836, 0xffff, 0x4, 0x1, 0xffff, 0x7, 0x1, 0x70000000, 0x80000001, 0x80000001, 0x3e566ffd, 0x2, 0x5, 0x0, 0xe199, 0x101, 0x20, 0xab94, 0x8020000, 0x0, 0xff, 0x1, 0x80000001, 0x1d31, 0x3, 0x884, 0x5, 0x7, 0x5, 0x8, 0x6, 0x1, 0x3, 0x7, 0xfffffe01, 0xfd6f, 0xffff4337, 0x5, 0x7f, 0x739acb7a, 0x68c3, 0x8, 0xc0, 0x9a2, 0x2], [0x2, 0x80000000, 0xd473, 0x5, 0xfffff801, 0x0, 0x81, 0x901, 0x7, 0xa4, 0x8, 0x7, 0x3a, 0x1, 0x2, 0xfff, 0x5, 0xffffffff, 0x8, 0x3, 0x4, 0x2, 0x3f, 0x0, 0xfffffff8, 0x8, 0x4, 0x6, 0x6, 0x4, 0xc6, 0x4ba, 0x385146b, 0x4, 0x1, 0x81, 0xb6, 0x7, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x6, 0x0, 0x7, 0x5, 0x9, 0x6, 0x1bf15fba, 0x3, 0x7fff, 0x9, 0xfffffffb, 0x2, 0x9, 0xff, 0x9a, 0x7fff, 0x6, 0x3, 0x1, 0x2, 0x1f], [0x4, 0x1000, 0x0, 0x80000000, 0x4, 0x6, 0x542, 0x100, 0x8001, 0x87, 0x4, 0x0, 0x99, 0x1, 0x0, 0x20, 0xdab6, 0x9, 0x40, 0x0, 0x2, 0x20, 0xffffffe0, 0x100, 0x1, 0x601, 0x3, 0x1, 0x401, 0x7fffffff, 0x5, 0x3, 0x200, 0x8001, 0x101, 0x9, 0x0, 0x1000, 0x2, 0x9, 0x6, 0x4, 0x1ff, 0x401, 0x1, 0xdcf, 0xfe, 0xe44, 0x0, 0x5, 0x89a, 0x80, 0x3, 0x9, 0x7fff, 0x6, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3], 0x16, ['/dev/loop#\x00', '/dev/loop#\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x438}, 0x1, 0x0, 0x0, 0x88b4}, 0x480c4) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x9, 0x2c24c0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000840)={0x3216, 0x100000001, 0x8, 0xc266}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0xbde5, 0xbf, 0xafa, 0x800, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4, 0xd}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a40)={r2, &(0x7f0000000900)="78dee0e489793816ec84ba173c78663054b9a8db80cd4b8a5eb8c99d81a2169eb8d7e1366c5a9118af65abef2455ffe0d6b7622d8c85ea69796102d6db8ba808be998aff5d8d973d9c37e44c66867eade0bfd8015d61f804123e104edf1f092e6effbec23ebc6a27852f0e34ccfed9", &(0x7f0000000980)=@buf="d1ac4e15aacf11e696771bd3afcf45bdd733580fe5b8c129f1af7e1cbfcbc1396e968ad112e616192011974a258a89e9ed31c688067d0148b63dab817484c4e1f82b257c858b9116e8757591a03d33a4d8ab444cbd77f91ca147c03e626688d8b6ba7c4058806b2229fca459660f8189802b86a1cce78899c82953aa7a016f76da0b057b461e60f083eb7b55fc86bbf714107dfcdc9765a9e2582a79d69b4b44a45a52045b59", 0x4}, 0x20) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000a80)={0x1f, 0x1b7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=@ipv4_getnexthop={0x2c, 0x6a, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x4800) r3 = getpgrp(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000bc0)='ns/time\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c00), 0x101000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000c40)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x94, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xff, 0x1f}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}]}, 0x94}, 0x1, 0x0, 0x0, 0x44084}, 0x4000000) syz_clone(0x6200a100, &(0x7f0000000e00)="b75705726f985ac68a0af625268ee05996c76b7051f1aa020981446b4bc81a54410155f350eb2a524c2bb2c660cd4bb3ebc5141101bd9d964a96c2c443da7fbd5c7a1094ef1c752a1fa492667958355e28bd746dceb9dda8ea4087aa6155e4b854d95a644b17e0a08b2d03c52a7a8a152b7329e8b60a068caaff713ed158b400d0cc93d978ee920d9fa78601f25f92a2215ab88624fe175b56694e5b15588c5572b90ca1e3b26c6fd75f27e5026531ec7323b5f2a1d62ebb142ba20883c8689e73d014dc403f0576972a7f81bd4319ee73cf0d96a707b3700c8f1701d5202dfc044d1f28729854be721129822f4d520e427d5d", 0xf3, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="be18c14ef67ab28965b53ce1ab80ddbc0736819a9636a12f3900df8d47adddd8b805ed8884ac8fb0a2154cf52262b39e579725a19c9901dad8ddd6cd5f5cfeaa7583a25523ca4b25838fb73a39576b4b43163174a351") r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001640)) 20:20:47 executing program 5: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x5) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x2002) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f00000000c0), 0x2, 0x410800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0x1, &(0x7f0000000100)="4066dc829b8fbcadc8e52b141a528aae1c21b4fb2eb906105a4d009debdd8011331090f54c46c52b54f44143c4f2dbfacce6c423ed25b407e8fdb9239b463c68cab0dc0dbfa6a1042df475799d4c827f3557907c1ace3aae70211cb2f5e5a021422f2924f3db37cc97138dc5ccd9c136ebb996d3545938415313923b9ffffcaee2f011d283bd52da7704d461a912968743d75fdaaaa9c69ae41765ff3a8b84dd5c4509d02fddfbbe6dbb7c019858c43eb9afa31e5f2247bac26c8f5cc575927074f751b29fb673fc0e", &(0x7f0000000200)=@udp6, 0x1}, 0x20) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000280)=0xff) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000002c0)={0x8, {0x7, 0xa3ef, 0x3f, 0x0, 0x2, 0x3}}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x11) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x300, 0x70bd2d, 0xffffff83, {0x4, 0x1, 0x5, [0x6, 0x5, 0x5, 0x10000, 0x0, 0x1, 0x5, 0x6, 0x7, 0x9, 0x4, 0x91c7, 0x3f, 0x81, 0x6c95, 0x0, 0xffff, 0x1, 0x200, 0xc5, 0x401, 0x800, 0x8, 0x80000001, 0x2, 0xac0c, 0xfc6, 0x3, 0x7, 0x400, 0x7fff, 0x6, 0x7fff, 0x5, 0x2, 0x10000, 0x81, 0x5867, 0x100, 0x0, 0xffffffff, 0x2, 0x800, 0x1, 0x182, 0x7, 0x16, 0x4, 0x6, 0x6212, 0x0, 0x1, 0xffffffe1, 0x8001, 0xffff, 0x0, 0x81, 0x8, 0x0, 0x101, 0x400, 0xfffffffd, 0x5], [0x10001, 0x800, 0x9, 0x10001, 0x0, 0xf2, 0x64d, 0xca5, 0x5, 0x4, 0xffffffff, 0x9, 0x0, 0xfffffff8, 0x400, 0xffffffff, 0x8, 0x81, 0x0, 0x836, 0xffff, 0x4, 0x1, 0xffff, 0x7, 0x1, 0x70000000, 0x80000001, 0x80000001, 0x3e566ffd, 0x2, 0x5, 0x0, 0xe199, 0x101, 0x20, 0xab94, 0x8020000, 0x0, 0xff, 0x1, 0x80000001, 0x1d31, 0x3, 0x884, 0x5, 0x7, 0x5, 0x8, 0x6, 0x1, 0x3, 0x7, 0xfffffe01, 0xfd6f, 0xffff4337, 0x5, 0x7f, 0x739acb7a, 0x68c3, 0x8, 0xc0, 0x9a2, 0x2], [0x2, 0x80000000, 0xd473, 0x5, 0xfffff801, 0x0, 0x81, 0x901, 0x7, 0xa4, 0x8, 0x7, 0x3a, 0x1, 0x2, 0xfff, 0x5, 0xffffffff, 0x8, 0x3, 0x4, 0x2, 0x3f, 0x0, 0xfffffff8, 0x8, 0x4, 0x6, 0x6, 0x4, 0xc6, 0x4ba, 0x385146b, 0x4, 0x1, 0x81, 0xb6, 0x7, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x6, 0x0, 0x7, 0x5, 0x9, 0x6, 0x1bf15fba, 0x3, 0x7fff, 0x9, 0xfffffffb, 0x2, 0x9, 0xff, 0x9a, 0x7fff, 0x6, 0x3, 0x1, 0x2, 0x1f], [0x4, 0x1000, 0x0, 0x80000000, 0x4, 0x6, 0x542, 0x100, 0x8001, 0x87, 0x4, 0x0, 0x99, 0x1, 0x0, 0x20, 0xdab6, 0x9, 0x40, 0x0, 0x2, 0x20, 0xffffffe0, 0x100, 0x1, 0x601, 0x3, 0x1, 0x401, 0x7fffffff, 0x5, 0x3, 0x200, 0x8001, 0x101, 0x9, 0x0, 0x1000, 0x2, 0x9, 0x6, 0x4, 0x1ff, 0x401, 0x1, 0xdcf, 0xfe, 0xe44, 0x0, 0x5, 0x89a, 0x80, 0x3, 0x9, 0x7fff, 0x6, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3], 0x16, ['/dev/loop#\x00', '/dev/loop#\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x438}, 0x1, 0x0, 0x0, 0x88b4}, 0x480c4) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x9, 0x2c24c0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000840)={0x3216, 0x100000001, 0x8, 0xc266}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0xbde5, 0xbf, 0xafa, 0x800, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4, 0xd}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a40)={r2, &(0x7f0000000900)="78dee0e489793816ec84ba173c78663054b9a8db80cd4b8a5eb8c99d81a2169eb8d7e1366c5a9118af65abef2455ffe0d6b7622d8c85ea69796102d6db8ba808be998aff5d8d973d9c37e44c66867eade0bfd8015d61f804123e104edf1f092e6effbec23ebc6a27852f0e34ccfed9", &(0x7f0000000980)=@buf="d1ac4e15aacf11e696771bd3afcf45bdd733580fe5b8c129f1af7e1cbfcbc1396e968ad112e616192011974a258a89e9ed31c688067d0148b63dab817484c4e1f82b257c858b9116e8757591a03d33a4d8ab444cbd77f91ca147c03e626688d8b6ba7c4058806b2229fca459660f8189802b86a1cce78899c82953aa7a016f76da0b057b461e60f083eb7b55fc86bbf714107dfcdc9765a9e2582a79d69b4b44a45a52045b59", 0x4}, 0x20) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000a80)={0x1f, 0x1b7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=@ipv4_getnexthop={0x2c, 0x6a, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x4800) r3 = getpgrp(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000bc0)='ns/time\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c00), 0x101000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000c40)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x94, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xff, 0x1f}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}]}, 0x94}, 0x1, 0x0, 0x0, 0x44084}, 0x4000000) syz_clone(0x6200a100, &(0x7f0000000e00)="b75705726f985ac68a0af625268ee05996c76b7051f1aa020981446b4bc81a54410155f350eb2a524c2bb2c660cd4bb3ebc5141101bd9d964a96c2c443da7fbd5c7a1094ef1c752a1fa492667958355e28bd746dceb9dda8ea4087aa6155e4b854d95a644b17e0a08b2d03c52a7a8a152b7329e8b60a068caaff713ed158b400d0cc93d978ee920d9fa78601f25f92a2215ab88624fe175b56694e5b15588c5572b90ca1e3b26c6fd75f27e5026531ec7323b5f2a1d62ebb142ba20883c8689e73d014dc403f0576972a7f81bd4319ee73cf0d96a707b3700c8f1701d5202dfc044d1f28729854be721129822f4d520e427d5d", 0xf3, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="be18c14ef67ab28965b53ce1ab80ddbc0736819a9636a12f3900df8d47adddd8b805ed8884ac8fb0a2154cf52262b39e579725a19c9901dad8ddd6cd5f5cfeaa7583a25523ca4b25838fb73a39576b4b43163174a351") r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001640)) 20:20:47 executing program 3: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x5) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x2002) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f00000000c0), 0x2, 0x410800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0x1, &(0x7f0000000100)="4066dc829b8fbcadc8e52b141a528aae1c21b4fb2eb906105a4d009debdd8011331090f54c46c52b54f44143c4f2dbfacce6c423ed25b407e8fdb9239b463c68cab0dc0dbfa6a1042df475799d4c827f3557907c1ace3aae70211cb2f5e5a021422f2924f3db37cc97138dc5ccd9c136ebb996d3545938415313923b9ffffcaee2f011d283bd52da7704d461a912968743d75fdaaaa9c69ae41765ff3a8b84dd5c4509d02fddfbbe6dbb7c019858c43eb9afa31e5f2247bac26c8f5cc575927074f751b29fb673fc0e", &(0x7f0000000200)=@udp6, 0x1}, 0x20) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000280)=0xff) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000002c0)={0x8, {0x7, 0xa3ef, 0x3f, 0x0, 0x2, 0x3}}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x11) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x300, 0x70bd2d, 0xffffff83, {0x4, 0x1, 0x5, [0x6, 0x5, 0x5, 0x10000, 0x0, 0x1, 0x5, 0x6, 0x7, 0x9, 0x4, 0x91c7, 0x3f, 0x81, 0x6c95, 0x0, 0xffff, 0x1, 0x200, 0xc5, 0x401, 0x800, 0x8, 0x80000001, 0x2, 0xac0c, 0xfc6, 0x3, 0x7, 0x400, 0x7fff, 0x6, 0x7fff, 0x5, 0x2, 0x10000, 0x81, 0x5867, 0x100, 0x0, 0xffffffff, 0x2, 0x800, 0x1, 0x182, 0x7, 0x16, 0x4, 0x6, 0x6212, 0x0, 0x1, 0xffffffe1, 0x8001, 0xffff, 0x0, 0x81, 0x8, 0x0, 0x101, 0x400, 0xfffffffd, 0x5], [0x10001, 0x800, 0x9, 0x10001, 0x0, 0xf2, 0x64d, 0xca5, 0x5, 0x4, 0xffffffff, 0x9, 0x0, 0xfffffff8, 0x400, 0xffffffff, 0x8, 0x81, 0x0, 0x836, 0xffff, 0x4, 0x1, 0xffff, 0x7, 0x1, 0x70000000, 0x80000001, 0x80000001, 0x3e566ffd, 0x2, 0x5, 0x0, 0xe199, 0x101, 0x20, 0xab94, 0x8020000, 0x0, 0xff, 0x1, 0x80000001, 0x1d31, 0x3, 0x884, 0x5, 0x7, 0x5, 0x8, 0x6, 0x1, 0x3, 0x7, 0xfffffe01, 0xfd6f, 0xffff4337, 0x5, 0x7f, 0x739acb7a, 0x68c3, 0x8, 0xc0, 0x9a2, 0x2], [0x2, 0x80000000, 0xd473, 0x5, 0xfffff801, 0x0, 0x81, 0x901, 0x7, 0xa4, 0x8, 0x7, 0x3a, 0x1, 0x2, 0xfff, 0x5, 0xffffffff, 0x8, 0x3, 0x4, 0x2, 0x3f, 0x0, 0xfffffff8, 0x8, 0x4, 0x6, 0x6, 0x4, 0xc6, 0x4ba, 0x385146b, 0x4, 0x1, 0x81, 0xb6, 0x7, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x6, 0x0, 0x7, 0x5, 0x9, 0x6, 0x1bf15fba, 0x3, 0x7fff, 0x9, 0xfffffffb, 0x2, 0x9, 0xff, 0x9a, 0x7fff, 0x6, 0x3, 0x1, 0x2, 0x1f], [0x4, 0x1000, 0x0, 0x80000000, 0x4, 0x6, 0x542, 0x100, 0x8001, 0x87, 0x4, 0x0, 0x99, 0x1, 0x0, 0x20, 0xdab6, 0x9, 0x40, 0x0, 0x2, 0x20, 0xffffffe0, 0x100, 0x1, 0x601, 0x3, 0x1, 0x401, 0x7fffffff, 0x5, 0x3, 0x200, 0x8001, 0x101, 0x9, 0x0, 0x1000, 0x2, 0x9, 0x6, 0x4, 0x1ff, 0x401, 0x1, 0xdcf, 0xfe, 0xe44, 0x0, 0x5, 0x89a, 0x80, 0x3, 0x9, 0x7fff, 0x6, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3], 0x16, ['/dev/loop#\x00', '/dev/loop#\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x438}, 0x1, 0x0, 0x0, 0x88b4}, 0x480c4) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x9, 0x2c24c0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000840)={0x3216, 0x100000001, 0x8, 0xc266}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0xbde5, 0xbf, 0xafa, 0x800, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4, 0xd}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a40)={r2, &(0x7f0000000900)="78dee0e489793816ec84ba173c78663054b9a8db80cd4b8a5eb8c99d81a2169eb8d7e1366c5a9118af65abef2455ffe0d6b7622d8c85ea69796102d6db8ba808be998aff5d8d973d9c37e44c66867eade0bfd8015d61f804123e104edf1f092e6effbec23ebc6a27852f0e34ccfed9", &(0x7f0000000980)=@buf="d1ac4e15aacf11e696771bd3afcf45bdd733580fe5b8c129f1af7e1cbfcbc1396e968ad112e616192011974a258a89e9ed31c688067d0148b63dab817484c4e1f82b257c858b9116e8757591a03d33a4d8ab444cbd77f91ca147c03e626688d8b6ba7c4058806b2229fca459660f8189802b86a1cce78899c82953aa7a016f76da0b057b461e60f083eb7b55fc86bbf714107dfcdc9765a9e2582a79d69b4b44a45a52045b59", 0x4}, 0x20) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000a80)={0x1f, 0x1b7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=@ipv4_getnexthop={0x2c, 0x6a, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x4800) r3 = getpgrp(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000bc0)='ns/time\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c00), 0x101000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000c40)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x94, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xff, 0x1f}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}]}, 0x94}, 0x1, 0x0, 0x0, 0x44084}, 0x4000000) syz_clone(0x6200a100, &(0x7f0000000e00)="b75705726f985ac68a0af625268ee05996c76b7051f1aa020981446b4bc81a54410155f350eb2a524c2bb2c660cd4bb3ebc5141101bd9d964a96c2c443da7fbd5c7a1094ef1c752a1fa492667958355e28bd746dceb9dda8ea4087aa6155e4b854d95a644b17e0a08b2d03c52a7a8a152b7329e8b60a068caaff713ed158b400d0cc93d978ee920d9fa78601f25f92a2215ab88624fe175b56694e5b15588c5572b90ca1e3b26c6fd75f27e5026531ec7323b5f2a1d62ebb142ba20883c8689e73d014dc403f0576972a7f81bd4319ee73cf0d96a707b3700c8f1701d5202dfc044d1f28729854be721129822f4d520e427d5d", 0xf3, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="be18c14ef67ab28965b53ce1ab80ddbc0736819a9636a12f3900df8d47adddd8b805ed8884ac8fb0a2154cf52262b39e579725a19c9901dad8ddd6cd5f5cfeaa7583a25523ca4b25838fb73a39576b4b43163174a351") r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001640)) 20:20:47 executing program 0: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x5) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x2002) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f00000000c0), 0x2, 0x410800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0x1, &(0x7f0000000100)="4066dc829b8fbcadc8e52b141a528aae1c21b4fb2eb906105a4d009debdd8011331090f54c46c52b54f44143c4f2dbfacce6c423ed25b407e8fdb9239b463c68cab0dc0dbfa6a1042df475799d4c827f3557907c1ace3aae70211cb2f5e5a021422f2924f3db37cc97138dc5ccd9c136ebb996d3545938415313923b9ffffcaee2f011d283bd52da7704d461a912968743d75fdaaaa9c69ae41765ff3a8b84dd5c4509d02fddfbbe6dbb7c019858c43eb9afa31e5f2247bac26c8f5cc575927074f751b29fb673fc0e", &(0x7f0000000200)=@udp6, 0x1}, 0x20) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000280)=0xff) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000002c0)={0x8, {0x7, 0xa3ef, 0x3f, 0x0, 0x2, 0x3}}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x11) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x300, 0x70bd2d, 0xffffff83, {0x4, 0x1, 0x5, [0x6, 0x5, 0x5, 0x10000, 0x0, 0x1, 0x5, 0x6, 0x7, 0x9, 0x4, 0x91c7, 0x3f, 0x81, 0x6c95, 0x0, 0xffff, 0x1, 0x200, 0xc5, 0x401, 0x800, 0x8, 0x80000001, 0x2, 0xac0c, 0xfc6, 0x3, 0x7, 0x400, 0x7fff, 0x6, 0x7fff, 0x5, 0x2, 0x10000, 0x81, 0x5867, 0x100, 0x0, 0xffffffff, 0x2, 0x800, 0x1, 0x182, 0x7, 0x16, 0x4, 0x6, 0x6212, 0x0, 0x1, 0xffffffe1, 0x8001, 0xffff, 0x0, 0x81, 0x8, 0x0, 0x101, 0x400, 0xfffffffd, 0x5], [0x10001, 0x800, 0x9, 0x10001, 0x0, 0xf2, 0x64d, 0xca5, 0x5, 0x4, 0xffffffff, 0x9, 0x0, 0xfffffff8, 0x400, 0xffffffff, 0x8, 0x81, 0x0, 0x836, 0xffff, 0x4, 0x1, 0xffff, 0x7, 0x1, 0x70000000, 0x80000001, 0x80000001, 0x3e566ffd, 0x2, 0x5, 0x0, 0xe199, 0x101, 0x20, 0xab94, 0x8020000, 0x0, 0xff, 0x1, 0x80000001, 0x1d31, 0x3, 0x884, 0x5, 0x7, 0x5, 0x8, 0x6, 0x1, 0x3, 0x7, 0xfffffe01, 0xfd6f, 0xffff4337, 0x5, 0x7f, 0x739acb7a, 0x68c3, 0x8, 0xc0, 0x9a2, 0x2], [0x2, 0x80000000, 0xd473, 0x5, 0xfffff801, 0x0, 0x81, 0x901, 0x7, 0xa4, 0x8, 0x7, 0x3a, 0x1, 0x2, 0xfff, 0x5, 0xffffffff, 0x8, 0x3, 0x4, 0x2, 0x3f, 0x0, 0xfffffff8, 0x8, 0x4, 0x6, 0x6, 0x4, 0xc6, 0x4ba, 0x385146b, 0x4, 0x1, 0x81, 0xb6, 0x7, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x6, 0x0, 0x7, 0x5, 0x9, 0x6, 0x1bf15fba, 0x3, 0x7fff, 0x9, 0xfffffffb, 0x2, 0x9, 0xff, 0x9a, 0x7fff, 0x6, 0x3, 0x1, 0x2, 0x1f], [0x4, 0x1000, 0x0, 0x80000000, 0x4, 0x6, 0x542, 0x100, 0x8001, 0x87, 0x4, 0x0, 0x99, 0x1, 0x0, 0x20, 0xdab6, 0x9, 0x40, 0x0, 0x2, 0x20, 0xffffffe0, 0x100, 0x1, 0x601, 0x3, 0x1, 0x401, 0x7fffffff, 0x5, 0x3, 0x200, 0x8001, 0x101, 0x9, 0x0, 0x1000, 0x2, 0x9, 0x6, 0x4, 0x1ff, 0x401, 0x1, 0xdcf, 0xfe, 0xe44, 0x0, 0x5, 0x89a, 0x80, 0x3, 0x9, 0x7fff, 0x6, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3], 0x16, ['/dev/loop#\x00', '/dev/loop#\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x438}, 0x1, 0x0, 0x0, 0x88b4}, 0x480c4) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x9, 0x2c24c0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000840)={0x3216, 0x100000001, 0x8, 0xc266}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0xbde5, 0xbf, 0xafa, 0x800, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4, 0xd}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a40)={r2, &(0x7f0000000900)="78dee0e489793816ec84ba173c78663054b9a8db80cd4b8a5eb8c99d81a2169eb8d7e1366c5a9118af65abef2455ffe0d6b7622d8c85ea69796102d6db8ba808be998aff5d8d973d9c37e44c66867eade0bfd8015d61f804123e104edf1f092e6effbec23ebc6a27852f0e34ccfed9", &(0x7f0000000980)=@buf="d1ac4e15aacf11e696771bd3afcf45bdd733580fe5b8c129f1af7e1cbfcbc1396e968ad112e616192011974a258a89e9ed31c688067d0148b63dab817484c4e1f82b257c858b9116e8757591a03d33a4d8ab444cbd77f91ca147c03e626688d8b6ba7c4058806b2229fca459660f8189802b86a1cce78899c82953aa7a016f76da0b057b461e60f083eb7b55fc86bbf714107dfcdc9765a9e2582a79d69b4b44a45a52045b59", 0x4}, 0x20) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000a80)={0x1f, 0x1b7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=@ipv4_getnexthop={0x2c, 0x6a, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x4800) r3 = getpgrp(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000bc0)='ns/time\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c00), 0x101000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000c40)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x94, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xff, 0x1f}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}]}, 0x94}, 0x1, 0x0, 0x0, 0x44084}, 0x4000000) syz_clone(0x6200a100, &(0x7f0000000e00)="b75705726f985ac68a0af625268ee05996c76b7051f1aa020981446b4bc81a54410155f350eb2a524c2bb2c660cd4bb3ebc5141101bd9d964a96c2c443da7fbd5c7a1094ef1c752a1fa492667958355e28bd746dceb9dda8ea4087aa6155e4b854d95a644b17e0a08b2d03c52a7a8a152b7329e8b60a068caaff713ed158b400d0cc93d978ee920d9fa78601f25f92a2215ab88624fe175b56694e5b15588c5572b90ca1e3b26c6fd75f27e5026531ec7323b5f2a1d62ebb142ba20883c8689e73d014dc403f0576972a7f81bd4319ee73cf0d96a707b3700c8f1701d5202dfc044d1f28729854be721129822f4d520e427d5d", 0xf3, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="be18c14ef67ab28965b53ce1ab80ddbc0736819a9636a12f3900df8d47adddd8b805ed8884ac8fb0a2154cf52262b39e579725a19c9901dad8ddd6cd5f5cfeaa7583a25523ca4b25838fb73a39576b4b43163174a351") r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001640)) 20:20:47 executing program 2: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x5) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x2002) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f00000000c0), 0x2, 0x410800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0x1, &(0x7f0000000100)="4066dc829b8fbcadc8e52b141a528aae1c21b4fb2eb906105a4d009debdd8011331090f54c46c52b54f44143c4f2dbfacce6c423ed25b407e8fdb9239b463c68cab0dc0dbfa6a1042df475799d4c827f3557907c1ace3aae70211cb2f5e5a021422f2924f3db37cc97138dc5ccd9c136ebb996d3545938415313923b9ffffcaee2f011d283bd52da7704d461a912968743d75fdaaaa9c69ae41765ff3a8b84dd5c4509d02fddfbbe6dbb7c019858c43eb9afa31e5f2247bac26c8f5cc575927074f751b29fb673fc0e", &(0x7f0000000200)=@udp6, 0x1}, 0x20) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000280)=0xff) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000002c0)={0x8, {0x7, 0xa3ef, 0x3f, 0x0, 0x2, 0x3}}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x11) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x300, 0x70bd2d, 0xffffff83, {0x4, 0x1, 0x5, [0x6, 0x5, 0x5, 0x10000, 0x0, 0x1, 0x5, 0x6, 0x7, 0x9, 0x4, 0x91c7, 0x3f, 0x81, 0x6c95, 0x0, 0xffff, 0x1, 0x200, 0xc5, 0x401, 0x800, 0x8, 0x80000001, 0x2, 0xac0c, 0xfc6, 0x3, 0x7, 0x400, 0x7fff, 0x6, 0x7fff, 0x5, 0x2, 0x10000, 0x81, 0x5867, 0x100, 0x0, 0xffffffff, 0x2, 0x800, 0x1, 0x182, 0x7, 0x16, 0x4, 0x6, 0x6212, 0x0, 0x1, 0xffffffe1, 0x8001, 0xffff, 0x0, 0x81, 0x8, 0x0, 0x101, 0x400, 0xfffffffd, 0x5], [0x10001, 0x800, 0x9, 0x10001, 0x0, 0xf2, 0x64d, 0xca5, 0x5, 0x4, 0xffffffff, 0x9, 0x0, 0xfffffff8, 0x400, 0xffffffff, 0x8, 0x81, 0x0, 0x836, 0xffff, 0x4, 0x1, 0xffff, 0x7, 0x1, 0x70000000, 0x80000001, 0x80000001, 0x3e566ffd, 0x2, 0x5, 0x0, 0xe199, 0x101, 0x20, 0xab94, 0x8020000, 0x0, 0xff, 0x1, 0x80000001, 0x1d31, 0x3, 0x884, 0x5, 0x7, 0x5, 0x8, 0x6, 0x1, 0x3, 0x7, 0xfffffe01, 0xfd6f, 0xffff4337, 0x5, 0x7f, 0x739acb7a, 0x68c3, 0x8, 0xc0, 0x9a2, 0x2], [0x2, 0x80000000, 0xd473, 0x5, 0xfffff801, 0x0, 0x81, 0x901, 0x7, 0xa4, 0x8, 0x7, 0x3a, 0x1, 0x2, 0xfff, 0x5, 0xffffffff, 0x8, 0x3, 0x4, 0x2, 0x3f, 0x0, 0xfffffff8, 0x8, 0x4, 0x6, 0x6, 0x4, 0xc6, 0x4ba, 0x385146b, 0x4, 0x1, 0x81, 0xb6, 0x7, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x6, 0x0, 0x7, 0x5, 0x9, 0x6, 0x1bf15fba, 0x3, 0x7fff, 0x9, 0xfffffffb, 0x2, 0x9, 0xff, 0x9a, 0x7fff, 0x6, 0x3, 0x1, 0x2, 0x1f], [0x4, 0x1000, 0x0, 0x80000000, 0x4, 0x6, 0x542, 0x100, 0x8001, 0x87, 0x4, 0x0, 0x99, 0x1, 0x0, 0x20, 0xdab6, 0x9, 0x40, 0x0, 0x2, 0x20, 0xffffffe0, 0x100, 0x1, 0x601, 0x3, 0x1, 0x401, 0x7fffffff, 0x5, 0x3, 0x200, 0x8001, 0x101, 0x9, 0x0, 0x1000, 0x2, 0x9, 0x6, 0x4, 0x1ff, 0x401, 0x1, 0xdcf, 0xfe, 0xe44, 0x0, 0x5, 0x89a, 0x80, 0x3, 0x9, 0x7fff, 0x6, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3], 0x16, ['/dev/loop#\x00', '/dev/loop#\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x438}, 0x1, 0x0, 0x0, 0x88b4}, 0x480c4) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x9, 0x2c24c0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000840)={0x3216, 0x100000001, 0x8, 0xc266}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0xbde5, 0xbf, 0xafa, 0x800, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4, 0xd}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a40)={r2, &(0x7f0000000900)="78dee0e489793816ec84ba173c78663054b9a8db80cd4b8a5eb8c99d81a2169eb8d7e1366c5a9118af65abef2455ffe0d6b7622d8c85ea69796102d6db8ba808be998aff5d8d973d9c37e44c66867eade0bfd8015d61f804123e104edf1f092e6effbec23ebc6a27852f0e34ccfed9", &(0x7f0000000980)=@buf="d1ac4e15aacf11e696771bd3afcf45bdd733580fe5b8c129f1af7e1cbfcbc1396e968ad112e616192011974a258a89e9ed31c688067d0148b63dab817484c4e1f82b257c858b9116e8757591a03d33a4d8ab444cbd77f91ca147c03e626688d8b6ba7c4058806b2229fca459660f8189802b86a1cce78899c82953aa7a016f76da0b057b461e60f083eb7b55fc86bbf714107dfcdc9765a9e2582a79d69b4b44a45a52045b59", 0x4}, 0x20) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000a80)={0x1f, 0x1b7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=@ipv4_getnexthop={0x2c, 0x6a, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x4800) r3 = getpgrp(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000bc0)='ns/time\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c00), 0x101000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000c40)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x94, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xff, 0x1f}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}]}, 0x94}, 0x1, 0x0, 0x0, 0x44084}, 0x4000000) syz_clone(0x6200a100, &(0x7f0000000e00)="b75705726f985ac68a0af625268ee05996c76b7051f1aa020981446b4bc81a54410155f350eb2a524c2bb2c660cd4bb3ebc5141101bd9d964a96c2c443da7fbd5c7a1094ef1c752a1fa492667958355e28bd746dceb9dda8ea4087aa6155e4b854d95a644b17e0a08b2d03c52a7a8a152b7329e8b60a068caaff713ed158b400d0cc93d978ee920d9fa78601f25f92a2215ab88624fe175b56694e5b15588c5572b90ca1e3b26c6fd75f27e5026531ec7323b5f2a1d62ebb142ba20883c8689e73d014dc403f0576972a7f81bd4319ee73cf0d96a707b3700c8f1701d5202dfc044d1f28729854be721129822f4d520e427d5d", 0xf3, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="be18c14ef67ab28965b53ce1ab80ddbc0736819a9636a12f3900df8d47adddd8b805ed8884ac8fb0a2154cf52262b39e579725a19c9901dad8ddd6cd5f5cfeaa7583a25523ca4b25838fb73a39576b4b43163174a351") r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001640)) 20:20:47 executing program 1: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x5) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x2002) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f00000000c0), 0x2, 0x410800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0x1, &(0x7f0000000100)="4066dc829b8fbcadc8e52b141a528aae1c21b4fb2eb906105a4d009debdd8011331090f54c46c52b54f44143c4f2dbfacce6c423ed25b407e8fdb9239b463c68cab0dc0dbfa6a1042df475799d4c827f3557907c1ace3aae70211cb2f5e5a021422f2924f3db37cc97138dc5ccd9c136ebb996d3545938415313923b9ffffcaee2f011d283bd52da7704d461a912968743d75fdaaaa9c69ae41765ff3a8b84dd5c4509d02fddfbbe6dbb7c019858c43eb9afa31e5f2247bac26c8f5cc575927074f751b29fb673fc0e", &(0x7f0000000200)=@udp6, 0x1}, 0x20) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000280)=0xff) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000002c0)={0x8, {0x7, 0xa3ef, 0x3f, 0x0, 0x2, 0x3}}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x11) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x300, 0x70bd2d, 0xffffff83, {0x4, 0x1, 0x5, [0x6, 0x5, 0x5, 0x10000, 0x0, 0x1, 0x5, 0x6, 0x7, 0x9, 0x4, 0x91c7, 0x3f, 0x81, 0x6c95, 0x0, 0xffff, 0x1, 0x200, 0xc5, 0x401, 0x800, 0x8, 0x80000001, 0x2, 0xac0c, 0xfc6, 0x3, 0x7, 0x400, 0x7fff, 0x6, 0x7fff, 0x5, 0x2, 0x10000, 0x81, 0x5867, 0x100, 0x0, 0xffffffff, 0x2, 0x800, 0x1, 0x182, 0x7, 0x16, 0x4, 0x6, 0x6212, 0x0, 0x1, 0xffffffe1, 0x8001, 0xffff, 0x0, 0x81, 0x8, 0x0, 0x101, 0x400, 0xfffffffd, 0x5], [0x10001, 0x800, 0x9, 0x10001, 0x0, 0xf2, 0x64d, 0xca5, 0x5, 0x4, 0xffffffff, 0x9, 0x0, 0xfffffff8, 0x400, 0xffffffff, 0x8, 0x81, 0x0, 0x836, 0xffff, 0x4, 0x1, 0xffff, 0x7, 0x1, 0x70000000, 0x80000001, 0x80000001, 0x3e566ffd, 0x2, 0x5, 0x0, 0xe199, 0x101, 0x20, 0xab94, 0x8020000, 0x0, 0xff, 0x1, 0x80000001, 0x1d31, 0x3, 0x884, 0x5, 0x7, 0x5, 0x8, 0x6, 0x1, 0x3, 0x7, 0xfffffe01, 0xfd6f, 0xffff4337, 0x5, 0x7f, 0x739acb7a, 0x68c3, 0x8, 0xc0, 0x9a2, 0x2], [0x2, 0x80000000, 0xd473, 0x5, 0xfffff801, 0x0, 0x81, 0x901, 0x7, 0xa4, 0x8, 0x7, 0x3a, 0x1, 0x2, 0xfff, 0x5, 0xffffffff, 0x8, 0x3, 0x4, 0x2, 0x3f, 0x0, 0xfffffff8, 0x8, 0x4, 0x6, 0x6, 0x4, 0xc6, 0x4ba, 0x385146b, 0x4, 0x1, 0x81, 0xb6, 0x7, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x6, 0x0, 0x7, 0x5, 0x9, 0x6, 0x1bf15fba, 0x3, 0x7fff, 0x9, 0xfffffffb, 0x2, 0x9, 0xff, 0x9a, 0x7fff, 0x6, 0x3, 0x1, 0x2, 0x1f], [0x4, 0x1000, 0x0, 0x80000000, 0x4, 0x6, 0x542, 0x100, 0x8001, 0x87, 0x4, 0x0, 0x99, 0x1, 0x0, 0x20, 0xdab6, 0x9, 0x40, 0x0, 0x2, 0x20, 0xffffffe0, 0x100, 0x1, 0x601, 0x3, 0x1, 0x401, 0x7fffffff, 0x5, 0x3, 0x200, 0x8001, 0x101, 0x9, 0x0, 0x1000, 0x2, 0x9, 0x6, 0x4, 0x1ff, 0x401, 0x1, 0xdcf, 0xfe, 0xe44, 0x0, 0x5, 0x89a, 0x80, 0x3, 0x9, 0x7fff, 0x6, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3], 0x16, ['/dev/loop#\x00', '/dev/loop#\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x438}, 0x1, 0x0, 0x0, 0x88b4}, 0x480c4) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x9, 0x2c24c0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000840)={0x3216, 0x100000001, 0x8, 0xc266}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0xbde5, 0xbf, 0xafa, 0x800, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4, 0xd}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a40)={r2, &(0x7f0000000900)="78dee0e489793816ec84ba173c78663054b9a8db80cd4b8a5eb8c99d81a2169eb8d7e1366c5a9118af65abef2455ffe0d6b7622d8c85ea69796102d6db8ba808be998aff5d8d973d9c37e44c66867eade0bfd8015d61f804123e104edf1f092e6effbec23ebc6a27852f0e34ccfed9", &(0x7f0000000980)=@buf="d1ac4e15aacf11e696771bd3afcf45bdd733580fe5b8c129f1af7e1cbfcbc1396e968ad112e616192011974a258a89e9ed31c688067d0148b63dab817484c4e1f82b257c858b9116e8757591a03d33a4d8ab444cbd77f91ca147c03e626688d8b6ba7c4058806b2229fca459660f8189802b86a1cce78899c82953aa7a016f76da0b057b461e60f083eb7b55fc86bbf714107dfcdc9765a9e2582a79d69b4b44a45a52045b59", 0x4}, 0x20) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000a80)={0x1f, 0x1b7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=@ipv4_getnexthop={0x2c, 0x6a, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x4800) r3 = getpgrp(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000bc0)='ns/time\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c00), 0x101000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000c40)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x94, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xff, 0x1f}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}]}, 0x94}, 0x1, 0x0, 0x0, 0x44084}, 0x4000000) syz_clone(0x6200a100, &(0x7f0000000e00)="b75705726f985ac68a0af625268ee05996c76b7051f1aa020981446b4bc81a54410155f350eb2a524c2bb2c660cd4bb3ebc5141101bd9d964a96c2c443da7fbd5c7a1094ef1c752a1fa492667958355e28bd746dceb9dda8ea4087aa6155e4b854d95a644b17e0a08b2d03c52a7a8a152b7329e8b60a068caaff713ed158b400d0cc93d978ee920d9fa78601f25f92a2215ab88624fe175b56694e5b15588c5572b90ca1e3b26c6fd75f27e5026531ec7323b5f2a1d62ebb142ba20883c8689e73d014dc403f0576972a7f81bd4319ee73cf0d96a707b3700c8f1701d5202dfc044d1f28729854be721129822f4d520e427d5d", 0xf3, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="be18c14ef67ab28965b53ce1ab80ddbc0736819a9636a12f3900df8d47adddd8b805ed8884ac8fb0a2154cf52262b39e579725a19c9901dad8ddd6cd5f5cfeaa7583a25523ca4b25838fb73a39576b4b43163174a351") r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001640)) 20:20:48 executing program 5: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x5) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x2002) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f00000000c0), 0x2, 0x410800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0x1, &(0x7f0000000100)="4066dc829b8fbcadc8e52b141a528aae1c21b4fb2eb906105a4d009debdd8011331090f54c46c52b54f44143c4f2dbfacce6c423ed25b407e8fdb9239b463c68cab0dc0dbfa6a1042df475799d4c827f3557907c1ace3aae70211cb2f5e5a021422f2924f3db37cc97138dc5ccd9c136ebb996d3545938415313923b9ffffcaee2f011d283bd52da7704d461a912968743d75fdaaaa9c69ae41765ff3a8b84dd5c4509d02fddfbbe6dbb7c019858c43eb9afa31e5f2247bac26c8f5cc575927074f751b29fb673fc0e", &(0x7f0000000200)=@udp6, 0x1}, 0x20) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000280)=0xff) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000002c0)={0x8, {0x7, 0xa3ef, 0x3f, 0x0, 0x2, 0x3}}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x11) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x300, 0x70bd2d, 0xffffff83, {0x4, 0x1, 0x5, [0x6, 0x5, 0x5, 0x10000, 0x0, 0x1, 0x5, 0x6, 0x7, 0x9, 0x4, 0x91c7, 0x3f, 0x81, 0x6c95, 0x0, 0xffff, 0x1, 0x200, 0xc5, 0x401, 0x800, 0x8, 0x80000001, 0x2, 0xac0c, 0xfc6, 0x3, 0x7, 0x400, 0x7fff, 0x6, 0x7fff, 0x5, 0x2, 0x10000, 0x81, 0x5867, 0x100, 0x0, 0xffffffff, 0x2, 0x800, 0x1, 0x182, 0x7, 0x16, 0x4, 0x6, 0x6212, 0x0, 0x1, 0xffffffe1, 0x8001, 0xffff, 0x0, 0x81, 0x8, 0x0, 0x101, 0x400, 0xfffffffd, 0x5], [0x10001, 0x800, 0x9, 0x10001, 0x0, 0xf2, 0x64d, 0xca5, 0x5, 0x4, 0xffffffff, 0x9, 0x0, 0xfffffff8, 0x400, 0xffffffff, 0x8, 0x81, 0x0, 0x836, 0xffff, 0x4, 0x1, 0xffff, 0x7, 0x1, 0x70000000, 0x80000001, 0x80000001, 0x3e566ffd, 0x2, 0x5, 0x0, 0xe199, 0x101, 0x20, 0xab94, 0x8020000, 0x0, 0xff, 0x1, 0x80000001, 0x1d31, 0x3, 0x884, 0x5, 0x7, 0x5, 0x8, 0x6, 0x1, 0x3, 0x7, 0xfffffe01, 0xfd6f, 0xffff4337, 0x5, 0x7f, 0x739acb7a, 0x68c3, 0x8, 0xc0, 0x9a2, 0x2], [0x2, 0x80000000, 0xd473, 0x5, 0xfffff801, 0x0, 0x81, 0x901, 0x7, 0xa4, 0x8, 0x7, 0x3a, 0x1, 0x2, 0xfff, 0x5, 0xffffffff, 0x8, 0x3, 0x4, 0x2, 0x3f, 0x0, 0xfffffff8, 0x8, 0x4, 0x6, 0x6, 0x4, 0xc6, 0x4ba, 0x385146b, 0x4, 0x1, 0x81, 0xb6, 0x7, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x6, 0x0, 0x7, 0x5, 0x9, 0x6, 0x1bf15fba, 0x3, 0x7fff, 0x9, 0xfffffffb, 0x2, 0x9, 0xff, 0x9a, 0x7fff, 0x6, 0x3, 0x1, 0x2, 0x1f], [0x4, 0x1000, 0x0, 0x80000000, 0x4, 0x6, 0x542, 0x100, 0x8001, 0x87, 0x4, 0x0, 0x99, 0x1, 0x0, 0x20, 0xdab6, 0x9, 0x40, 0x0, 0x2, 0x20, 0xffffffe0, 0x100, 0x1, 0x601, 0x3, 0x1, 0x401, 0x7fffffff, 0x5, 0x3, 0x200, 0x8001, 0x101, 0x9, 0x0, 0x1000, 0x2, 0x9, 0x6, 0x4, 0x1ff, 0x401, 0x1, 0xdcf, 0xfe, 0xe44, 0x0, 0x5, 0x89a, 0x80, 0x3, 0x9, 0x7fff, 0x6, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3], 0x16, ['/dev/loop#\x00', '/dev/loop#\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x438}, 0x1, 0x0, 0x0, 0x88b4}, 0x480c4) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x9, 0x2c24c0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000840)={0x3216, 0x100000001, 0x8, 0xc266}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0xbde5, 0xbf, 0xafa, 0x800, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4, 0xd}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a40)={r2, &(0x7f0000000900)="78dee0e489793816ec84ba173c78663054b9a8db80cd4b8a5eb8c99d81a2169eb8d7e1366c5a9118af65abef2455ffe0d6b7622d8c85ea69796102d6db8ba808be998aff5d8d973d9c37e44c66867eade0bfd8015d61f804123e104edf1f092e6effbec23ebc6a27852f0e34ccfed9", &(0x7f0000000980)=@buf="d1ac4e15aacf11e696771bd3afcf45bdd733580fe5b8c129f1af7e1cbfcbc1396e968ad112e616192011974a258a89e9ed31c688067d0148b63dab817484c4e1f82b257c858b9116e8757591a03d33a4d8ab444cbd77f91ca147c03e626688d8b6ba7c4058806b2229fca459660f8189802b86a1cce78899c82953aa7a016f76da0b057b461e60f083eb7b55fc86bbf714107dfcdc9765a9e2582a79d69b4b44a45a52045b59", 0x4}, 0x20) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000a80)={0x1f, 0x1b7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=@ipv4_getnexthop={0x2c, 0x6a, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x4800) r3 = getpgrp(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000bc0)='ns/time\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c00), 0x101000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000c40)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x94, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xff, 0x1f}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}]}, 0x94}, 0x1, 0x0, 0x0, 0x44084}, 0x4000000) syz_clone(0x6200a100, &(0x7f0000000e00)="b75705726f985ac68a0af625268ee05996c76b7051f1aa020981446b4bc81a54410155f350eb2a524c2bb2c660cd4bb3ebc5141101bd9d964a96c2c443da7fbd5c7a1094ef1c752a1fa492667958355e28bd746dceb9dda8ea4087aa6155e4b854d95a644b17e0a08b2d03c52a7a8a152b7329e8b60a068caaff713ed158b400d0cc93d978ee920d9fa78601f25f92a2215ab88624fe175b56694e5b15588c5572b90ca1e3b26c6fd75f27e5026531ec7323b5f2a1d62ebb142ba20883c8689e73d014dc403f0576972a7f81bd4319ee73cf0d96a707b3700c8f1701d5202dfc044d1f28729854be721129822f4d520e427d5d", 0xf3, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="be18c14ef67ab28965b53ce1ab80ddbc0736819a9636a12f3900df8d47adddd8b805ed8884ac8fb0a2154cf52262b39e579725a19c9901dad8ddd6cd5f5cfeaa7583a25523ca4b25838fb73a39576b4b43163174a351") r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001640)) 20:20:48 executing program 4: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x5) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x2002) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f00000000c0), 0x2, 0x410800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0x1, &(0x7f0000000100)="4066dc829b8fbcadc8e52b141a528aae1c21b4fb2eb906105a4d009debdd8011331090f54c46c52b54f44143c4f2dbfacce6c423ed25b407e8fdb9239b463c68cab0dc0dbfa6a1042df475799d4c827f3557907c1ace3aae70211cb2f5e5a021422f2924f3db37cc97138dc5ccd9c136ebb996d3545938415313923b9ffffcaee2f011d283bd52da7704d461a912968743d75fdaaaa9c69ae41765ff3a8b84dd5c4509d02fddfbbe6dbb7c019858c43eb9afa31e5f2247bac26c8f5cc575927074f751b29fb673fc0e", &(0x7f0000000200)=@udp6, 0x1}, 0x20) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000280)=0xff) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000002c0)={0x8, {0x7, 0xa3ef, 0x3f, 0x0, 0x2, 0x3}}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x11) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x300, 0x70bd2d, 0xffffff83, {0x4, 0x1, 0x5, [0x6, 0x5, 0x5, 0x10000, 0x0, 0x1, 0x5, 0x6, 0x7, 0x9, 0x4, 0x91c7, 0x3f, 0x81, 0x6c95, 0x0, 0xffff, 0x1, 0x200, 0xc5, 0x401, 0x800, 0x8, 0x80000001, 0x2, 0xac0c, 0xfc6, 0x3, 0x7, 0x400, 0x7fff, 0x6, 0x7fff, 0x5, 0x2, 0x10000, 0x81, 0x5867, 0x100, 0x0, 0xffffffff, 0x2, 0x800, 0x1, 0x182, 0x7, 0x16, 0x4, 0x6, 0x6212, 0x0, 0x1, 0xffffffe1, 0x8001, 0xffff, 0x0, 0x81, 0x8, 0x0, 0x101, 0x400, 0xfffffffd, 0x5], [0x10001, 0x800, 0x9, 0x10001, 0x0, 0xf2, 0x64d, 0xca5, 0x5, 0x4, 0xffffffff, 0x9, 0x0, 0xfffffff8, 0x400, 0xffffffff, 0x8, 0x81, 0x0, 0x836, 0xffff, 0x4, 0x1, 0xffff, 0x7, 0x1, 0x70000000, 0x80000001, 0x80000001, 0x3e566ffd, 0x2, 0x5, 0x0, 0xe199, 0x101, 0x20, 0xab94, 0x8020000, 0x0, 0xff, 0x1, 0x80000001, 0x1d31, 0x3, 0x884, 0x5, 0x7, 0x5, 0x8, 0x6, 0x1, 0x3, 0x7, 0xfffffe01, 0xfd6f, 0xffff4337, 0x5, 0x7f, 0x739acb7a, 0x68c3, 0x8, 0xc0, 0x9a2, 0x2], [0x2, 0x80000000, 0xd473, 0x5, 0xfffff801, 0x0, 0x81, 0x901, 0x7, 0xa4, 0x8, 0x7, 0x3a, 0x1, 0x2, 0xfff, 0x5, 0xffffffff, 0x8, 0x3, 0x4, 0x2, 0x3f, 0x0, 0xfffffff8, 0x8, 0x4, 0x6, 0x6, 0x4, 0xc6, 0x4ba, 0x385146b, 0x4, 0x1, 0x81, 0xb6, 0x7, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x6, 0x0, 0x7, 0x5, 0x9, 0x6, 0x1bf15fba, 0x3, 0x7fff, 0x9, 0xfffffffb, 0x2, 0x9, 0xff, 0x9a, 0x7fff, 0x6, 0x3, 0x1, 0x2, 0x1f], [0x4, 0x1000, 0x0, 0x80000000, 0x4, 0x6, 0x542, 0x100, 0x8001, 0x87, 0x4, 0x0, 0x99, 0x1, 0x0, 0x20, 0xdab6, 0x9, 0x40, 0x0, 0x2, 0x20, 0xffffffe0, 0x100, 0x1, 0x601, 0x3, 0x1, 0x401, 0x7fffffff, 0x5, 0x3, 0x200, 0x8001, 0x101, 0x9, 0x0, 0x1000, 0x2, 0x9, 0x6, 0x4, 0x1ff, 0x401, 0x1, 0xdcf, 0xfe, 0xe44, 0x0, 0x5, 0x89a, 0x80, 0x3, 0x9, 0x7fff, 0x6, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3], 0x16, ['/dev/loop#\x00', '/dev/loop#\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x438}, 0x1, 0x0, 0x0, 0x88b4}, 0x480c4) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x9, 0x2c24c0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000840)={0x3216, 0x100000001, 0x8, 0xc266}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0xbde5, 0xbf, 0xafa, 0x800, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4, 0xd}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a40)={r2, &(0x7f0000000900)="78dee0e489793816ec84ba173c78663054b9a8db80cd4b8a5eb8c99d81a2169eb8d7e1366c5a9118af65abef2455ffe0d6b7622d8c85ea69796102d6db8ba808be998aff5d8d973d9c37e44c66867eade0bfd8015d61f804123e104edf1f092e6effbec23ebc6a27852f0e34ccfed9", &(0x7f0000000980)=@buf="d1ac4e15aacf11e696771bd3afcf45bdd733580fe5b8c129f1af7e1cbfcbc1396e968ad112e616192011974a258a89e9ed31c688067d0148b63dab817484c4e1f82b257c858b9116e8757591a03d33a4d8ab444cbd77f91ca147c03e626688d8b6ba7c4058806b2229fca459660f8189802b86a1cce78899c82953aa7a016f76da0b057b461e60f083eb7b55fc86bbf714107dfcdc9765a9e2582a79d69b4b44a45a52045b59", 0x4}, 0x20) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000a80)={0x1f, 0x1b7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=@ipv4_getnexthop={0x2c, 0x6a, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x4800) r3 = getpgrp(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000bc0)='ns/time\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c00), 0x101000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000c40)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x94, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xff, 0x1f}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}]}, 0x94}, 0x1, 0x0, 0x0, 0x44084}, 0x4000000) syz_clone(0x6200a100, &(0x7f0000000e00)="b75705726f985ac68a0af625268ee05996c76b7051f1aa020981446b4bc81a54410155f350eb2a524c2bb2c660cd4bb3ebc5141101bd9d964a96c2c443da7fbd5c7a1094ef1c752a1fa492667958355e28bd746dceb9dda8ea4087aa6155e4b854d95a644b17e0a08b2d03c52a7a8a152b7329e8b60a068caaff713ed158b400d0cc93d978ee920d9fa78601f25f92a2215ab88624fe175b56694e5b15588c5572b90ca1e3b26c6fd75f27e5026531ec7323b5f2a1d62ebb142ba20883c8689e73d014dc403f0576972a7f81bd4319ee73cf0d96a707b3700c8f1701d5202dfc044d1f28729854be721129822f4d520e427d5d", 0xf3, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="be18c14ef67ab28965b53ce1ab80ddbc0736819a9636a12f3900df8d47adddd8b805ed8884ac8fb0a2154cf52262b39e579725a19c9901dad8ddd6cd5f5cfeaa7583a25523ca4b25838fb73a39576b4b43163174a351") r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001640)) 20:20:48 executing program 0: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x5) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x2002) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f00000000c0), 0x2, 0x410800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0x1, &(0x7f0000000100)="4066dc829b8fbcadc8e52b141a528aae1c21b4fb2eb906105a4d009debdd8011331090f54c46c52b54f44143c4f2dbfacce6c423ed25b407e8fdb9239b463c68cab0dc0dbfa6a1042df475799d4c827f3557907c1ace3aae70211cb2f5e5a021422f2924f3db37cc97138dc5ccd9c136ebb996d3545938415313923b9ffffcaee2f011d283bd52da7704d461a912968743d75fdaaaa9c69ae41765ff3a8b84dd5c4509d02fddfbbe6dbb7c019858c43eb9afa31e5f2247bac26c8f5cc575927074f751b29fb673fc0e", &(0x7f0000000200)=@udp6, 0x1}, 0x20) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000280)=0xff) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000002c0)={0x8, {0x7, 0xa3ef, 0x3f, 0x0, 0x2, 0x3}}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x11) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x300, 0x70bd2d, 0xffffff83, {0x4, 0x1, 0x5, [0x6, 0x5, 0x5, 0x10000, 0x0, 0x1, 0x5, 0x6, 0x7, 0x9, 0x4, 0x91c7, 0x3f, 0x81, 0x6c95, 0x0, 0xffff, 0x1, 0x200, 0xc5, 0x401, 0x800, 0x8, 0x80000001, 0x2, 0xac0c, 0xfc6, 0x3, 0x7, 0x400, 0x7fff, 0x6, 0x7fff, 0x5, 0x2, 0x10000, 0x81, 0x5867, 0x100, 0x0, 0xffffffff, 0x2, 0x800, 0x1, 0x182, 0x7, 0x16, 0x4, 0x6, 0x6212, 0x0, 0x1, 0xffffffe1, 0x8001, 0xffff, 0x0, 0x81, 0x8, 0x0, 0x101, 0x400, 0xfffffffd, 0x5], [0x10001, 0x800, 0x9, 0x10001, 0x0, 0xf2, 0x64d, 0xca5, 0x5, 0x4, 0xffffffff, 0x9, 0x0, 0xfffffff8, 0x400, 0xffffffff, 0x8, 0x81, 0x0, 0x836, 0xffff, 0x4, 0x1, 0xffff, 0x7, 0x1, 0x70000000, 0x80000001, 0x80000001, 0x3e566ffd, 0x2, 0x5, 0x0, 0xe199, 0x101, 0x20, 0xab94, 0x8020000, 0x0, 0xff, 0x1, 0x80000001, 0x1d31, 0x3, 0x884, 0x5, 0x7, 0x5, 0x8, 0x6, 0x1, 0x3, 0x7, 0xfffffe01, 0xfd6f, 0xffff4337, 0x5, 0x7f, 0x739acb7a, 0x68c3, 0x8, 0xc0, 0x9a2, 0x2], [0x2, 0x80000000, 0xd473, 0x5, 0xfffff801, 0x0, 0x81, 0x901, 0x7, 0xa4, 0x8, 0x7, 0x3a, 0x1, 0x2, 0xfff, 0x5, 0xffffffff, 0x8, 0x3, 0x4, 0x2, 0x3f, 0x0, 0xfffffff8, 0x8, 0x4, 0x6, 0x6, 0x4, 0xc6, 0x4ba, 0x385146b, 0x4, 0x1, 0x81, 0xb6, 0x7, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x6, 0x0, 0x7, 0x5, 0x9, 0x6, 0x1bf15fba, 0x3, 0x7fff, 0x9, 0xfffffffb, 0x2, 0x9, 0xff, 0x9a, 0x7fff, 0x6, 0x3, 0x1, 0x2, 0x1f], [0x4, 0x1000, 0x0, 0x80000000, 0x4, 0x6, 0x542, 0x100, 0x8001, 0x87, 0x4, 0x0, 0x99, 0x1, 0x0, 0x20, 0xdab6, 0x9, 0x40, 0x0, 0x2, 0x20, 0xffffffe0, 0x100, 0x1, 0x601, 0x3, 0x1, 0x401, 0x7fffffff, 0x5, 0x3, 0x200, 0x8001, 0x101, 0x9, 0x0, 0x1000, 0x2, 0x9, 0x6, 0x4, 0x1ff, 0x401, 0x1, 0xdcf, 0xfe, 0xe44, 0x0, 0x5, 0x89a, 0x80, 0x3, 0x9, 0x7fff, 0x6, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3], 0x16, ['/dev/loop#\x00', '/dev/loop#\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x438}, 0x1, 0x0, 0x0, 0x88b4}, 0x480c4) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x9, 0x2c24c0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000840)={0x3216, 0x100000001, 0x8, 0xc266}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0xbde5, 0xbf, 0xafa, 0x800, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4, 0xd}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a40)={r2, &(0x7f0000000900)="78dee0e489793816ec84ba173c78663054b9a8db80cd4b8a5eb8c99d81a2169eb8d7e1366c5a9118af65abef2455ffe0d6b7622d8c85ea69796102d6db8ba808be998aff5d8d973d9c37e44c66867eade0bfd8015d61f804123e104edf1f092e6effbec23ebc6a27852f0e34ccfed9", &(0x7f0000000980)=@buf="d1ac4e15aacf11e696771bd3afcf45bdd733580fe5b8c129f1af7e1cbfcbc1396e968ad112e616192011974a258a89e9ed31c688067d0148b63dab817484c4e1f82b257c858b9116e8757591a03d33a4d8ab444cbd77f91ca147c03e626688d8b6ba7c4058806b2229fca459660f8189802b86a1cce78899c82953aa7a016f76da0b057b461e60f083eb7b55fc86bbf714107dfcdc9765a9e2582a79d69b4b44a45a52045b59", 0x4}, 0x20) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000a80)={0x1f, 0x1b7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=@ipv4_getnexthop={0x2c, 0x6a, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x4800) r3 = getpgrp(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000bc0)='ns/time\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c00), 0x101000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000c40)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x94, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xff, 0x1f}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}]}, 0x94}, 0x1, 0x0, 0x0, 0x44084}, 0x4000000) syz_clone(0x6200a100, &(0x7f0000000e00)="b75705726f985ac68a0af625268ee05996c76b7051f1aa020981446b4bc81a54410155f350eb2a524c2bb2c660cd4bb3ebc5141101bd9d964a96c2c443da7fbd5c7a1094ef1c752a1fa492667958355e28bd746dceb9dda8ea4087aa6155e4b854d95a644b17e0a08b2d03c52a7a8a152b7329e8b60a068caaff713ed158b400d0cc93d978ee920d9fa78601f25f92a2215ab88624fe175b56694e5b15588c5572b90ca1e3b26c6fd75f27e5026531ec7323b5f2a1d62ebb142ba20883c8689e73d014dc403f0576972a7f81bd4319ee73cf0d96a707b3700c8f1701d5202dfc044d1f28729854be721129822f4d520e427d5d", 0xf3, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="be18c14ef67ab28965b53ce1ab80ddbc0736819a9636a12f3900df8d47adddd8b805ed8884ac8fb0a2154cf52262b39e579725a19c9901dad8ddd6cd5f5cfeaa7583a25523ca4b25838fb73a39576b4b43163174a351") r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001640)) 20:20:48 executing program 3: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x5) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x2002) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f00000000c0), 0x2, 0x410800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0x1, &(0x7f0000000100)="4066dc829b8fbcadc8e52b141a528aae1c21b4fb2eb906105a4d009debdd8011331090f54c46c52b54f44143c4f2dbfacce6c423ed25b407e8fdb9239b463c68cab0dc0dbfa6a1042df475799d4c827f3557907c1ace3aae70211cb2f5e5a021422f2924f3db37cc97138dc5ccd9c136ebb996d3545938415313923b9ffffcaee2f011d283bd52da7704d461a912968743d75fdaaaa9c69ae41765ff3a8b84dd5c4509d02fddfbbe6dbb7c019858c43eb9afa31e5f2247bac26c8f5cc575927074f751b29fb673fc0e", &(0x7f0000000200)=@udp6, 0x1}, 0x20) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000280)=0xff) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000002c0)={0x8, {0x7, 0xa3ef, 0x3f, 0x0, 0x2, 0x3}}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x11) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x300, 0x70bd2d, 0xffffff83, {0x4, 0x1, 0x5, [0x6, 0x5, 0x5, 0x10000, 0x0, 0x1, 0x5, 0x6, 0x7, 0x9, 0x4, 0x91c7, 0x3f, 0x81, 0x6c95, 0x0, 0xffff, 0x1, 0x200, 0xc5, 0x401, 0x800, 0x8, 0x80000001, 0x2, 0xac0c, 0xfc6, 0x3, 0x7, 0x400, 0x7fff, 0x6, 0x7fff, 0x5, 0x2, 0x10000, 0x81, 0x5867, 0x100, 0x0, 0xffffffff, 0x2, 0x800, 0x1, 0x182, 0x7, 0x16, 0x4, 0x6, 0x6212, 0x0, 0x1, 0xffffffe1, 0x8001, 0xffff, 0x0, 0x81, 0x8, 0x0, 0x101, 0x400, 0xfffffffd, 0x5], [0x10001, 0x800, 0x9, 0x10001, 0x0, 0xf2, 0x64d, 0xca5, 0x5, 0x4, 0xffffffff, 0x9, 0x0, 0xfffffff8, 0x400, 0xffffffff, 0x8, 0x81, 0x0, 0x836, 0xffff, 0x4, 0x1, 0xffff, 0x7, 0x1, 0x70000000, 0x80000001, 0x80000001, 0x3e566ffd, 0x2, 0x5, 0x0, 0xe199, 0x101, 0x20, 0xab94, 0x8020000, 0x0, 0xff, 0x1, 0x80000001, 0x1d31, 0x3, 0x884, 0x5, 0x7, 0x5, 0x8, 0x6, 0x1, 0x3, 0x7, 0xfffffe01, 0xfd6f, 0xffff4337, 0x5, 0x7f, 0x739acb7a, 0x68c3, 0x8, 0xc0, 0x9a2, 0x2], [0x2, 0x80000000, 0xd473, 0x5, 0xfffff801, 0x0, 0x81, 0x901, 0x7, 0xa4, 0x8, 0x7, 0x3a, 0x1, 0x2, 0xfff, 0x5, 0xffffffff, 0x8, 0x3, 0x4, 0x2, 0x3f, 0x0, 0xfffffff8, 0x8, 0x4, 0x6, 0x6, 0x4, 0xc6, 0x4ba, 0x385146b, 0x4, 0x1, 0x81, 0xb6, 0x7, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x6, 0x0, 0x7, 0x5, 0x9, 0x6, 0x1bf15fba, 0x3, 0x7fff, 0x9, 0xfffffffb, 0x2, 0x9, 0xff, 0x9a, 0x7fff, 0x6, 0x3, 0x1, 0x2, 0x1f], [0x4, 0x1000, 0x0, 0x80000000, 0x4, 0x6, 0x542, 0x100, 0x8001, 0x87, 0x4, 0x0, 0x99, 0x1, 0x0, 0x20, 0xdab6, 0x9, 0x40, 0x0, 0x2, 0x20, 0xffffffe0, 0x100, 0x1, 0x601, 0x3, 0x1, 0x401, 0x7fffffff, 0x5, 0x3, 0x200, 0x8001, 0x101, 0x9, 0x0, 0x1000, 0x2, 0x9, 0x6, 0x4, 0x1ff, 0x401, 0x1, 0xdcf, 0xfe, 0xe44, 0x0, 0x5, 0x89a, 0x80, 0x3, 0x9, 0x7fff, 0x6, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3], 0x16, ['/dev/loop#\x00', '/dev/loop#\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x438}, 0x1, 0x0, 0x0, 0x88b4}, 0x480c4) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x9, 0x2c24c0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000840)={0x3216, 0x100000001, 0x8, 0xc266}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0xbde5, 0xbf, 0xafa, 0x800, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4, 0xd}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a40)={r2, &(0x7f0000000900)="78dee0e489793816ec84ba173c78663054b9a8db80cd4b8a5eb8c99d81a2169eb8d7e1366c5a9118af65abef2455ffe0d6b7622d8c85ea69796102d6db8ba808be998aff5d8d973d9c37e44c66867eade0bfd8015d61f804123e104edf1f092e6effbec23ebc6a27852f0e34ccfed9", &(0x7f0000000980)=@buf="d1ac4e15aacf11e696771bd3afcf45bdd733580fe5b8c129f1af7e1cbfcbc1396e968ad112e616192011974a258a89e9ed31c688067d0148b63dab817484c4e1f82b257c858b9116e8757591a03d33a4d8ab444cbd77f91ca147c03e626688d8b6ba7c4058806b2229fca459660f8189802b86a1cce78899c82953aa7a016f76da0b057b461e60f083eb7b55fc86bbf714107dfcdc9765a9e2582a79d69b4b44a45a52045b59", 0x4}, 0x20) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000a80)={0x1f, 0x1b7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=@ipv4_getnexthop={0x2c, 0x6a, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x4800) r3 = getpgrp(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000bc0)='ns/time\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c00), 0x101000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000c40)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x94, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xff, 0x1f}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}]}, 0x94}, 0x1, 0x0, 0x0, 0x44084}, 0x4000000) syz_clone(0x6200a100, &(0x7f0000000e00)="b75705726f985ac68a0af625268ee05996c76b7051f1aa020981446b4bc81a54410155f350eb2a524c2bb2c660cd4bb3ebc5141101bd9d964a96c2c443da7fbd5c7a1094ef1c752a1fa492667958355e28bd746dceb9dda8ea4087aa6155e4b854d95a644b17e0a08b2d03c52a7a8a152b7329e8b60a068caaff713ed158b400d0cc93d978ee920d9fa78601f25f92a2215ab88624fe175b56694e5b15588c5572b90ca1e3b26c6fd75f27e5026531ec7323b5f2a1d62ebb142ba20883c8689e73d014dc403f0576972a7f81bd4319ee73cf0d96a707b3700c8f1701d5202dfc044d1f28729854be721129822f4d520e427d5d", 0xf3, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="be18c14ef67ab28965b53ce1ab80ddbc0736819a9636a12f3900df8d47adddd8b805ed8884ac8fb0a2154cf52262b39e579725a19c9901dad8ddd6cd5f5cfeaa7583a25523ca4b25838fb73a39576b4b43163174a351") r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001640)) 20:20:48 executing program 2: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x5) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x2002) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f00000000c0), 0x2, 0x410800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0x1, &(0x7f0000000100)="4066dc829b8fbcadc8e52b141a528aae1c21b4fb2eb906105a4d009debdd8011331090f54c46c52b54f44143c4f2dbfacce6c423ed25b407e8fdb9239b463c68cab0dc0dbfa6a1042df475799d4c827f3557907c1ace3aae70211cb2f5e5a021422f2924f3db37cc97138dc5ccd9c136ebb996d3545938415313923b9ffffcaee2f011d283bd52da7704d461a912968743d75fdaaaa9c69ae41765ff3a8b84dd5c4509d02fddfbbe6dbb7c019858c43eb9afa31e5f2247bac26c8f5cc575927074f751b29fb673fc0e", &(0x7f0000000200)=@udp6, 0x1}, 0x20) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000280)=0xff) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000002c0)={0x8, {0x7, 0xa3ef, 0x3f, 0x0, 0x2, 0x3}}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x11) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x300, 0x70bd2d, 0xffffff83, {0x4, 0x1, 0x5, [0x6, 0x5, 0x5, 0x10000, 0x0, 0x1, 0x5, 0x6, 0x7, 0x9, 0x4, 0x91c7, 0x3f, 0x81, 0x6c95, 0x0, 0xffff, 0x1, 0x200, 0xc5, 0x401, 0x800, 0x8, 0x80000001, 0x2, 0xac0c, 0xfc6, 0x3, 0x7, 0x400, 0x7fff, 0x6, 0x7fff, 0x5, 0x2, 0x10000, 0x81, 0x5867, 0x100, 0x0, 0xffffffff, 0x2, 0x800, 0x1, 0x182, 0x7, 0x16, 0x4, 0x6, 0x6212, 0x0, 0x1, 0xffffffe1, 0x8001, 0xffff, 0x0, 0x81, 0x8, 0x0, 0x101, 0x400, 0xfffffffd, 0x5], [0x10001, 0x800, 0x9, 0x10001, 0x0, 0xf2, 0x64d, 0xca5, 0x5, 0x4, 0xffffffff, 0x9, 0x0, 0xfffffff8, 0x400, 0xffffffff, 0x8, 0x81, 0x0, 0x836, 0xffff, 0x4, 0x1, 0xffff, 0x7, 0x1, 0x70000000, 0x80000001, 0x80000001, 0x3e566ffd, 0x2, 0x5, 0x0, 0xe199, 0x101, 0x20, 0xab94, 0x8020000, 0x0, 0xff, 0x1, 0x80000001, 0x1d31, 0x3, 0x884, 0x5, 0x7, 0x5, 0x8, 0x6, 0x1, 0x3, 0x7, 0xfffffe01, 0xfd6f, 0xffff4337, 0x5, 0x7f, 0x739acb7a, 0x68c3, 0x8, 0xc0, 0x9a2, 0x2], [0x2, 0x80000000, 0xd473, 0x5, 0xfffff801, 0x0, 0x81, 0x901, 0x7, 0xa4, 0x8, 0x7, 0x3a, 0x1, 0x2, 0xfff, 0x5, 0xffffffff, 0x8, 0x3, 0x4, 0x2, 0x3f, 0x0, 0xfffffff8, 0x8, 0x4, 0x6, 0x6, 0x4, 0xc6, 0x4ba, 0x385146b, 0x4, 0x1, 0x81, 0xb6, 0x7, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x6, 0x0, 0x7, 0x5, 0x9, 0x6, 0x1bf15fba, 0x3, 0x7fff, 0x9, 0xfffffffb, 0x2, 0x9, 0xff, 0x9a, 0x7fff, 0x6, 0x3, 0x1, 0x2, 0x1f], [0x4, 0x1000, 0x0, 0x80000000, 0x4, 0x6, 0x542, 0x100, 0x8001, 0x87, 0x4, 0x0, 0x99, 0x1, 0x0, 0x20, 0xdab6, 0x9, 0x40, 0x0, 0x2, 0x20, 0xffffffe0, 0x100, 0x1, 0x601, 0x3, 0x1, 0x401, 0x7fffffff, 0x5, 0x3, 0x200, 0x8001, 0x101, 0x9, 0x0, 0x1000, 0x2, 0x9, 0x6, 0x4, 0x1ff, 0x401, 0x1, 0xdcf, 0xfe, 0xe44, 0x0, 0x5, 0x89a, 0x80, 0x3, 0x9, 0x7fff, 0x6, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3], 0x16, ['/dev/loop#\x00', '/dev/loop#\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x438}, 0x1, 0x0, 0x0, 0x88b4}, 0x480c4) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x9, 0x2c24c0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000840)={0x3216, 0x100000001, 0x8, 0xc266}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0xbde5, 0xbf, 0xafa, 0x800, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4, 0xd}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a40)={r2, &(0x7f0000000900)="78dee0e489793816ec84ba173c78663054b9a8db80cd4b8a5eb8c99d81a2169eb8d7e1366c5a9118af65abef2455ffe0d6b7622d8c85ea69796102d6db8ba808be998aff5d8d973d9c37e44c66867eade0bfd8015d61f804123e104edf1f092e6effbec23ebc6a27852f0e34ccfed9", &(0x7f0000000980)=@buf="d1ac4e15aacf11e696771bd3afcf45bdd733580fe5b8c129f1af7e1cbfcbc1396e968ad112e616192011974a258a89e9ed31c688067d0148b63dab817484c4e1f82b257c858b9116e8757591a03d33a4d8ab444cbd77f91ca147c03e626688d8b6ba7c4058806b2229fca459660f8189802b86a1cce78899c82953aa7a016f76da0b057b461e60f083eb7b55fc86bbf714107dfcdc9765a9e2582a79d69b4b44a45a52045b59", 0x4}, 0x20) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000a80)={0x1f, 0x1b7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=@ipv4_getnexthop={0x2c, 0x6a, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x4800) r3 = getpgrp(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000bc0)='ns/time\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c00), 0x101000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000c40)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x94, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xff, 0x1f}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}]}, 0x94}, 0x1, 0x0, 0x0, 0x44084}, 0x4000000) syz_clone(0x6200a100, &(0x7f0000000e00)="b75705726f985ac68a0af625268ee05996c76b7051f1aa020981446b4bc81a54410155f350eb2a524c2bb2c660cd4bb3ebc5141101bd9d964a96c2c443da7fbd5c7a1094ef1c752a1fa492667958355e28bd746dceb9dda8ea4087aa6155e4b854d95a644b17e0a08b2d03c52a7a8a152b7329e8b60a068caaff713ed158b400d0cc93d978ee920d9fa78601f25f92a2215ab88624fe175b56694e5b15588c5572b90ca1e3b26c6fd75f27e5026531ec7323b5f2a1d62ebb142ba20883c8689e73d014dc403f0576972a7f81bd4319ee73cf0d96a707b3700c8f1701d5202dfc044d1f28729854be721129822f4d520e427d5d", 0xf3, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="be18c14ef67ab28965b53ce1ab80ddbc0736819a9636a12f3900df8d47adddd8b805ed8884ac8fb0a2154cf52262b39e579725a19c9901dad8ddd6cd5f5cfeaa7583a25523ca4b25838fb73a39576b4b43163174a351") r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001640)) 20:20:48 executing program 1: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x5) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x2002) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f00000000c0), 0x2, 0x410800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0x1, &(0x7f0000000100)="4066dc829b8fbcadc8e52b141a528aae1c21b4fb2eb906105a4d009debdd8011331090f54c46c52b54f44143c4f2dbfacce6c423ed25b407e8fdb9239b463c68cab0dc0dbfa6a1042df475799d4c827f3557907c1ace3aae70211cb2f5e5a021422f2924f3db37cc97138dc5ccd9c136ebb996d3545938415313923b9ffffcaee2f011d283bd52da7704d461a912968743d75fdaaaa9c69ae41765ff3a8b84dd5c4509d02fddfbbe6dbb7c019858c43eb9afa31e5f2247bac26c8f5cc575927074f751b29fb673fc0e", &(0x7f0000000200)=@udp6, 0x1}, 0x20) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000280)=0xff) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000002c0)={0x8, {0x7, 0xa3ef, 0x3f, 0x0, 0x2, 0x3}}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x11) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x300, 0x70bd2d, 0xffffff83, {0x4, 0x1, 0x5, [0x6, 0x5, 0x5, 0x10000, 0x0, 0x1, 0x5, 0x6, 0x7, 0x9, 0x4, 0x91c7, 0x3f, 0x81, 0x6c95, 0x0, 0xffff, 0x1, 0x200, 0xc5, 0x401, 0x800, 0x8, 0x80000001, 0x2, 0xac0c, 0xfc6, 0x3, 0x7, 0x400, 0x7fff, 0x6, 0x7fff, 0x5, 0x2, 0x10000, 0x81, 0x5867, 0x100, 0x0, 0xffffffff, 0x2, 0x800, 0x1, 0x182, 0x7, 0x16, 0x4, 0x6, 0x6212, 0x0, 0x1, 0xffffffe1, 0x8001, 0xffff, 0x0, 0x81, 0x8, 0x0, 0x101, 0x400, 0xfffffffd, 0x5], [0x10001, 0x800, 0x9, 0x10001, 0x0, 0xf2, 0x64d, 0xca5, 0x5, 0x4, 0xffffffff, 0x9, 0x0, 0xfffffff8, 0x400, 0xffffffff, 0x8, 0x81, 0x0, 0x836, 0xffff, 0x4, 0x1, 0xffff, 0x7, 0x1, 0x70000000, 0x80000001, 0x80000001, 0x3e566ffd, 0x2, 0x5, 0x0, 0xe199, 0x101, 0x20, 0xab94, 0x8020000, 0x0, 0xff, 0x1, 0x80000001, 0x1d31, 0x3, 0x884, 0x5, 0x7, 0x5, 0x8, 0x6, 0x1, 0x3, 0x7, 0xfffffe01, 0xfd6f, 0xffff4337, 0x5, 0x7f, 0x739acb7a, 0x68c3, 0x8, 0xc0, 0x9a2, 0x2], [0x2, 0x80000000, 0xd473, 0x5, 0xfffff801, 0x0, 0x81, 0x901, 0x7, 0xa4, 0x8, 0x7, 0x3a, 0x1, 0x2, 0xfff, 0x5, 0xffffffff, 0x8, 0x3, 0x4, 0x2, 0x3f, 0x0, 0xfffffff8, 0x8, 0x4, 0x6, 0x6, 0x4, 0xc6, 0x4ba, 0x385146b, 0x4, 0x1, 0x81, 0xb6, 0x7, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x6, 0x0, 0x7, 0x5, 0x9, 0x6, 0x1bf15fba, 0x3, 0x7fff, 0x9, 0xfffffffb, 0x2, 0x9, 0xff, 0x9a, 0x7fff, 0x6, 0x3, 0x1, 0x2, 0x1f], [0x4, 0x1000, 0x0, 0x80000000, 0x4, 0x6, 0x542, 0x100, 0x8001, 0x87, 0x4, 0x0, 0x99, 0x1, 0x0, 0x20, 0xdab6, 0x9, 0x40, 0x0, 0x2, 0x20, 0xffffffe0, 0x100, 0x1, 0x601, 0x3, 0x1, 0x401, 0x7fffffff, 0x5, 0x3, 0x200, 0x8001, 0x101, 0x9, 0x0, 0x1000, 0x2, 0x9, 0x6, 0x4, 0x1ff, 0x401, 0x1, 0xdcf, 0xfe, 0xe44, 0x0, 0x5, 0x89a, 0x80, 0x3, 0x9, 0x7fff, 0x6, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3], 0x16, ['/dev/loop#\x00', '/dev/loop#\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x438}, 0x1, 0x0, 0x0, 0x88b4}, 0x480c4) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x9, 0x2c24c0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000840)={0x3216, 0x100000001, 0x8, 0xc266}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0xbde5, 0xbf, 0xafa, 0x800, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4, 0xd}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a40)={r2, &(0x7f0000000900)="78dee0e489793816ec84ba173c78663054b9a8db80cd4b8a5eb8c99d81a2169eb8d7e1366c5a9118af65abef2455ffe0d6b7622d8c85ea69796102d6db8ba808be998aff5d8d973d9c37e44c66867eade0bfd8015d61f804123e104edf1f092e6effbec23ebc6a27852f0e34ccfed9", &(0x7f0000000980)=@buf="d1ac4e15aacf11e696771bd3afcf45bdd733580fe5b8c129f1af7e1cbfcbc1396e968ad112e616192011974a258a89e9ed31c688067d0148b63dab817484c4e1f82b257c858b9116e8757591a03d33a4d8ab444cbd77f91ca147c03e626688d8b6ba7c4058806b2229fca459660f8189802b86a1cce78899c82953aa7a016f76da0b057b461e60f083eb7b55fc86bbf714107dfcdc9765a9e2582a79d69b4b44a45a52045b59", 0x4}, 0x20) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000a80)={0x1f, 0x1b7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=@ipv4_getnexthop={0x2c, 0x6a, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x4800) r3 = getpgrp(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000bc0)='ns/time\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c00), 0x101000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000c40)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x94, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xff, 0x1f}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}]}, 0x94}, 0x1, 0x0, 0x0, 0x44084}, 0x4000000) syz_clone(0x6200a100, &(0x7f0000000e00)="b75705726f985ac68a0af625268ee05996c76b7051f1aa020981446b4bc81a54410155f350eb2a524c2bb2c660cd4bb3ebc5141101bd9d964a96c2c443da7fbd5c7a1094ef1c752a1fa492667958355e28bd746dceb9dda8ea4087aa6155e4b854d95a644b17e0a08b2d03c52a7a8a152b7329e8b60a068caaff713ed158b400d0cc93d978ee920d9fa78601f25f92a2215ab88624fe175b56694e5b15588c5572b90ca1e3b26c6fd75f27e5026531ec7323b5f2a1d62ebb142ba20883c8689e73d014dc403f0576972a7f81bd4319ee73cf0d96a707b3700c8f1701d5202dfc044d1f28729854be721129822f4d520e427d5d", 0xf3, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="be18c14ef67ab28965b53ce1ab80ddbc0736819a9636a12f3900df8d47adddd8b805ed8884ac8fb0a2154cf52262b39e579725a19c9901dad8ddd6cd5f5cfeaa7583a25523ca4b25838fb73a39576b4b43163174a351") r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001640)) 20:20:49 executing program 5: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x5) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x2002) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f00000000c0), 0x2, 0x410800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0x1, &(0x7f0000000100)="4066dc829b8fbcadc8e52b141a528aae1c21b4fb2eb906105a4d009debdd8011331090f54c46c52b54f44143c4f2dbfacce6c423ed25b407e8fdb9239b463c68cab0dc0dbfa6a1042df475799d4c827f3557907c1ace3aae70211cb2f5e5a021422f2924f3db37cc97138dc5ccd9c136ebb996d3545938415313923b9ffffcaee2f011d283bd52da7704d461a912968743d75fdaaaa9c69ae41765ff3a8b84dd5c4509d02fddfbbe6dbb7c019858c43eb9afa31e5f2247bac26c8f5cc575927074f751b29fb673fc0e", &(0x7f0000000200)=@udp6, 0x1}, 0x20) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000280)=0xff) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000002c0)={0x8, {0x7, 0xa3ef, 0x3f, 0x0, 0x2, 0x3}}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x11) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x300, 0x70bd2d, 0xffffff83, {0x4, 0x1, 0x5, [0x6, 0x5, 0x5, 0x10000, 0x0, 0x1, 0x5, 0x6, 0x7, 0x9, 0x4, 0x91c7, 0x3f, 0x81, 0x6c95, 0x0, 0xffff, 0x1, 0x200, 0xc5, 0x401, 0x800, 0x8, 0x80000001, 0x2, 0xac0c, 0xfc6, 0x3, 0x7, 0x400, 0x7fff, 0x6, 0x7fff, 0x5, 0x2, 0x10000, 0x81, 0x5867, 0x100, 0x0, 0xffffffff, 0x2, 0x800, 0x1, 0x182, 0x7, 0x16, 0x4, 0x6, 0x6212, 0x0, 0x1, 0xffffffe1, 0x8001, 0xffff, 0x0, 0x81, 0x8, 0x0, 0x101, 0x400, 0xfffffffd, 0x5], [0x10001, 0x800, 0x9, 0x10001, 0x0, 0xf2, 0x64d, 0xca5, 0x5, 0x4, 0xffffffff, 0x9, 0x0, 0xfffffff8, 0x400, 0xffffffff, 0x8, 0x81, 0x0, 0x836, 0xffff, 0x4, 0x1, 0xffff, 0x7, 0x1, 0x70000000, 0x80000001, 0x80000001, 0x3e566ffd, 0x2, 0x5, 0x0, 0xe199, 0x101, 0x20, 0xab94, 0x8020000, 0x0, 0xff, 0x1, 0x80000001, 0x1d31, 0x3, 0x884, 0x5, 0x7, 0x5, 0x8, 0x6, 0x1, 0x3, 0x7, 0xfffffe01, 0xfd6f, 0xffff4337, 0x5, 0x7f, 0x739acb7a, 0x68c3, 0x8, 0xc0, 0x9a2, 0x2], [0x2, 0x80000000, 0xd473, 0x5, 0xfffff801, 0x0, 0x81, 0x901, 0x7, 0xa4, 0x8, 0x7, 0x3a, 0x1, 0x2, 0xfff, 0x5, 0xffffffff, 0x8, 0x3, 0x4, 0x2, 0x3f, 0x0, 0xfffffff8, 0x8, 0x4, 0x6, 0x6, 0x4, 0xc6, 0x4ba, 0x385146b, 0x4, 0x1, 0x81, 0xb6, 0x7, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x6, 0x0, 0x7, 0x5, 0x9, 0x6, 0x1bf15fba, 0x3, 0x7fff, 0x9, 0xfffffffb, 0x2, 0x9, 0xff, 0x9a, 0x7fff, 0x6, 0x3, 0x1, 0x2, 0x1f], [0x4, 0x1000, 0x0, 0x80000000, 0x4, 0x6, 0x542, 0x100, 0x8001, 0x87, 0x4, 0x0, 0x99, 0x1, 0x0, 0x20, 0xdab6, 0x9, 0x40, 0x0, 0x2, 0x20, 0xffffffe0, 0x100, 0x1, 0x601, 0x3, 0x1, 0x401, 0x7fffffff, 0x5, 0x3, 0x200, 0x8001, 0x101, 0x9, 0x0, 0x1000, 0x2, 0x9, 0x6, 0x4, 0x1ff, 0x401, 0x1, 0xdcf, 0xfe, 0xe44, 0x0, 0x5, 0x89a, 0x80, 0x3, 0x9, 0x7fff, 0x6, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3], 0x16, ['/dev/loop#\x00', '/dev/loop#\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x438}, 0x1, 0x0, 0x0, 0x88b4}, 0x480c4) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x9, 0x2c24c0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000840)={0x3216, 0x100000001, 0x8, 0xc266}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0xbde5, 0xbf, 0xafa, 0x800, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4, 0xd}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a40)={r2, &(0x7f0000000900)="78dee0e489793816ec84ba173c78663054b9a8db80cd4b8a5eb8c99d81a2169eb8d7e1366c5a9118af65abef2455ffe0d6b7622d8c85ea69796102d6db8ba808be998aff5d8d973d9c37e44c66867eade0bfd8015d61f804123e104edf1f092e6effbec23ebc6a27852f0e34ccfed9", &(0x7f0000000980)=@buf="d1ac4e15aacf11e696771bd3afcf45bdd733580fe5b8c129f1af7e1cbfcbc1396e968ad112e616192011974a258a89e9ed31c688067d0148b63dab817484c4e1f82b257c858b9116e8757591a03d33a4d8ab444cbd77f91ca147c03e626688d8b6ba7c4058806b2229fca459660f8189802b86a1cce78899c82953aa7a016f76da0b057b461e60f083eb7b55fc86bbf714107dfcdc9765a9e2582a79d69b4b44a45a52045b59", 0x4}, 0x20) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000a80)={0x1f, 0x1b7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=@ipv4_getnexthop={0x2c, 0x6a, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x4800) r3 = getpgrp(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000bc0)='ns/time\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c00), 0x101000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000c40)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x94, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xff, 0x1f}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}]}, 0x94}, 0x1, 0x0, 0x0, 0x44084}, 0x4000000) syz_clone(0x6200a100, &(0x7f0000000e00)="b75705726f985ac68a0af625268ee05996c76b7051f1aa020981446b4bc81a54410155f350eb2a524c2bb2c660cd4bb3ebc5141101bd9d964a96c2c443da7fbd5c7a1094ef1c752a1fa492667958355e28bd746dceb9dda8ea4087aa6155e4b854d95a644b17e0a08b2d03c52a7a8a152b7329e8b60a068caaff713ed158b400d0cc93d978ee920d9fa78601f25f92a2215ab88624fe175b56694e5b15588c5572b90ca1e3b26c6fd75f27e5026531ec7323b5f2a1d62ebb142ba20883c8689e73d014dc403f0576972a7f81bd4319ee73cf0d96a707b3700c8f1701d5202dfc044d1f28729854be721129822f4d520e427d5d", 0xf3, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="be18c14ef67ab28965b53ce1ab80ddbc0736819a9636a12f3900df8d47adddd8b805ed8884ac8fb0a2154cf52262b39e579725a19c9901dad8ddd6cd5f5cfeaa7583a25523ca4b25838fb73a39576b4b43163174a351") r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001640)) 20:20:49 executing program 4: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x5) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x2002) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f00000000c0), 0x2, 0x410800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0x1, &(0x7f0000000100)="4066dc829b8fbcadc8e52b141a528aae1c21b4fb2eb906105a4d009debdd8011331090f54c46c52b54f44143c4f2dbfacce6c423ed25b407e8fdb9239b463c68cab0dc0dbfa6a1042df475799d4c827f3557907c1ace3aae70211cb2f5e5a021422f2924f3db37cc97138dc5ccd9c136ebb996d3545938415313923b9ffffcaee2f011d283bd52da7704d461a912968743d75fdaaaa9c69ae41765ff3a8b84dd5c4509d02fddfbbe6dbb7c019858c43eb9afa31e5f2247bac26c8f5cc575927074f751b29fb673fc0e", &(0x7f0000000200)=@udp6, 0x1}, 0x20) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000280)=0xff) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000002c0)={0x8, {0x7, 0xa3ef, 0x3f, 0x0, 0x2, 0x3}}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x11) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x300, 0x70bd2d, 0xffffff83, {0x4, 0x1, 0x5, [0x6, 0x5, 0x5, 0x10000, 0x0, 0x1, 0x5, 0x6, 0x7, 0x9, 0x4, 0x91c7, 0x3f, 0x81, 0x6c95, 0x0, 0xffff, 0x1, 0x200, 0xc5, 0x401, 0x800, 0x8, 0x80000001, 0x2, 0xac0c, 0xfc6, 0x3, 0x7, 0x400, 0x7fff, 0x6, 0x7fff, 0x5, 0x2, 0x10000, 0x81, 0x5867, 0x100, 0x0, 0xffffffff, 0x2, 0x800, 0x1, 0x182, 0x7, 0x16, 0x4, 0x6, 0x6212, 0x0, 0x1, 0xffffffe1, 0x8001, 0xffff, 0x0, 0x81, 0x8, 0x0, 0x101, 0x400, 0xfffffffd, 0x5], [0x10001, 0x800, 0x9, 0x10001, 0x0, 0xf2, 0x64d, 0xca5, 0x5, 0x4, 0xffffffff, 0x9, 0x0, 0xfffffff8, 0x400, 0xffffffff, 0x8, 0x81, 0x0, 0x836, 0xffff, 0x4, 0x1, 0xffff, 0x7, 0x1, 0x70000000, 0x80000001, 0x80000001, 0x3e566ffd, 0x2, 0x5, 0x0, 0xe199, 0x101, 0x20, 0xab94, 0x8020000, 0x0, 0xff, 0x1, 0x80000001, 0x1d31, 0x3, 0x884, 0x5, 0x7, 0x5, 0x8, 0x6, 0x1, 0x3, 0x7, 0xfffffe01, 0xfd6f, 0xffff4337, 0x5, 0x7f, 0x739acb7a, 0x68c3, 0x8, 0xc0, 0x9a2, 0x2], [0x2, 0x80000000, 0xd473, 0x5, 0xfffff801, 0x0, 0x81, 0x901, 0x7, 0xa4, 0x8, 0x7, 0x3a, 0x1, 0x2, 0xfff, 0x5, 0xffffffff, 0x8, 0x3, 0x4, 0x2, 0x3f, 0x0, 0xfffffff8, 0x8, 0x4, 0x6, 0x6, 0x4, 0xc6, 0x4ba, 0x385146b, 0x4, 0x1, 0x81, 0xb6, 0x7, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x6, 0x0, 0x7, 0x5, 0x9, 0x6, 0x1bf15fba, 0x3, 0x7fff, 0x9, 0xfffffffb, 0x2, 0x9, 0xff, 0x9a, 0x7fff, 0x6, 0x3, 0x1, 0x2, 0x1f], [0x4, 0x1000, 0x0, 0x80000000, 0x4, 0x6, 0x542, 0x100, 0x8001, 0x87, 0x4, 0x0, 0x99, 0x1, 0x0, 0x20, 0xdab6, 0x9, 0x40, 0x0, 0x2, 0x20, 0xffffffe0, 0x100, 0x1, 0x601, 0x3, 0x1, 0x401, 0x7fffffff, 0x5, 0x3, 0x200, 0x8001, 0x101, 0x9, 0x0, 0x1000, 0x2, 0x9, 0x6, 0x4, 0x1ff, 0x401, 0x1, 0xdcf, 0xfe, 0xe44, 0x0, 0x5, 0x89a, 0x80, 0x3, 0x9, 0x7fff, 0x6, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3], 0x16, ['/dev/loop#\x00', '/dev/loop#\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x438}, 0x1, 0x0, 0x0, 0x88b4}, 0x480c4) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x9, 0x2c24c0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000840)={0x3216, 0x100000001, 0x8, 0xc266}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0xbde5, 0xbf, 0xafa, 0x800, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4, 0xd}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a40)={r2, &(0x7f0000000900)="78dee0e489793816ec84ba173c78663054b9a8db80cd4b8a5eb8c99d81a2169eb8d7e1366c5a9118af65abef2455ffe0d6b7622d8c85ea69796102d6db8ba808be998aff5d8d973d9c37e44c66867eade0bfd8015d61f804123e104edf1f092e6effbec23ebc6a27852f0e34ccfed9", &(0x7f0000000980)=@buf="d1ac4e15aacf11e696771bd3afcf45bdd733580fe5b8c129f1af7e1cbfcbc1396e968ad112e616192011974a258a89e9ed31c688067d0148b63dab817484c4e1f82b257c858b9116e8757591a03d33a4d8ab444cbd77f91ca147c03e626688d8b6ba7c4058806b2229fca459660f8189802b86a1cce78899c82953aa7a016f76da0b057b461e60f083eb7b55fc86bbf714107dfcdc9765a9e2582a79d69b4b44a45a52045b59", 0x4}, 0x20) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000a80)={0x1f, 0x1b7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=@ipv4_getnexthop={0x2c, 0x6a, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x4800) r3 = getpgrp(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000bc0)='ns/time\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c00), 0x101000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000c40)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x94, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xff, 0x1f}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}]}, 0x94}, 0x1, 0x0, 0x0, 0x44084}, 0x4000000) syz_clone(0x6200a100, &(0x7f0000000e00)="b75705726f985ac68a0af625268ee05996c76b7051f1aa020981446b4bc81a54410155f350eb2a524c2bb2c660cd4bb3ebc5141101bd9d964a96c2c443da7fbd5c7a1094ef1c752a1fa492667958355e28bd746dceb9dda8ea4087aa6155e4b854d95a644b17e0a08b2d03c52a7a8a152b7329e8b60a068caaff713ed158b400d0cc93d978ee920d9fa78601f25f92a2215ab88624fe175b56694e5b15588c5572b90ca1e3b26c6fd75f27e5026531ec7323b5f2a1d62ebb142ba20883c8689e73d014dc403f0576972a7f81bd4319ee73cf0d96a707b3700c8f1701d5202dfc044d1f28729854be721129822f4d520e427d5d", 0xf3, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="be18c14ef67ab28965b53ce1ab80ddbc0736819a9636a12f3900df8d47adddd8b805ed8884ac8fb0a2154cf52262b39e579725a19c9901dad8ddd6cd5f5cfeaa7583a25523ca4b25838fb73a39576b4b43163174a351") r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001640)) 20:20:49 executing program 0: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x5) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x2002) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f00000000c0), 0x2, 0x410800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0x1, &(0x7f0000000100)="4066dc829b8fbcadc8e52b141a528aae1c21b4fb2eb906105a4d009debdd8011331090f54c46c52b54f44143c4f2dbfacce6c423ed25b407e8fdb9239b463c68cab0dc0dbfa6a1042df475799d4c827f3557907c1ace3aae70211cb2f5e5a021422f2924f3db37cc97138dc5ccd9c136ebb996d3545938415313923b9ffffcaee2f011d283bd52da7704d461a912968743d75fdaaaa9c69ae41765ff3a8b84dd5c4509d02fddfbbe6dbb7c019858c43eb9afa31e5f2247bac26c8f5cc575927074f751b29fb673fc0e", &(0x7f0000000200)=@udp6, 0x1}, 0x20) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000280)=0xff) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000002c0)={0x8, {0x7, 0xa3ef, 0x3f, 0x0, 0x2, 0x3}}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x11) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x300, 0x70bd2d, 0xffffff83, {0x4, 0x1, 0x5, [0x6, 0x5, 0x5, 0x10000, 0x0, 0x1, 0x5, 0x6, 0x7, 0x9, 0x4, 0x91c7, 0x3f, 0x81, 0x6c95, 0x0, 0xffff, 0x1, 0x200, 0xc5, 0x401, 0x800, 0x8, 0x80000001, 0x2, 0xac0c, 0xfc6, 0x3, 0x7, 0x400, 0x7fff, 0x6, 0x7fff, 0x5, 0x2, 0x10000, 0x81, 0x5867, 0x100, 0x0, 0xffffffff, 0x2, 0x800, 0x1, 0x182, 0x7, 0x16, 0x4, 0x6, 0x6212, 0x0, 0x1, 0xffffffe1, 0x8001, 0xffff, 0x0, 0x81, 0x8, 0x0, 0x101, 0x400, 0xfffffffd, 0x5], [0x10001, 0x800, 0x9, 0x10001, 0x0, 0xf2, 0x64d, 0xca5, 0x5, 0x4, 0xffffffff, 0x9, 0x0, 0xfffffff8, 0x400, 0xffffffff, 0x8, 0x81, 0x0, 0x836, 0xffff, 0x4, 0x1, 0xffff, 0x7, 0x1, 0x70000000, 0x80000001, 0x80000001, 0x3e566ffd, 0x2, 0x5, 0x0, 0xe199, 0x101, 0x20, 0xab94, 0x8020000, 0x0, 0xff, 0x1, 0x80000001, 0x1d31, 0x3, 0x884, 0x5, 0x7, 0x5, 0x8, 0x6, 0x1, 0x3, 0x7, 0xfffffe01, 0xfd6f, 0xffff4337, 0x5, 0x7f, 0x739acb7a, 0x68c3, 0x8, 0xc0, 0x9a2, 0x2], [0x2, 0x80000000, 0xd473, 0x5, 0xfffff801, 0x0, 0x81, 0x901, 0x7, 0xa4, 0x8, 0x7, 0x3a, 0x1, 0x2, 0xfff, 0x5, 0xffffffff, 0x8, 0x3, 0x4, 0x2, 0x3f, 0x0, 0xfffffff8, 0x8, 0x4, 0x6, 0x6, 0x4, 0xc6, 0x4ba, 0x385146b, 0x4, 0x1, 0x81, 0xb6, 0x7, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x6, 0x0, 0x7, 0x5, 0x9, 0x6, 0x1bf15fba, 0x3, 0x7fff, 0x9, 0xfffffffb, 0x2, 0x9, 0xff, 0x9a, 0x7fff, 0x6, 0x3, 0x1, 0x2, 0x1f], [0x4, 0x1000, 0x0, 0x80000000, 0x4, 0x6, 0x542, 0x100, 0x8001, 0x87, 0x4, 0x0, 0x99, 0x1, 0x0, 0x20, 0xdab6, 0x9, 0x40, 0x0, 0x2, 0x20, 0xffffffe0, 0x100, 0x1, 0x601, 0x3, 0x1, 0x401, 0x7fffffff, 0x5, 0x3, 0x200, 0x8001, 0x101, 0x9, 0x0, 0x1000, 0x2, 0x9, 0x6, 0x4, 0x1ff, 0x401, 0x1, 0xdcf, 0xfe, 0xe44, 0x0, 0x5, 0x89a, 0x80, 0x3, 0x9, 0x7fff, 0x6, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3], 0x16, ['/dev/loop#\x00', '/dev/loop#\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x438}, 0x1, 0x0, 0x0, 0x88b4}, 0x480c4) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x9, 0x2c24c0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000840)={0x3216, 0x100000001, 0x8, 0xc266}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0xbde5, 0xbf, 0xafa, 0x800, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4, 0xd}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a40)={r2, &(0x7f0000000900)="78dee0e489793816ec84ba173c78663054b9a8db80cd4b8a5eb8c99d81a2169eb8d7e1366c5a9118af65abef2455ffe0d6b7622d8c85ea69796102d6db8ba808be998aff5d8d973d9c37e44c66867eade0bfd8015d61f804123e104edf1f092e6effbec23ebc6a27852f0e34ccfed9", &(0x7f0000000980)=@buf="d1ac4e15aacf11e696771bd3afcf45bdd733580fe5b8c129f1af7e1cbfcbc1396e968ad112e616192011974a258a89e9ed31c688067d0148b63dab817484c4e1f82b257c858b9116e8757591a03d33a4d8ab444cbd77f91ca147c03e626688d8b6ba7c4058806b2229fca459660f8189802b86a1cce78899c82953aa7a016f76da0b057b461e60f083eb7b55fc86bbf714107dfcdc9765a9e2582a79d69b4b44a45a52045b59", 0x4}, 0x20) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000a80)={0x1f, 0x1b7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=@ipv4_getnexthop={0x2c, 0x6a, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x4800) r3 = getpgrp(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000bc0)='ns/time\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c00), 0x101000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000c40)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x94, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xff, 0x1f}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}]}, 0x94}, 0x1, 0x0, 0x0, 0x44084}, 0x4000000) syz_clone(0x6200a100, &(0x7f0000000e00)="b75705726f985ac68a0af625268ee05996c76b7051f1aa020981446b4bc81a54410155f350eb2a524c2bb2c660cd4bb3ebc5141101bd9d964a96c2c443da7fbd5c7a1094ef1c752a1fa492667958355e28bd746dceb9dda8ea4087aa6155e4b854d95a644b17e0a08b2d03c52a7a8a152b7329e8b60a068caaff713ed158b400d0cc93d978ee920d9fa78601f25f92a2215ab88624fe175b56694e5b15588c5572b90ca1e3b26c6fd75f27e5026531ec7323b5f2a1d62ebb142ba20883c8689e73d014dc403f0576972a7f81bd4319ee73cf0d96a707b3700c8f1701d5202dfc044d1f28729854be721129822f4d520e427d5d", 0xf3, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="be18c14ef67ab28965b53ce1ab80ddbc0736819a9636a12f3900df8d47adddd8b805ed8884ac8fb0a2154cf52262b39e579725a19c9901dad8ddd6cd5f5cfeaa7583a25523ca4b25838fb73a39576b4b43163174a351") r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001640)) 20:20:49 executing program 2: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x5) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x2002) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f00000000c0), 0x2, 0x410800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0x1, &(0x7f0000000100)="4066dc829b8fbcadc8e52b141a528aae1c21b4fb2eb906105a4d009debdd8011331090f54c46c52b54f44143c4f2dbfacce6c423ed25b407e8fdb9239b463c68cab0dc0dbfa6a1042df475799d4c827f3557907c1ace3aae70211cb2f5e5a021422f2924f3db37cc97138dc5ccd9c136ebb996d3545938415313923b9ffffcaee2f011d283bd52da7704d461a912968743d75fdaaaa9c69ae41765ff3a8b84dd5c4509d02fddfbbe6dbb7c019858c43eb9afa31e5f2247bac26c8f5cc575927074f751b29fb673fc0e", &(0x7f0000000200)=@udp6, 0x1}, 0x20) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000280)=0xff) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000002c0)={0x8, {0x7, 0xa3ef, 0x3f, 0x0, 0x2, 0x3}}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x11) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x300, 0x70bd2d, 0xffffff83, {0x4, 0x1, 0x5, [0x6, 0x5, 0x5, 0x10000, 0x0, 0x1, 0x5, 0x6, 0x7, 0x9, 0x4, 0x91c7, 0x3f, 0x81, 0x6c95, 0x0, 0xffff, 0x1, 0x200, 0xc5, 0x401, 0x800, 0x8, 0x80000001, 0x2, 0xac0c, 0xfc6, 0x3, 0x7, 0x400, 0x7fff, 0x6, 0x7fff, 0x5, 0x2, 0x10000, 0x81, 0x5867, 0x100, 0x0, 0xffffffff, 0x2, 0x800, 0x1, 0x182, 0x7, 0x16, 0x4, 0x6, 0x6212, 0x0, 0x1, 0xffffffe1, 0x8001, 0xffff, 0x0, 0x81, 0x8, 0x0, 0x101, 0x400, 0xfffffffd, 0x5], [0x10001, 0x800, 0x9, 0x10001, 0x0, 0xf2, 0x64d, 0xca5, 0x5, 0x4, 0xffffffff, 0x9, 0x0, 0xfffffff8, 0x400, 0xffffffff, 0x8, 0x81, 0x0, 0x836, 0xffff, 0x4, 0x1, 0xffff, 0x7, 0x1, 0x70000000, 0x80000001, 0x80000001, 0x3e566ffd, 0x2, 0x5, 0x0, 0xe199, 0x101, 0x20, 0xab94, 0x8020000, 0x0, 0xff, 0x1, 0x80000001, 0x1d31, 0x3, 0x884, 0x5, 0x7, 0x5, 0x8, 0x6, 0x1, 0x3, 0x7, 0xfffffe01, 0xfd6f, 0xffff4337, 0x5, 0x7f, 0x739acb7a, 0x68c3, 0x8, 0xc0, 0x9a2, 0x2], [0x2, 0x80000000, 0xd473, 0x5, 0xfffff801, 0x0, 0x81, 0x901, 0x7, 0xa4, 0x8, 0x7, 0x3a, 0x1, 0x2, 0xfff, 0x5, 0xffffffff, 0x8, 0x3, 0x4, 0x2, 0x3f, 0x0, 0xfffffff8, 0x8, 0x4, 0x6, 0x6, 0x4, 0xc6, 0x4ba, 0x385146b, 0x4, 0x1, 0x81, 0xb6, 0x7, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x6, 0x0, 0x7, 0x5, 0x9, 0x6, 0x1bf15fba, 0x3, 0x7fff, 0x9, 0xfffffffb, 0x2, 0x9, 0xff, 0x9a, 0x7fff, 0x6, 0x3, 0x1, 0x2, 0x1f], [0x4, 0x1000, 0x0, 0x80000000, 0x4, 0x6, 0x542, 0x100, 0x8001, 0x87, 0x4, 0x0, 0x99, 0x1, 0x0, 0x20, 0xdab6, 0x9, 0x40, 0x0, 0x2, 0x20, 0xffffffe0, 0x100, 0x1, 0x601, 0x3, 0x1, 0x401, 0x7fffffff, 0x5, 0x3, 0x200, 0x8001, 0x101, 0x9, 0x0, 0x1000, 0x2, 0x9, 0x6, 0x4, 0x1ff, 0x401, 0x1, 0xdcf, 0xfe, 0xe44, 0x0, 0x5, 0x89a, 0x80, 0x3, 0x9, 0x7fff, 0x6, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3], 0x16, ['/dev/loop#\x00', '/dev/loop#\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x438}, 0x1, 0x0, 0x0, 0x88b4}, 0x480c4) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x9, 0x2c24c0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000840)={0x3216, 0x100000001, 0x8, 0xc266}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0xbde5, 0xbf, 0xafa, 0x800, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4, 0xd}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a40)={r2, &(0x7f0000000900)="78dee0e489793816ec84ba173c78663054b9a8db80cd4b8a5eb8c99d81a2169eb8d7e1366c5a9118af65abef2455ffe0d6b7622d8c85ea69796102d6db8ba808be998aff5d8d973d9c37e44c66867eade0bfd8015d61f804123e104edf1f092e6effbec23ebc6a27852f0e34ccfed9", &(0x7f0000000980)=@buf="d1ac4e15aacf11e696771bd3afcf45bdd733580fe5b8c129f1af7e1cbfcbc1396e968ad112e616192011974a258a89e9ed31c688067d0148b63dab817484c4e1f82b257c858b9116e8757591a03d33a4d8ab444cbd77f91ca147c03e626688d8b6ba7c4058806b2229fca459660f8189802b86a1cce78899c82953aa7a016f76da0b057b461e60f083eb7b55fc86bbf714107dfcdc9765a9e2582a79d69b4b44a45a52045b59", 0x4}, 0x20) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000a80)={0x1f, 0x1b7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=@ipv4_getnexthop={0x2c, 0x6a, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x4800) r3 = getpgrp(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000bc0)='ns/time\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c00), 0x101000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000c40)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x94, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xff, 0x1f}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}]}, 0x94}, 0x1, 0x0, 0x0, 0x44084}, 0x4000000) syz_clone(0x6200a100, &(0x7f0000000e00)="b75705726f985ac68a0af625268ee05996c76b7051f1aa020981446b4bc81a54410155f350eb2a524c2bb2c660cd4bb3ebc5141101bd9d964a96c2c443da7fbd5c7a1094ef1c752a1fa492667958355e28bd746dceb9dda8ea4087aa6155e4b854d95a644b17e0a08b2d03c52a7a8a152b7329e8b60a068caaff713ed158b400d0cc93d978ee920d9fa78601f25f92a2215ab88624fe175b56694e5b15588c5572b90ca1e3b26c6fd75f27e5026531ec7323b5f2a1d62ebb142ba20883c8689e73d014dc403f0576972a7f81bd4319ee73cf0d96a707b3700c8f1701d5202dfc044d1f28729854be721129822f4d520e427d5d", 0xf3, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="be18c14ef67ab28965b53ce1ab80ddbc0736819a9636a12f3900df8d47adddd8b805ed8884ac8fb0a2154cf52262b39e579725a19c9901dad8ddd6cd5f5cfeaa7583a25523ca4b25838fb73a39576b4b43163174a351") r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001640)) 20:20:49 executing program 3: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x5) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x2002) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f00000000c0), 0x2, 0x410800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0x1, &(0x7f0000000100)="4066dc829b8fbcadc8e52b141a528aae1c21b4fb2eb906105a4d009debdd8011331090f54c46c52b54f44143c4f2dbfacce6c423ed25b407e8fdb9239b463c68cab0dc0dbfa6a1042df475799d4c827f3557907c1ace3aae70211cb2f5e5a021422f2924f3db37cc97138dc5ccd9c136ebb996d3545938415313923b9ffffcaee2f011d283bd52da7704d461a912968743d75fdaaaa9c69ae41765ff3a8b84dd5c4509d02fddfbbe6dbb7c019858c43eb9afa31e5f2247bac26c8f5cc575927074f751b29fb673fc0e", &(0x7f0000000200)=@udp6, 0x1}, 0x20) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000280)=0xff) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000002c0)={0x8, {0x7, 0xa3ef, 0x3f, 0x0, 0x2, 0x3}}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x11) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x300, 0x70bd2d, 0xffffff83, {0x4, 0x1, 0x5, [0x6, 0x5, 0x5, 0x10000, 0x0, 0x1, 0x5, 0x6, 0x7, 0x9, 0x4, 0x91c7, 0x3f, 0x81, 0x6c95, 0x0, 0xffff, 0x1, 0x200, 0xc5, 0x401, 0x800, 0x8, 0x80000001, 0x2, 0xac0c, 0xfc6, 0x3, 0x7, 0x400, 0x7fff, 0x6, 0x7fff, 0x5, 0x2, 0x10000, 0x81, 0x5867, 0x100, 0x0, 0xffffffff, 0x2, 0x800, 0x1, 0x182, 0x7, 0x16, 0x4, 0x6, 0x6212, 0x0, 0x1, 0xffffffe1, 0x8001, 0xffff, 0x0, 0x81, 0x8, 0x0, 0x101, 0x400, 0xfffffffd, 0x5], [0x10001, 0x800, 0x9, 0x10001, 0x0, 0xf2, 0x64d, 0xca5, 0x5, 0x4, 0xffffffff, 0x9, 0x0, 0xfffffff8, 0x400, 0xffffffff, 0x8, 0x81, 0x0, 0x836, 0xffff, 0x4, 0x1, 0xffff, 0x7, 0x1, 0x70000000, 0x80000001, 0x80000001, 0x3e566ffd, 0x2, 0x5, 0x0, 0xe199, 0x101, 0x20, 0xab94, 0x8020000, 0x0, 0xff, 0x1, 0x80000001, 0x1d31, 0x3, 0x884, 0x5, 0x7, 0x5, 0x8, 0x6, 0x1, 0x3, 0x7, 0xfffffe01, 0xfd6f, 0xffff4337, 0x5, 0x7f, 0x739acb7a, 0x68c3, 0x8, 0xc0, 0x9a2, 0x2], [0x2, 0x80000000, 0xd473, 0x5, 0xfffff801, 0x0, 0x81, 0x901, 0x7, 0xa4, 0x8, 0x7, 0x3a, 0x1, 0x2, 0xfff, 0x5, 0xffffffff, 0x8, 0x3, 0x4, 0x2, 0x3f, 0x0, 0xfffffff8, 0x8, 0x4, 0x6, 0x6, 0x4, 0xc6, 0x4ba, 0x385146b, 0x4, 0x1, 0x81, 0xb6, 0x7, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x6, 0x0, 0x7, 0x5, 0x9, 0x6, 0x1bf15fba, 0x3, 0x7fff, 0x9, 0xfffffffb, 0x2, 0x9, 0xff, 0x9a, 0x7fff, 0x6, 0x3, 0x1, 0x2, 0x1f], [0x4, 0x1000, 0x0, 0x80000000, 0x4, 0x6, 0x542, 0x100, 0x8001, 0x87, 0x4, 0x0, 0x99, 0x1, 0x0, 0x20, 0xdab6, 0x9, 0x40, 0x0, 0x2, 0x20, 0xffffffe0, 0x100, 0x1, 0x601, 0x3, 0x1, 0x401, 0x7fffffff, 0x5, 0x3, 0x200, 0x8001, 0x101, 0x9, 0x0, 0x1000, 0x2, 0x9, 0x6, 0x4, 0x1ff, 0x401, 0x1, 0xdcf, 0xfe, 0xe44, 0x0, 0x5, 0x89a, 0x80, 0x3, 0x9, 0x7fff, 0x6, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3], 0x16, ['/dev/loop#\x00', '/dev/loop#\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x438}, 0x1, 0x0, 0x0, 0x88b4}, 0x480c4) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x9, 0x2c24c0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000840)={0x3216, 0x100000001, 0x8, 0xc266}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0xbde5, 0xbf, 0xafa, 0x800, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4, 0xd}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a40)={r2, &(0x7f0000000900)="78dee0e489793816ec84ba173c78663054b9a8db80cd4b8a5eb8c99d81a2169eb8d7e1366c5a9118af65abef2455ffe0d6b7622d8c85ea69796102d6db8ba808be998aff5d8d973d9c37e44c66867eade0bfd8015d61f804123e104edf1f092e6effbec23ebc6a27852f0e34ccfed9", &(0x7f0000000980)=@buf="d1ac4e15aacf11e696771bd3afcf45bdd733580fe5b8c129f1af7e1cbfcbc1396e968ad112e616192011974a258a89e9ed31c688067d0148b63dab817484c4e1f82b257c858b9116e8757591a03d33a4d8ab444cbd77f91ca147c03e626688d8b6ba7c4058806b2229fca459660f8189802b86a1cce78899c82953aa7a016f76da0b057b461e60f083eb7b55fc86bbf714107dfcdc9765a9e2582a79d69b4b44a45a52045b59", 0x4}, 0x20) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000a80)={0x1f, 0x1b7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=@ipv4_getnexthop={0x2c, 0x6a, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x4800) r3 = getpgrp(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000bc0)='ns/time\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c00), 0x101000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000c40)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x94, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xff, 0x1f}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}]}, 0x94}, 0x1, 0x0, 0x0, 0x44084}, 0x4000000) syz_clone(0x6200a100, &(0x7f0000000e00)="b75705726f985ac68a0af625268ee05996c76b7051f1aa020981446b4bc81a54410155f350eb2a524c2bb2c660cd4bb3ebc5141101bd9d964a96c2c443da7fbd5c7a1094ef1c752a1fa492667958355e28bd746dceb9dda8ea4087aa6155e4b854d95a644b17e0a08b2d03c52a7a8a152b7329e8b60a068caaff713ed158b400d0cc93d978ee920d9fa78601f25f92a2215ab88624fe175b56694e5b15588c5572b90ca1e3b26c6fd75f27e5026531ec7323b5f2a1d62ebb142ba20883c8689e73d014dc403f0576972a7f81bd4319ee73cf0d96a707b3700c8f1701d5202dfc044d1f28729854be721129822f4d520e427d5d", 0xf3, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="be18c14ef67ab28965b53ce1ab80ddbc0736819a9636a12f3900df8d47adddd8b805ed8884ac8fb0a2154cf52262b39e579725a19c9901dad8ddd6cd5f5cfeaa7583a25523ca4b25838fb73a39576b4b43163174a351") r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001640)) 20:20:49 executing program 1: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x5) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x2002) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f00000000c0), 0x2, 0x410800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0x1, &(0x7f0000000100)="4066dc829b8fbcadc8e52b141a528aae1c21b4fb2eb906105a4d009debdd8011331090f54c46c52b54f44143c4f2dbfacce6c423ed25b407e8fdb9239b463c68cab0dc0dbfa6a1042df475799d4c827f3557907c1ace3aae70211cb2f5e5a021422f2924f3db37cc97138dc5ccd9c136ebb996d3545938415313923b9ffffcaee2f011d283bd52da7704d461a912968743d75fdaaaa9c69ae41765ff3a8b84dd5c4509d02fddfbbe6dbb7c019858c43eb9afa31e5f2247bac26c8f5cc575927074f751b29fb673fc0e", &(0x7f0000000200)=@udp6, 0x1}, 0x20) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000280)=0xff) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000002c0)={0x8, {0x7, 0xa3ef, 0x3f, 0x0, 0x2, 0x3}}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x11) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x300, 0x70bd2d, 0xffffff83, {0x4, 0x1, 0x5, [0x6, 0x5, 0x5, 0x10000, 0x0, 0x1, 0x5, 0x6, 0x7, 0x9, 0x4, 0x91c7, 0x3f, 0x81, 0x6c95, 0x0, 0xffff, 0x1, 0x200, 0xc5, 0x401, 0x800, 0x8, 0x80000001, 0x2, 0xac0c, 0xfc6, 0x3, 0x7, 0x400, 0x7fff, 0x6, 0x7fff, 0x5, 0x2, 0x10000, 0x81, 0x5867, 0x100, 0x0, 0xffffffff, 0x2, 0x800, 0x1, 0x182, 0x7, 0x16, 0x4, 0x6, 0x6212, 0x0, 0x1, 0xffffffe1, 0x8001, 0xffff, 0x0, 0x81, 0x8, 0x0, 0x101, 0x400, 0xfffffffd, 0x5], [0x10001, 0x800, 0x9, 0x10001, 0x0, 0xf2, 0x64d, 0xca5, 0x5, 0x4, 0xffffffff, 0x9, 0x0, 0xfffffff8, 0x400, 0xffffffff, 0x8, 0x81, 0x0, 0x836, 0xffff, 0x4, 0x1, 0xffff, 0x7, 0x1, 0x70000000, 0x80000001, 0x80000001, 0x3e566ffd, 0x2, 0x5, 0x0, 0xe199, 0x101, 0x20, 0xab94, 0x8020000, 0x0, 0xff, 0x1, 0x80000001, 0x1d31, 0x3, 0x884, 0x5, 0x7, 0x5, 0x8, 0x6, 0x1, 0x3, 0x7, 0xfffffe01, 0xfd6f, 0xffff4337, 0x5, 0x7f, 0x739acb7a, 0x68c3, 0x8, 0xc0, 0x9a2, 0x2], [0x2, 0x80000000, 0xd473, 0x5, 0xfffff801, 0x0, 0x81, 0x901, 0x7, 0xa4, 0x8, 0x7, 0x3a, 0x1, 0x2, 0xfff, 0x5, 0xffffffff, 0x8, 0x3, 0x4, 0x2, 0x3f, 0x0, 0xfffffff8, 0x8, 0x4, 0x6, 0x6, 0x4, 0xc6, 0x4ba, 0x385146b, 0x4, 0x1, 0x81, 0xb6, 0x7, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x6, 0x0, 0x7, 0x5, 0x9, 0x6, 0x1bf15fba, 0x3, 0x7fff, 0x9, 0xfffffffb, 0x2, 0x9, 0xff, 0x9a, 0x7fff, 0x6, 0x3, 0x1, 0x2, 0x1f], [0x4, 0x1000, 0x0, 0x80000000, 0x4, 0x6, 0x542, 0x100, 0x8001, 0x87, 0x4, 0x0, 0x99, 0x1, 0x0, 0x20, 0xdab6, 0x9, 0x40, 0x0, 0x2, 0x20, 0xffffffe0, 0x100, 0x1, 0x601, 0x3, 0x1, 0x401, 0x7fffffff, 0x5, 0x3, 0x200, 0x8001, 0x101, 0x9, 0x0, 0x1000, 0x2, 0x9, 0x6, 0x4, 0x1ff, 0x401, 0x1, 0xdcf, 0xfe, 0xe44, 0x0, 0x5, 0x89a, 0x80, 0x3, 0x9, 0x7fff, 0x6, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3], 0x16, ['/dev/loop#\x00', '/dev/loop#\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x438}, 0x1, 0x0, 0x0, 0x88b4}, 0x480c4) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x9, 0x2c24c0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000840)={0x3216, 0x100000001, 0x8, 0xc266}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0xbde5, 0xbf, 0xafa, 0x800, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4, 0xd}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a40)={r2, &(0x7f0000000900)="78dee0e489793816ec84ba173c78663054b9a8db80cd4b8a5eb8c99d81a2169eb8d7e1366c5a9118af65abef2455ffe0d6b7622d8c85ea69796102d6db8ba808be998aff5d8d973d9c37e44c66867eade0bfd8015d61f804123e104edf1f092e6effbec23ebc6a27852f0e34ccfed9", &(0x7f0000000980)=@buf="d1ac4e15aacf11e696771bd3afcf45bdd733580fe5b8c129f1af7e1cbfcbc1396e968ad112e616192011974a258a89e9ed31c688067d0148b63dab817484c4e1f82b257c858b9116e8757591a03d33a4d8ab444cbd77f91ca147c03e626688d8b6ba7c4058806b2229fca459660f8189802b86a1cce78899c82953aa7a016f76da0b057b461e60f083eb7b55fc86bbf714107dfcdc9765a9e2582a79d69b4b44a45a52045b59", 0x4}, 0x20) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000a80)={0x1f, 0x1b7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=@ipv4_getnexthop={0x2c, 0x6a, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x4800) r3 = getpgrp(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000bc0)='ns/time\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c00), 0x101000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000c40)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x94, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xff, 0x1f}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}]}, 0x94}, 0x1, 0x0, 0x0, 0x44084}, 0x4000000) syz_clone(0x6200a100, &(0x7f0000000e00)="b75705726f985ac68a0af625268ee05996c76b7051f1aa020981446b4bc81a54410155f350eb2a524c2bb2c660cd4bb3ebc5141101bd9d964a96c2c443da7fbd5c7a1094ef1c752a1fa492667958355e28bd746dceb9dda8ea4087aa6155e4b854d95a644b17e0a08b2d03c52a7a8a152b7329e8b60a068caaff713ed158b400d0cc93d978ee920d9fa78601f25f92a2215ab88624fe175b56694e5b15588c5572b90ca1e3b26c6fd75f27e5026531ec7323b5f2a1d62ebb142ba20883c8689e73d014dc403f0576972a7f81bd4319ee73cf0d96a707b3700c8f1701d5202dfc044d1f28729854be721129822f4d520e427d5d", 0xf3, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="be18c14ef67ab28965b53ce1ab80ddbc0736819a9636a12f3900df8d47adddd8b805ed8884ac8fb0a2154cf52262b39e579725a19c9901dad8ddd6cd5f5cfeaa7583a25523ca4b25838fb73a39576b4b43163174a351") r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001640)) 20:20:50 executing program 5: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x5) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x2002) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f00000000c0), 0x2, 0x410800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0x1, &(0x7f0000000100)="4066dc829b8fbcadc8e52b141a528aae1c21b4fb2eb906105a4d009debdd8011331090f54c46c52b54f44143c4f2dbfacce6c423ed25b407e8fdb9239b463c68cab0dc0dbfa6a1042df475799d4c827f3557907c1ace3aae70211cb2f5e5a021422f2924f3db37cc97138dc5ccd9c136ebb996d3545938415313923b9ffffcaee2f011d283bd52da7704d461a912968743d75fdaaaa9c69ae41765ff3a8b84dd5c4509d02fddfbbe6dbb7c019858c43eb9afa31e5f2247bac26c8f5cc575927074f751b29fb673fc0e", &(0x7f0000000200)=@udp6, 0x1}, 0x20) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000280)=0xff) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000002c0)={0x8, {0x7, 0xa3ef, 0x3f, 0x0, 0x2, 0x3}}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x11) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x300, 0x70bd2d, 0xffffff83, {0x4, 0x1, 0x5, [0x6, 0x5, 0x5, 0x10000, 0x0, 0x1, 0x5, 0x6, 0x7, 0x9, 0x4, 0x91c7, 0x3f, 0x81, 0x6c95, 0x0, 0xffff, 0x1, 0x200, 0xc5, 0x401, 0x800, 0x8, 0x80000001, 0x2, 0xac0c, 0xfc6, 0x3, 0x7, 0x400, 0x7fff, 0x6, 0x7fff, 0x5, 0x2, 0x10000, 0x81, 0x5867, 0x100, 0x0, 0xffffffff, 0x2, 0x800, 0x1, 0x182, 0x7, 0x16, 0x4, 0x6, 0x6212, 0x0, 0x1, 0xffffffe1, 0x8001, 0xffff, 0x0, 0x81, 0x8, 0x0, 0x101, 0x400, 0xfffffffd, 0x5], [0x10001, 0x800, 0x9, 0x10001, 0x0, 0xf2, 0x64d, 0xca5, 0x5, 0x4, 0xffffffff, 0x9, 0x0, 0xfffffff8, 0x400, 0xffffffff, 0x8, 0x81, 0x0, 0x836, 0xffff, 0x4, 0x1, 0xffff, 0x7, 0x1, 0x70000000, 0x80000001, 0x80000001, 0x3e566ffd, 0x2, 0x5, 0x0, 0xe199, 0x101, 0x20, 0xab94, 0x8020000, 0x0, 0xff, 0x1, 0x80000001, 0x1d31, 0x3, 0x884, 0x5, 0x7, 0x5, 0x8, 0x6, 0x1, 0x3, 0x7, 0xfffffe01, 0xfd6f, 0xffff4337, 0x5, 0x7f, 0x739acb7a, 0x68c3, 0x8, 0xc0, 0x9a2, 0x2], [0x2, 0x80000000, 0xd473, 0x5, 0xfffff801, 0x0, 0x81, 0x901, 0x7, 0xa4, 0x8, 0x7, 0x3a, 0x1, 0x2, 0xfff, 0x5, 0xffffffff, 0x8, 0x3, 0x4, 0x2, 0x3f, 0x0, 0xfffffff8, 0x8, 0x4, 0x6, 0x6, 0x4, 0xc6, 0x4ba, 0x385146b, 0x4, 0x1, 0x81, 0xb6, 0x7, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x6, 0x0, 0x7, 0x5, 0x9, 0x6, 0x1bf15fba, 0x3, 0x7fff, 0x9, 0xfffffffb, 0x2, 0x9, 0xff, 0x9a, 0x7fff, 0x6, 0x3, 0x1, 0x2, 0x1f], [0x4, 0x1000, 0x0, 0x80000000, 0x4, 0x6, 0x542, 0x100, 0x8001, 0x87, 0x4, 0x0, 0x99, 0x1, 0x0, 0x20, 0xdab6, 0x9, 0x40, 0x0, 0x2, 0x20, 0xffffffe0, 0x100, 0x1, 0x601, 0x3, 0x1, 0x401, 0x7fffffff, 0x5, 0x3, 0x200, 0x8001, 0x101, 0x9, 0x0, 0x1000, 0x2, 0x9, 0x6, 0x4, 0x1ff, 0x401, 0x1, 0xdcf, 0xfe, 0xe44, 0x0, 0x5, 0x89a, 0x80, 0x3, 0x9, 0x7fff, 0x6, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3], 0x16, ['/dev/loop#\x00', '/dev/loop#\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x438}, 0x1, 0x0, 0x0, 0x88b4}, 0x480c4) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x9, 0x2c24c0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000840)={0x3216, 0x100000001, 0x8, 0xc266}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0xbde5, 0xbf, 0xafa, 0x800, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4, 0xd}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a40)={r2, &(0x7f0000000900)="78dee0e489793816ec84ba173c78663054b9a8db80cd4b8a5eb8c99d81a2169eb8d7e1366c5a9118af65abef2455ffe0d6b7622d8c85ea69796102d6db8ba808be998aff5d8d973d9c37e44c66867eade0bfd8015d61f804123e104edf1f092e6effbec23ebc6a27852f0e34ccfed9", &(0x7f0000000980)=@buf="d1ac4e15aacf11e696771bd3afcf45bdd733580fe5b8c129f1af7e1cbfcbc1396e968ad112e616192011974a258a89e9ed31c688067d0148b63dab817484c4e1f82b257c858b9116e8757591a03d33a4d8ab444cbd77f91ca147c03e626688d8b6ba7c4058806b2229fca459660f8189802b86a1cce78899c82953aa7a016f76da0b057b461e60f083eb7b55fc86bbf714107dfcdc9765a9e2582a79d69b4b44a45a52045b59", 0x4}, 0x20) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000a80)={0x1f, 0x1b7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=@ipv4_getnexthop={0x2c, 0x6a, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x4800) r3 = getpgrp(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000bc0)='ns/time\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c00), 0x101000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000c40)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x94, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xff, 0x1f}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}]}, 0x94}, 0x1, 0x0, 0x0, 0x44084}, 0x4000000) syz_clone(0x6200a100, &(0x7f0000000e00)="b75705726f985ac68a0af625268ee05996c76b7051f1aa020981446b4bc81a54410155f350eb2a524c2bb2c660cd4bb3ebc5141101bd9d964a96c2c443da7fbd5c7a1094ef1c752a1fa492667958355e28bd746dceb9dda8ea4087aa6155e4b854d95a644b17e0a08b2d03c52a7a8a152b7329e8b60a068caaff713ed158b400d0cc93d978ee920d9fa78601f25f92a2215ab88624fe175b56694e5b15588c5572b90ca1e3b26c6fd75f27e5026531ec7323b5f2a1d62ebb142ba20883c8689e73d014dc403f0576972a7f81bd4319ee73cf0d96a707b3700c8f1701d5202dfc044d1f28729854be721129822f4d520e427d5d", 0xf3, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="be18c14ef67ab28965b53ce1ab80ddbc0736819a9636a12f3900df8d47adddd8b805ed8884ac8fb0a2154cf52262b39e579725a19c9901dad8ddd6cd5f5cfeaa7583a25523ca4b25838fb73a39576b4b43163174a351") r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001640)) 20:20:50 executing program 0: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x5) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x2002) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f00000000c0), 0x2, 0x410800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0x1, &(0x7f0000000100)="4066dc829b8fbcadc8e52b141a528aae1c21b4fb2eb906105a4d009debdd8011331090f54c46c52b54f44143c4f2dbfacce6c423ed25b407e8fdb9239b463c68cab0dc0dbfa6a1042df475799d4c827f3557907c1ace3aae70211cb2f5e5a021422f2924f3db37cc97138dc5ccd9c136ebb996d3545938415313923b9ffffcaee2f011d283bd52da7704d461a912968743d75fdaaaa9c69ae41765ff3a8b84dd5c4509d02fddfbbe6dbb7c019858c43eb9afa31e5f2247bac26c8f5cc575927074f751b29fb673fc0e", &(0x7f0000000200)=@udp6, 0x1}, 0x20) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000280)=0xff) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000002c0)={0x8, {0x7, 0xa3ef, 0x3f, 0x0, 0x2, 0x3}}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x11) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x300, 0x70bd2d, 0xffffff83, {0x4, 0x1, 0x5, [0x6, 0x5, 0x5, 0x10000, 0x0, 0x1, 0x5, 0x6, 0x7, 0x9, 0x4, 0x91c7, 0x3f, 0x81, 0x6c95, 0x0, 0xffff, 0x1, 0x200, 0xc5, 0x401, 0x800, 0x8, 0x80000001, 0x2, 0xac0c, 0xfc6, 0x3, 0x7, 0x400, 0x7fff, 0x6, 0x7fff, 0x5, 0x2, 0x10000, 0x81, 0x5867, 0x100, 0x0, 0xffffffff, 0x2, 0x800, 0x1, 0x182, 0x7, 0x16, 0x4, 0x6, 0x6212, 0x0, 0x1, 0xffffffe1, 0x8001, 0xffff, 0x0, 0x81, 0x8, 0x0, 0x101, 0x400, 0xfffffffd, 0x5], [0x10001, 0x800, 0x9, 0x10001, 0x0, 0xf2, 0x64d, 0xca5, 0x5, 0x4, 0xffffffff, 0x9, 0x0, 0xfffffff8, 0x400, 0xffffffff, 0x8, 0x81, 0x0, 0x836, 0xffff, 0x4, 0x1, 0xffff, 0x7, 0x1, 0x70000000, 0x80000001, 0x80000001, 0x3e566ffd, 0x2, 0x5, 0x0, 0xe199, 0x101, 0x20, 0xab94, 0x8020000, 0x0, 0xff, 0x1, 0x80000001, 0x1d31, 0x3, 0x884, 0x5, 0x7, 0x5, 0x8, 0x6, 0x1, 0x3, 0x7, 0xfffffe01, 0xfd6f, 0xffff4337, 0x5, 0x7f, 0x739acb7a, 0x68c3, 0x8, 0xc0, 0x9a2, 0x2], [0x2, 0x80000000, 0xd473, 0x5, 0xfffff801, 0x0, 0x81, 0x901, 0x7, 0xa4, 0x8, 0x7, 0x3a, 0x1, 0x2, 0xfff, 0x5, 0xffffffff, 0x8, 0x3, 0x4, 0x2, 0x3f, 0x0, 0xfffffff8, 0x8, 0x4, 0x6, 0x6, 0x4, 0xc6, 0x4ba, 0x385146b, 0x4, 0x1, 0x81, 0xb6, 0x7, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x6, 0x0, 0x7, 0x5, 0x9, 0x6, 0x1bf15fba, 0x3, 0x7fff, 0x9, 0xfffffffb, 0x2, 0x9, 0xff, 0x9a, 0x7fff, 0x6, 0x3, 0x1, 0x2, 0x1f], [0x4, 0x1000, 0x0, 0x80000000, 0x4, 0x6, 0x542, 0x100, 0x8001, 0x87, 0x4, 0x0, 0x99, 0x1, 0x0, 0x20, 0xdab6, 0x9, 0x40, 0x0, 0x2, 0x20, 0xffffffe0, 0x100, 0x1, 0x601, 0x3, 0x1, 0x401, 0x7fffffff, 0x5, 0x3, 0x200, 0x8001, 0x101, 0x9, 0x0, 0x1000, 0x2, 0x9, 0x6, 0x4, 0x1ff, 0x401, 0x1, 0xdcf, 0xfe, 0xe44, 0x0, 0x5, 0x89a, 0x80, 0x3, 0x9, 0x7fff, 0x6, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3], 0x16, ['/dev/loop#\x00', '/dev/loop#\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x438}, 0x1, 0x0, 0x0, 0x88b4}, 0x480c4) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x9, 0x2c24c0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000840)={0x3216, 0x100000001, 0x8, 0xc266}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0xbde5, 0xbf, 0xafa, 0x800, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4, 0xd}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a40)={r2, &(0x7f0000000900)="78dee0e489793816ec84ba173c78663054b9a8db80cd4b8a5eb8c99d81a2169eb8d7e1366c5a9118af65abef2455ffe0d6b7622d8c85ea69796102d6db8ba808be998aff5d8d973d9c37e44c66867eade0bfd8015d61f804123e104edf1f092e6effbec23ebc6a27852f0e34ccfed9", &(0x7f0000000980)=@buf="d1ac4e15aacf11e696771bd3afcf45bdd733580fe5b8c129f1af7e1cbfcbc1396e968ad112e616192011974a258a89e9ed31c688067d0148b63dab817484c4e1f82b257c858b9116e8757591a03d33a4d8ab444cbd77f91ca147c03e626688d8b6ba7c4058806b2229fca459660f8189802b86a1cce78899c82953aa7a016f76da0b057b461e60f083eb7b55fc86bbf714107dfcdc9765a9e2582a79d69b4b44a45a52045b59", 0x4}, 0x20) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000a80)={0x1f, 0x1b7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=@ipv4_getnexthop={0x2c, 0x6a, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x4800) r3 = getpgrp(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000bc0)='ns/time\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c00), 0x101000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000c40)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x94, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xff, 0x1f}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}]}, 0x94}, 0x1, 0x0, 0x0, 0x44084}, 0x4000000) syz_clone(0x6200a100, &(0x7f0000000e00)="b75705726f985ac68a0af625268ee05996c76b7051f1aa020981446b4bc81a54410155f350eb2a524c2bb2c660cd4bb3ebc5141101bd9d964a96c2c443da7fbd5c7a1094ef1c752a1fa492667958355e28bd746dceb9dda8ea4087aa6155e4b854d95a644b17e0a08b2d03c52a7a8a152b7329e8b60a068caaff713ed158b400d0cc93d978ee920d9fa78601f25f92a2215ab88624fe175b56694e5b15588c5572b90ca1e3b26c6fd75f27e5026531ec7323b5f2a1d62ebb142ba20883c8689e73d014dc403f0576972a7f81bd4319ee73cf0d96a707b3700c8f1701d5202dfc044d1f28729854be721129822f4d520e427d5d", 0xf3, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="be18c14ef67ab28965b53ce1ab80ddbc0736819a9636a12f3900df8d47adddd8b805ed8884ac8fb0a2154cf52262b39e579725a19c9901dad8ddd6cd5f5cfeaa7583a25523ca4b25838fb73a39576b4b43163174a351") r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001640)) 20:20:50 executing program 4: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x5) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x2002) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f00000000c0), 0x2, 0x410800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0x1, &(0x7f0000000100)="4066dc829b8fbcadc8e52b141a528aae1c21b4fb2eb906105a4d009debdd8011331090f54c46c52b54f44143c4f2dbfacce6c423ed25b407e8fdb9239b463c68cab0dc0dbfa6a1042df475799d4c827f3557907c1ace3aae70211cb2f5e5a021422f2924f3db37cc97138dc5ccd9c136ebb996d3545938415313923b9ffffcaee2f011d283bd52da7704d461a912968743d75fdaaaa9c69ae41765ff3a8b84dd5c4509d02fddfbbe6dbb7c019858c43eb9afa31e5f2247bac26c8f5cc575927074f751b29fb673fc0e", &(0x7f0000000200)=@udp6, 0x1}, 0x20) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000280)=0xff) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000002c0)={0x8, {0x7, 0xa3ef, 0x3f, 0x0, 0x2, 0x3}}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x11) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x300, 0x70bd2d, 0xffffff83, {0x4, 0x1, 0x5, [0x6, 0x5, 0x5, 0x10000, 0x0, 0x1, 0x5, 0x6, 0x7, 0x9, 0x4, 0x91c7, 0x3f, 0x81, 0x6c95, 0x0, 0xffff, 0x1, 0x200, 0xc5, 0x401, 0x800, 0x8, 0x80000001, 0x2, 0xac0c, 0xfc6, 0x3, 0x7, 0x400, 0x7fff, 0x6, 0x7fff, 0x5, 0x2, 0x10000, 0x81, 0x5867, 0x100, 0x0, 0xffffffff, 0x2, 0x800, 0x1, 0x182, 0x7, 0x16, 0x4, 0x6, 0x6212, 0x0, 0x1, 0xffffffe1, 0x8001, 0xffff, 0x0, 0x81, 0x8, 0x0, 0x101, 0x400, 0xfffffffd, 0x5], [0x10001, 0x800, 0x9, 0x10001, 0x0, 0xf2, 0x64d, 0xca5, 0x5, 0x4, 0xffffffff, 0x9, 0x0, 0xfffffff8, 0x400, 0xffffffff, 0x8, 0x81, 0x0, 0x836, 0xffff, 0x4, 0x1, 0xffff, 0x7, 0x1, 0x70000000, 0x80000001, 0x80000001, 0x3e566ffd, 0x2, 0x5, 0x0, 0xe199, 0x101, 0x20, 0xab94, 0x8020000, 0x0, 0xff, 0x1, 0x80000001, 0x1d31, 0x3, 0x884, 0x5, 0x7, 0x5, 0x8, 0x6, 0x1, 0x3, 0x7, 0xfffffe01, 0xfd6f, 0xffff4337, 0x5, 0x7f, 0x739acb7a, 0x68c3, 0x8, 0xc0, 0x9a2, 0x2], [0x2, 0x80000000, 0xd473, 0x5, 0xfffff801, 0x0, 0x81, 0x901, 0x7, 0xa4, 0x8, 0x7, 0x3a, 0x1, 0x2, 0xfff, 0x5, 0xffffffff, 0x8, 0x3, 0x4, 0x2, 0x3f, 0x0, 0xfffffff8, 0x8, 0x4, 0x6, 0x6, 0x4, 0xc6, 0x4ba, 0x385146b, 0x4, 0x1, 0x81, 0xb6, 0x7, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x6, 0x0, 0x7, 0x5, 0x9, 0x6, 0x1bf15fba, 0x3, 0x7fff, 0x9, 0xfffffffb, 0x2, 0x9, 0xff, 0x9a, 0x7fff, 0x6, 0x3, 0x1, 0x2, 0x1f], [0x4, 0x1000, 0x0, 0x80000000, 0x4, 0x6, 0x542, 0x100, 0x8001, 0x87, 0x4, 0x0, 0x99, 0x1, 0x0, 0x20, 0xdab6, 0x9, 0x40, 0x0, 0x2, 0x20, 0xffffffe0, 0x100, 0x1, 0x601, 0x3, 0x1, 0x401, 0x7fffffff, 0x5, 0x3, 0x200, 0x8001, 0x101, 0x9, 0x0, 0x1000, 0x2, 0x9, 0x6, 0x4, 0x1ff, 0x401, 0x1, 0xdcf, 0xfe, 0xe44, 0x0, 0x5, 0x89a, 0x80, 0x3, 0x9, 0x7fff, 0x6, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3], 0x16, ['/dev/loop#\x00', '/dev/loop#\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x438}, 0x1, 0x0, 0x0, 0x88b4}, 0x480c4) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x9, 0x2c24c0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000840)={0x3216, 0x100000001, 0x8, 0xc266}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0xbde5, 0xbf, 0xafa, 0x800, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4, 0xd}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a40)={r2, &(0x7f0000000900)="78dee0e489793816ec84ba173c78663054b9a8db80cd4b8a5eb8c99d81a2169eb8d7e1366c5a9118af65abef2455ffe0d6b7622d8c85ea69796102d6db8ba808be998aff5d8d973d9c37e44c66867eade0bfd8015d61f804123e104edf1f092e6effbec23ebc6a27852f0e34ccfed9", &(0x7f0000000980)=@buf="d1ac4e15aacf11e696771bd3afcf45bdd733580fe5b8c129f1af7e1cbfcbc1396e968ad112e616192011974a258a89e9ed31c688067d0148b63dab817484c4e1f82b257c858b9116e8757591a03d33a4d8ab444cbd77f91ca147c03e626688d8b6ba7c4058806b2229fca459660f8189802b86a1cce78899c82953aa7a016f76da0b057b461e60f083eb7b55fc86bbf714107dfcdc9765a9e2582a79d69b4b44a45a52045b59", 0x4}, 0x20) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000a80)={0x1f, 0x1b7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=@ipv4_getnexthop={0x2c, 0x6a, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x4800) r3 = getpgrp(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000bc0)='ns/time\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c00), 0x101000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000c40)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x94, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xff, 0x1f}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}]}, 0x94}, 0x1, 0x0, 0x0, 0x44084}, 0x4000000) syz_clone(0x6200a100, &(0x7f0000000e00)="b75705726f985ac68a0af625268ee05996c76b7051f1aa020981446b4bc81a54410155f350eb2a524c2bb2c660cd4bb3ebc5141101bd9d964a96c2c443da7fbd5c7a1094ef1c752a1fa492667958355e28bd746dceb9dda8ea4087aa6155e4b854d95a644b17e0a08b2d03c52a7a8a152b7329e8b60a068caaff713ed158b400d0cc93d978ee920d9fa78601f25f92a2215ab88624fe175b56694e5b15588c5572b90ca1e3b26c6fd75f27e5026531ec7323b5f2a1d62ebb142ba20883c8689e73d014dc403f0576972a7f81bd4319ee73cf0d96a707b3700c8f1701d5202dfc044d1f28729854be721129822f4d520e427d5d", 0xf3, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="be18c14ef67ab28965b53ce1ab80ddbc0736819a9636a12f3900df8d47adddd8b805ed8884ac8fb0a2154cf52262b39e579725a19c9901dad8ddd6cd5f5cfeaa7583a25523ca4b25838fb73a39576b4b43163174a351") r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001640)) 20:20:50 executing program 2: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x5) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x2002) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f00000000c0), 0x2, 0x410800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0x1, &(0x7f0000000100)="4066dc829b8fbcadc8e52b141a528aae1c21b4fb2eb906105a4d009debdd8011331090f54c46c52b54f44143c4f2dbfacce6c423ed25b407e8fdb9239b463c68cab0dc0dbfa6a1042df475799d4c827f3557907c1ace3aae70211cb2f5e5a021422f2924f3db37cc97138dc5ccd9c136ebb996d3545938415313923b9ffffcaee2f011d283bd52da7704d461a912968743d75fdaaaa9c69ae41765ff3a8b84dd5c4509d02fddfbbe6dbb7c019858c43eb9afa31e5f2247bac26c8f5cc575927074f751b29fb673fc0e", &(0x7f0000000200)=@udp6, 0x1}, 0x20) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000280)=0xff) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000002c0)={0x8, {0x7, 0xa3ef, 0x3f, 0x0, 0x2, 0x3}}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x11) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x300, 0x70bd2d, 0xffffff83, {0x4, 0x1, 0x5, [0x6, 0x5, 0x5, 0x10000, 0x0, 0x1, 0x5, 0x6, 0x7, 0x9, 0x4, 0x91c7, 0x3f, 0x81, 0x6c95, 0x0, 0xffff, 0x1, 0x200, 0xc5, 0x401, 0x800, 0x8, 0x80000001, 0x2, 0xac0c, 0xfc6, 0x3, 0x7, 0x400, 0x7fff, 0x6, 0x7fff, 0x5, 0x2, 0x10000, 0x81, 0x5867, 0x100, 0x0, 0xffffffff, 0x2, 0x800, 0x1, 0x182, 0x7, 0x16, 0x4, 0x6, 0x6212, 0x0, 0x1, 0xffffffe1, 0x8001, 0xffff, 0x0, 0x81, 0x8, 0x0, 0x101, 0x400, 0xfffffffd, 0x5], [0x10001, 0x800, 0x9, 0x10001, 0x0, 0xf2, 0x64d, 0xca5, 0x5, 0x4, 0xffffffff, 0x9, 0x0, 0xfffffff8, 0x400, 0xffffffff, 0x8, 0x81, 0x0, 0x836, 0xffff, 0x4, 0x1, 0xffff, 0x7, 0x1, 0x70000000, 0x80000001, 0x80000001, 0x3e566ffd, 0x2, 0x5, 0x0, 0xe199, 0x101, 0x20, 0xab94, 0x8020000, 0x0, 0xff, 0x1, 0x80000001, 0x1d31, 0x3, 0x884, 0x5, 0x7, 0x5, 0x8, 0x6, 0x1, 0x3, 0x7, 0xfffffe01, 0xfd6f, 0xffff4337, 0x5, 0x7f, 0x739acb7a, 0x68c3, 0x8, 0xc0, 0x9a2, 0x2], [0x2, 0x80000000, 0xd473, 0x5, 0xfffff801, 0x0, 0x81, 0x901, 0x7, 0xa4, 0x8, 0x7, 0x3a, 0x1, 0x2, 0xfff, 0x5, 0xffffffff, 0x8, 0x3, 0x4, 0x2, 0x3f, 0x0, 0xfffffff8, 0x8, 0x4, 0x6, 0x6, 0x4, 0xc6, 0x4ba, 0x385146b, 0x4, 0x1, 0x81, 0xb6, 0x7, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x6, 0x0, 0x7, 0x5, 0x9, 0x6, 0x1bf15fba, 0x3, 0x7fff, 0x9, 0xfffffffb, 0x2, 0x9, 0xff, 0x9a, 0x7fff, 0x6, 0x3, 0x1, 0x2, 0x1f], [0x4, 0x1000, 0x0, 0x80000000, 0x4, 0x6, 0x542, 0x100, 0x8001, 0x87, 0x4, 0x0, 0x99, 0x1, 0x0, 0x20, 0xdab6, 0x9, 0x40, 0x0, 0x2, 0x20, 0xffffffe0, 0x100, 0x1, 0x601, 0x3, 0x1, 0x401, 0x7fffffff, 0x5, 0x3, 0x200, 0x8001, 0x101, 0x9, 0x0, 0x1000, 0x2, 0x9, 0x6, 0x4, 0x1ff, 0x401, 0x1, 0xdcf, 0xfe, 0xe44, 0x0, 0x5, 0x89a, 0x80, 0x3, 0x9, 0x7fff, 0x6, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3], 0x16, ['/dev/loop#\x00', '/dev/loop#\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x438}, 0x1, 0x0, 0x0, 0x88b4}, 0x480c4) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x9, 0x2c24c0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000840)={0x3216, 0x100000001, 0x8, 0xc266}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0xbde5, 0xbf, 0xafa, 0x800, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4, 0xd}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a40)={r2, &(0x7f0000000900)="78dee0e489793816ec84ba173c78663054b9a8db80cd4b8a5eb8c99d81a2169eb8d7e1366c5a9118af65abef2455ffe0d6b7622d8c85ea69796102d6db8ba808be998aff5d8d973d9c37e44c66867eade0bfd8015d61f804123e104edf1f092e6effbec23ebc6a27852f0e34ccfed9", &(0x7f0000000980)=@buf="d1ac4e15aacf11e696771bd3afcf45bdd733580fe5b8c129f1af7e1cbfcbc1396e968ad112e616192011974a258a89e9ed31c688067d0148b63dab817484c4e1f82b257c858b9116e8757591a03d33a4d8ab444cbd77f91ca147c03e626688d8b6ba7c4058806b2229fca459660f8189802b86a1cce78899c82953aa7a016f76da0b057b461e60f083eb7b55fc86bbf714107dfcdc9765a9e2582a79d69b4b44a45a52045b59", 0x4}, 0x20) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000a80)={0x1f, 0x1b7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=@ipv4_getnexthop={0x2c, 0x6a, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x4800) r3 = getpgrp(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000bc0)='ns/time\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c00), 0x101000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000c40)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x94, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xff, 0x1f}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}]}, 0x94}, 0x1, 0x0, 0x0, 0x44084}, 0x4000000) syz_clone(0x6200a100, &(0x7f0000000e00)="b75705726f985ac68a0af625268ee05996c76b7051f1aa020981446b4bc81a54410155f350eb2a524c2bb2c660cd4bb3ebc5141101bd9d964a96c2c443da7fbd5c7a1094ef1c752a1fa492667958355e28bd746dceb9dda8ea4087aa6155e4b854d95a644b17e0a08b2d03c52a7a8a152b7329e8b60a068caaff713ed158b400d0cc93d978ee920d9fa78601f25f92a2215ab88624fe175b56694e5b15588c5572b90ca1e3b26c6fd75f27e5026531ec7323b5f2a1d62ebb142ba20883c8689e73d014dc403f0576972a7f81bd4319ee73cf0d96a707b3700c8f1701d5202dfc044d1f28729854be721129822f4d520e427d5d", 0xf3, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="be18c14ef67ab28965b53ce1ab80ddbc0736819a9636a12f3900df8d47adddd8b805ed8884ac8fb0a2154cf52262b39e579725a19c9901dad8ddd6cd5f5cfeaa7583a25523ca4b25838fb73a39576b4b43163174a351") r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001640)) 20:20:50 executing program 3: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x5) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x2002) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f00000000c0), 0x2, 0x410800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0x1, &(0x7f0000000100)="4066dc829b8fbcadc8e52b141a528aae1c21b4fb2eb906105a4d009debdd8011331090f54c46c52b54f44143c4f2dbfacce6c423ed25b407e8fdb9239b463c68cab0dc0dbfa6a1042df475799d4c827f3557907c1ace3aae70211cb2f5e5a021422f2924f3db37cc97138dc5ccd9c136ebb996d3545938415313923b9ffffcaee2f011d283bd52da7704d461a912968743d75fdaaaa9c69ae41765ff3a8b84dd5c4509d02fddfbbe6dbb7c019858c43eb9afa31e5f2247bac26c8f5cc575927074f751b29fb673fc0e", &(0x7f0000000200)=@udp6, 0x1}, 0x20) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000280)=0xff) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000002c0)={0x8, {0x7, 0xa3ef, 0x3f, 0x0, 0x2, 0x3}}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x11) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x300, 0x70bd2d, 0xffffff83, {0x4, 0x1, 0x5, [0x6, 0x5, 0x5, 0x10000, 0x0, 0x1, 0x5, 0x6, 0x7, 0x9, 0x4, 0x91c7, 0x3f, 0x81, 0x6c95, 0x0, 0xffff, 0x1, 0x200, 0xc5, 0x401, 0x800, 0x8, 0x80000001, 0x2, 0xac0c, 0xfc6, 0x3, 0x7, 0x400, 0x7fff, 0x6, 0x7fff, 0x5, 0x2, 0x10000, 0x81, 0x5867, 0x100, 0x0, 0xffffffff, 0x2, 0x800, 0x1, 0x182, 0x7, 0x16, 0x4, 0x6, 0x6212, 0x0, 0x1, 0xffffffe1, 0x8001, 0xffff, 0x0, 0x81, 0x8, 0x0, 0x101, 0x400, 0xfffffffd, 0x5], [0x10001, 0x800, 0x9, 0x10001, 0x0, 0xf2, 0x64d, 0xca5, 0x5, 0x4, 0xffffffff, 0x9, 0x0, 0xfffffff8, 0x400, 0xffffffff, 0x8, 0x81, 0x0, 0x836, 0xffff, 0x4, 0x1, 0xffff, 0x7, 0x1, 0x70000000, 0x80000001, 0x80000001, 0x3e566ffd, 0x2, 0x5, 0x0, 0xe199, 0x101, 0x20, 0xab94, 0x8020000, 0x0, 0xff, 0x1, 0x80000001, 0x1d31, 0x3, 0x884, 0x5, 0x7, 0x5, 0x8, 0x6, 0x1, 0x3, 0x7, 0xfffffe01, 0xfd6f, 0xffff4337, 0x5, 0x7f, 0x739acb7a, 0x68c3, 0x8, 0xc0, 0x9a2, 0x2], [0x2, 0x80000000, 0xd473, 0x5, 0xfffff801, 0x0, 0x81, 0x901, 0x7, 0xa4, 0x8, 0x7, 0x3a, 0x1, 0x2, 0xfff, 0x5, 0xffffffff, 0x8, 0x3, 0x4, 0x2, 0x3f, 0x0, 0xfffffff8, 0x8, 0x4, 0x6, 0x6, 0x4, 0xc6, 0x4ba, 0x385146b, 0x4, 0x1, 0x81, 0xb6, 0x7, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x6, 0x0, 0x7, 0x5, 0x9, 0x6, 0x1bf15fba, 0x3, 0x7fff, 0x9, 0xfffffffb, 0x2, 0x9, 0xff, 0x9a, 0x7fff, 0x6, 0x3, 0x1, 0x2, 0x1f], [0x4, 0x1000, 0x0, 0x80000000, 0x4, 0x6, 0x542, 0x100, 0x8001, 0x87, 0x4, 0x0, 0x99, 0x1, 0x0, 0x20, 0xdab6, 0x9, 0x40, 0x0, 0x2, 0x20, 0xffffffe0, 0x100, 0x1, 0x601, 0x3, 0x1, 0x401, 0x7fffffff, 0x5, 0x3, 0x200, 0x8001, 0x101, 0x9, 0x0, 0x1000, 0x2, 0x9, 0x6, 0x4, 0x1ff, 0x401, 0x1, 0xdcf, 0xfe, 0xe44, 0x0, 0x5, 0x89a, 0x80, 0x3, 0x9, 0x7fff, 0x6, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3], 0x16, ['/dev/loop#\x00', '/dev/loop#\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x438}, 0x1, 0x0, 0x0, 0x88b4}, 0x480c4) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x9, 0x2c24c0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000840)={0x3216, 0x100000001, 0x8, 0xc266}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0xbde5, 0xbf, 0xafa, 0x800, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4, 0xd}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a40)={r2, &(0x7f0000000900)="78dee0e489793816ec84ba173c78663054b9a8db80cd4b8a5eb8c99d81a2169eb8d7e1366c5a9118af65abef2455ffe0d6b7622d8c85ea69796102d6db8ba808be998aff5d8d973d9c37e44c66867eade0bfd8015d61f804123e104edf1f092e6effbec23ebc6a27852f0e34ccfed9", &(0x7f0000000980)=@buf="d1ac4e15aacf11e696771bd3afcf45bdd733580fe5b8c129f1af7e1cbfcbc1396e968ad112e616192011974a258a89e9ed31c688067d0148b63dab817484c4e1f82b257c858b9116e8757591a03d33a4d8ab444cbd77f91ca147c03e626688d8b6ba7c4058806b2229fca459660f8189802b86a1cce78899c82953aa7a016f76da0b057b461e60f083eb7b55fc86bbf714107dfcdc9765a9e2582a79d69b4b44a45a52045b59", 0x4}, 0x20) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000a80)={0x1f, 0x1b7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=@ipv4_getnexthop={0x2c, 0x6a, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x4800) r3 = getpgrp(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000bc0)='ns/time\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c00), 0x101000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000c40)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x94, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xff, 0x1f}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}]}, 0x94}, 0x1, 0x0, 0x0, 0x44084}, 0x4000000) syz_clone(0x6200a100, &(0x7f0000000e00)="b75705726f985ac68a0af625268ee05996c76b7051f1aa020981446b4bc81a54410155f350eb2a524c2bb2c660cd4bb3ebc5141101bd9d964a96c2c443da7fbd5c7a1094ef1c752a1fa492667958355e28bd746dceb9dda8ea4087aa6155e4b854d95a644b17e0a08b2d03c52a7a8a152b7329e8b60a068caaff713ed158b400d0cc93d978ee920d9fa78601f25f92a2215ab88624fe175b56694e5b15588c5572b90ca1e3b26c6fd75f27e5026531ec7323b5f2a1d62ebb142ba20883c8689e73d014dc403f0576972a7f81bd4319ee73cf0d96a707b3700c8f1701d5202dfc044d1f28729854be721129822f4d520e427d5d", 0xf3, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="be18c14ef67ab28965b53ce1ab80ddbc0736819a9636a12f3900df8d47adddd8b805ed8884ac8fb0a2154cf52262b39e579725a19c9901dad8ddd6cd5f5cfeaa7583a25523ca4b25838fb73a39576b4b43163174a351") r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001640)) 20:20:50 executing program 1: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x5) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x2002) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f00000000c0), 0x2, 0x410800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0x1, &(0x7f0000000100)="4066dc829b8fbcadc8e52b141a528aae1c21b4fb2eb906105a4d009debdd8011331090f54c46c52b54f44143c4f2dbfacce6c423ed25b407e8fdb9239b463c68cab0dc0dbfa6a1042df475799d4c827f3557907c1ace3aae70211cb2f5e5a021422f2924f3db37cc97138dc5ccd9c136ebb996d3545938415313923b9ffffcaee2f011d283bd52da7704d461a912968743d75fdaaaa9c69ae41765ff3a8b84dd5c4509d02fddfbbe6dbb7c019858c43eb9afa31e5f2247bac26c8f5cc575927074f751b29fb673fc0e", &(0x7f0000000200)=@udp6, 0x1}, 0x20) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000280)=0xff) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000002c0)={0x8, {0x7, 0xa3ef, 0x3f, 0x0, 0x2, 0x3}}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x11) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x300, 0x70bd2d, 0xffffff83, {0x4, 0x1, 0x5, [0x6, 0x5, 0x5, 0x10000, 0x0, 0x1, 0x5, 0x6, 0x7, 0x9, 0x4, 0x91c7, 0x3f, 0x81, 0x6c95, 0x0, 0xffff, 0x1, 0x200, 0xc5, 0x401, 0x800, 0x8, 0x80000001, 0x2, 0xac0c, 0xfc6, 0x3, 0x7, 0x400, 0x7fff, 0x6, 0x7fff, 0x5, 0x2, 0x10000, 0x81, 0x5867, 0x100, 0x0, 0xffffffff, 0x2, 0x800, 0x1, 0x182, 0x7, 0x16, 0x4, 0x6, 0x6212, 0x0, 0x1, 0xffffffe1, 0x8001, 0xffff, 0x0, 0x81, 0x8, 0x0, 0x101, 0x400, 0xfffffffd, 0x5], [0x10001, 0x800, 0x9, 0x10001, 0x0, 0xf2, 0x64d, 0xca5, 0x5, 0x4, 0xffffffff, 0x9, 0x0, 0xfffffff8, 0x400, 0xffffffff, 0x8, 0x81, 0x0, 0x836, 0xffff, 0x4, 0x1, 0xffff, 0x7, 0x1, 0x70000000, 0x80000001, 0x80000001, 0x3e566ffd, 0x2, 0x5, 0x0, 0xe199, 0x101, 0x20, 0xab94, 0x8020000, 0x0, 0xff, 0x1, 0x80000001, 0x1d31, 0x3, 0x884, 0x5, 0x7, 0x5, 0x8, 0x6, 0x1, 0x3, 0x7, 0xfffffe01, 0xfd6f, 0xffff4337, 0x5, 0x7f, 0x739acb7a, 0x68c3, 0x8, 0xc0, 0x9a2, 0x2], [0x2, 0x80000000, 0xd473, 0x5, 0xfffff801, 0x0, 0x81, 0x901, 0x7, 0xa4, 0x8, 0x7, 0x3a, 0x1, 0x2, 0xfff, 0x5, 0xffffffff, 0x8, 0x3, 0x4, 0x2, 0x3f, 0x0, 0xfffffff8, 0x8, 0x4, 0x6, 0x6, 0x4, 0xc6, 0x4ba, 0x385146b, 0x4, 0x1, 0x81, 0xb6, 0x7, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x6, 0x0, 0x7, 0x5, 0x9, 0x6, 0x1bf15fba, 0x3, 0x7fff, 0x9, 0xfffffffb, 0x2, 0x9, 0xff, 0x9a, 0x7fff, 0x6, 0x3, 0x1, 0x2, 0x1f], [0x4, 0x1000, 0x0, 0x80000000, 0x4, 0x6, 0x542, 0x100, 0x8001, 0x87, 0x4, 0x0, 0x99, 0x1, 0x0, 0x20, 0xdab6, 0x9, 0x40, 0x0, 0x2, 0x20, 0xffffffe0, 0x100, 0x1, 0x601, 0x3, 0x1, 0x401, 0x7fffffff, 0x5, 0x3, 0x200, 0x8001, 0x101, 0x9, 0x0, 0x1000, 0x2, 0x9, 0x6, 0x4, 0x1ff, 0x401, 0x1, 0xdcf, 0xfe, 0xe44, 0x0, 0x5, 0x89a, 0x80, 0x3, 0x9, 0x7fff, 0x6, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3], 0x16, ['/dev/loop#\x00', '/dev/loop#\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x438}, 0x1, 0x0, 0x0, 0x88b4}, 0x480c4) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x9, 0x2c24c0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000840)={0x3216, 0x100000001, 0x8, 0xc266}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0xbde5, 0xbf, 0xafa, 0x800, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4, 0xd}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a40)={r2, &(0x7f0000000900)="78dee0e489793816ec84ba173c78663054b9a8db80cd4b8a5eb8c99d81a2169eb8d7e1366c5a9118af65abef2455ffe0d6b7622d8c85ea69796102d6db8ba808be998aff5d8d973d9c37e44c66867eade0bfd8015d61f804123e104edf1f092e6effbec23ebc6a27852f0e34ccfed9", &(0x7f0000000980)=@buf="d1ac4e15aacf11e696771bd3afcf45bdd733580fe5b8c129f1af7e1cbfcbc1396e968ad112e616192011974a258a89e9ed31c688067d0148b63dab817484c4e1f82b257c858b9116e8757591a03d33a4d8ab444cbd77f91ca147c03e626688d8b6ba7c4058806b2229fca459660f8189802b86a1cce78899c82953aa7a016f76da0b057b461e60f083eb7b55fc86bbf714107dfcdc9765a9e2582a79d69b4b44a45a52045b59", 0x4}, 0x20) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000a80)={0x1f, 0x1b7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=@ipv4_getnexthop={0x2c, 0x6a, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x4800) r3 = getpgrp(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000bc0)='ns/time\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c00), 0x101000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000c40)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x94, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xff, 0x1f}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}]}, 0x94}, 0x1, 0x0, 0x0, 0x44084}, 0x4000000) syz_clone(0x6200a100, &(0x7f0000000e00)="b75705726f985ac68a0af625268ee05996c76b7051f1aa020981446b4bc81a54410155f350eb2a524c2bb2c660cd4bb3ebc5141101bd9d964a96c2c443da7fbd5c7a1094ef1c752a1fa492667958355e28bd746dceb9dda8ea4087aa6155e4b854d95a644b17e0a08b2d03c52a7a8a152b7329e8b60a068caaff713ed158b400d0cc93d978ee920d9fa78601f25f92a2215ab88624fe175b56694e5b15588c5572b90ca1e3b26c6fd75f27e5026531ec7323b5f2a1d62ebb142ba20883c8689e73d014dc403f0576972a7f81bd4319ee73cf0d96a707b3700c8f1701d5202dfc044d1f28729854be721129822f4d520e427d5d", 0xf3, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="be18c14ef67ab28965b53ce1ab80ddbc0736819a9636a12f3900df8d47adddd8b805ed8884ac8fb0a2154cf52262b39e579725a19c9901dad8ddd6cd5f5cfeaa7583a25523ca4b25838fb73a39576b4b43163174a351") r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001640)) 20:20:50 executing program 0: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x5) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x2002) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f00000000c0), 0x2, 0x410800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0x1, &(0x7f0000000100)="4066dc829b8fbcadc8e52b141a528aae1c21b4fb2eb906105a4d009debdd8011331090f54c46c52b54f44143c4f2dbfacce6c423ed25b407e8fdb9239b463c68cab0dc0dbfa6a1042df475799d4c827f3557907c1ace3aae70211cb2f5e5a021422f2924f3db37cc97138dc5ccd9c136ebb996d3545938415313923b9ffffcaee2f011d283bd52da7704d461a912968743d75fdaaaa9c69ae41765ff3a8b84dd5c4509d02fddfbbe6dbb7c019858c43eb9afa31e5f2247bac26c8f5cc575927074f751b29fb673fc0e", &(0x7f0000000200)=@udp6, 0x1}, 0x20) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000280)=0xff) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000002c0)={0x8, {0x7, 0xa3ef, 0x3f, 0x0, 0x2, 0x3}}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x11) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x300, 0x70bd2d, 0xffffff83, {0x4, 0x1, 0x5, [0x6, 0x5, 0x5, 0x10000, 0x0, 0x1, 0x5, 0x6, 0x7, 0x9, 0x4, 0x91c7, 0x3f, 0x81, 0x6c95, 0x0, 0xffff, 0x1, 0x200, 0xc5, 0x401, 0x800, 0x8, 0x80000001, 0x2, 0xac0c, 0xfc6, 0x3, 0x7, 0x400, 0x7fff, 0x6, 0x7fff, 0x5, 0x2, 0x10000, 0x81, 0x5867, 0x100, 0x0, 0xffffffff, 0x2, 0x800, 0x1, 0x182, 0x7, 0x16, 0x4, 0x6, 0x6212, 0x0, 0x1, 0xffffffe1, 0x8001, 0xffff, 0x0, 0x81, 0x8, 0x0, 0x101, 0x400, 0xfffffffd, 0x5], [0x10001, 0x800, 0x9, 0x10001, 0x0, 0xf2, 0x64d, 0xca5, 0x5, 0x4, 0xffffffff, 0x9, 0x0, 0xfffffff8, 0x400, 0xffffffff, 0x8, 0x81, 0x0, 0x836, 0xffff, 0x4, 0x1, 0xffff, 0x7, 0x1, 0x70000000, 0x80000001, 0x80000001, 0x3e566ffd, 0x2, 0x5, 0x0, 0xe199, 0x101, 0x20, 0xab94, 0x8020000, 0x0, 0xff, 0x1, 0x80000001, 0x1d31, 0x3, 0x884, 0x5, 0x7, 0x5, 0x8, 0x6, 0x1, 0x3, 0x7, 0xfffffe01, 0xfd6f, 0xffff4337, 0x5, 0x7f, 0x739acb7a, 0x68c3, 0x8, 0xc0, 0x9a2, 0x2], [0x2, 0x80000000, 0xd473, 0x5, 0xfffff801, 0x0, 0x81, 0x901, 0x7, 0xa4, 0x8, 0x7, 0x3a, 0x1, 0x2, 0xfff, 0x5, 0xffffffff, 0x8, 0x3, 0x4, 0x2, 0x3f, 0x0, 0xfffffff8, 0x8, 0x4, 0x6, 0x6, 0x4, 0xc6, 0x4ba, 0x385146b, 0x4, 0x1, 0x81, 0xb6, 0x7, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x6, 0x0, 0x7, 0x5, 0x9, 0x6, 0x1bf15fba, 0x3, 0x7fff, 0x9, 0xfffffffb, 0x2, 0x9, 0xff, 0x9a, 0x7fff, 0x6, 0x3, 0x1, 0x2, 0x1f], [0x4, 0x1000, 0x0, 0x80000000, 0x4, 0x6, 0x542, 0x100, 0x8001, 0x87, 0x4, 0x0, 0x99, 0x1, 0x0, 0x20, 0xdab6, 0x9, 0x40, 0x0, 0x2, 0x20, 0xffffffe0, 0x100, 0x1, 0x601, 0x3, 0x1, 0x401, 0x7fffffff, 0x5, 0x3, 0x200, 0x8001, 0x101, 0x9, 0x0, 0x1000, 0x2, 0x9, 0x6, 0x4, 0x1ff, 0x401, 0x1, 0xdcf, 0xfe, 0xe44, 0x0, 0x5, 0x89a, 0x80, 0x3, 0x9, 0x7fff, 0x6, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3], 0x16, ['/dev/loop#\x00', '/dev/loop#\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x438}, 0x1, 0x0, 0x0, 0x88b4}, 0x480c4) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x9, 0x2c24c0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000840)={0x3216, 0x100000001, 0x8, 0xc266}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0xbde5, 0xbf, 0xafa, 0x800, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4, 0xd}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a40)={r2, &(0x7f0000000900)="78dee0e489793816ec84ba173c78663054b9a8db80cd4b8a5eb8c99d81a2169eb8d7e1366c5a9118af65abef2455ffe0d6b7622d8c85ea69796102d6db8ba808be998aff5d8d973d9c37e44c66867eade0bfd8015d61f804123e104edf1f092e6effbec23ebc6a27852f0e34ccfed9", &(0x7f0000000980)=@buf="d1ac4e15aacf11e696771bd3afcf45bdd733580fe5b8c129f1af7e1cbfcbc1396e968ad112e616192011974a258a89e9ed31c688067d0148b63dab817484c4e1f82b257c858b9116e8757591a03d33a4d8ab444cbd77f91ca147c03e626688d8b6ba7c4058806b2229fca459660f8189802b86a1cce78899c82953aa7a016f76da0b057b461e60f083eb7b55fc86bbf714107dfcdc9765a9e2582a79d69b4b44a45a52045b59", 0x4}, 0x20) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000a80)={0x1f, 0x1b7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=@ipv4_getnexthop={0x2c, 0x6a, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x4800) r3 = getpgrp(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000bc0)='ns/time\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c00), 0x101000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000c40)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x94, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xff, 0x1f}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}]}, 0x94}, 0x1, 0x0, 0x0, 0x44084}, 0x4000000) syz_clone(0x6200a100, &(0x7f0000000e00)="b75705726f985ac68a0af625268ee05996c76b7051f1aa020981446b4bc81a54410155f350eb2a524c2bb2c660cd4bb3ebc5141101bd9d964a96c2c443da7fbd5c7a1094ef1c752a1fa492667958355e28bd746dceb9dda8ea4087aa6155e4b854d95a644b17e0a08b2d03c52a7a8a152b7329e8b60a068caaff713ed158b400d0cc93d978ee920d9fa78601f25f92a2215ab88624fe175b56694e5b15588c5572b90ca1e3b26c6fd75f27e5026531ec7323b5f2a1d62ebb142ba20883c8689e73d014dc403f0576972a7f81bd4319ee73cf0d96a707b3700c8f1701d5202dfc044d1f28729854be721129822f4d520e427d5d", 0xf3, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="be18c14ef67ab28965b53ce1ab80ddbc0736819a9636a12f3900df8d47adddd8b805ed8884ac8fb0a2154cf52262b39e579725a19c9901dad8ddd6cd5f5cfeaa7583a25523ca4b25838fb73a39576b4b43163174a351") r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001640)) 20:20:51 executing program 5: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x5) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x2002) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f00000000c0), 0x2, 0x410800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0x1, &(0x7f0000000100)="4066dc829b8fbcadc8e52b141a528aae1c21b4fb2eb906105a4d009debdd8011331090f54c46c52b54f44143c4f2dbfacce6c423ed25b407e8fdb9239b463c68cab0dc0dbfa6a1042df475799d4c827f3557907c1ace3aae70211cb2f5e5a021422f2924f3db37cc97138dc5ccd9c136ebb996d3545938415313923b9ffffcaee2f011d283bd52da7704d461a912968743d75fdaaaa9c69ae41765ff3a8b84dd5c4509d02fddfbbe6dbb7c019858c43eb9afa31e5f2247bac26c8f5cc575927074f751b29fb673fc0e", &(0x7f0000000200)=@udp6, 0x1}, 0x20) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000280)=0xff) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000002c0)={0x8, {0x7, 0xa3ef, 0x3f, 0x0, 0x2, 0x3}}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x11) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x300, 0x70bd2d, 0xffffff83, {0x4, 0x1, 0x5, [0x6, 0x5, 0x5, 0x10000, 0x0, 0x1, 0x5, 0x6, 0x7, 0x9, 0x4, 0x91c7, 0x3f, 0x81, 0x6c95, 0x0, 0xffff, 0x1, 0x200, 0xc5, 0x401, 0x800, 0x8, 0x80000001, 0x2, 0xac0c, 0xfc6, 0x3, 0x7, 0x400, 0x7fff, 0x6, 0x7fff, 0x5, 0x2, 0x10000, 0x81, 0x5867, 0x100, 0x0, 0xffffffff, 0x2, 0x800, 0x1, 0x182, 0x7, 0x16, 0x4, 0x6, 0x6212, 0x0, 0x1, 0xffffffe1, 0x8001, 0xffff, 0x0, 0x81, 0x8, 0x0, 0x101, 0x400, 0xfffffffd, 0x5], [0x10001, 0x800, 0x9, 0x10001, 0x0, 0xf2, 0x64d, 0xca5, 0x5, 0x4, 0xffffffff, 0x9, 0x0, 0xfffffff8, 0x400, 0xffffffff, 0x8, 0x81, 0x0, 0x836, 0xffff, 0x4, 0x1, 0xffff, 0x7, 0x1, 0x70000000, 0x80000001, 0x80000001, 0x3e566ffd, 0x2, 0x5, 0x0, 0xe199, 0x101, 0x20, 0xab94, 0x8020000, 0x0, 0xff, 0x1, 0x80000001, 0x1d31, 0x3, 0x884, 0x5, 0x7, 0x5, 0x8, 0x6, 0x1, 0x3, 0x7, 0xfffffe01, 0xfd6f, 0xffff4337, 0x5, 0x7f, 0x739acb7a, 0x68c3, 0x8, 0xc0, 0x9a2, 0x2], [0x2, 0x80000000, 0xd473, 0x5, 0xfffff801, 0x0, 0x81, 0x901, 0x7, 0xa4, 0x8, 0x7, 0x3a, 0x1, 0x2, 0xfff, 0x5, 0xffffffff, 0x8, 0x3, 0x4, 0x2, 0x3f, 0x0, 0xfffffff8, 0x8, 0x4, 0x6, 0x6, 0x4, 0xc6, 0x4ba, 0x385146b, 0x4, 0x1, 0x81, 0xb6, 0x7, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x6, 0x0, 0x7, 0x5, 0x9, 0x6, 0x1bf15fba, 0x3, 0x7fff, 0x9, 0xfffffffb, 0x2, 0x9, 0xff, 0x9a, 0x7fff, 0x6, 0x3, 0x1, 0x2, 0x1f], [0x4, 0x1000, 0x0, 0x80000000, 0x4, 0x6, 0x542, 0x100, 0x8001, 0x87, 0x4, 0x0, 0x99, 0x1, 0x0, 0x20, 0xdab6, 0x9, 0x40, 0x0, 0x2, 0x20, 0xffffffe0, 0x100, 0x1, 0x601, 0x3, 0x1, 0x401, 0x7fffffff, 0x5, 0x3, 0x200, 0x8001, 0x101, 0x9, 0x0, 0x1000, 0x2, 0x9, 0x6, 0x4, 0x1ff, 0x401, 0x1, 0xdcf, 0xfe, 0xe44, 0x0, 0x5, 0x89a, 0x80, 0x3, 0x9, 0x7fff, 0x6, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3], 0x16, ['/dev/loop#\x00', '/dev/loop#\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x438}, 0x1, 0x0, 0x0, 0x88b4}, 0x480c4) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x9, 0x2c24c0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000840)={0x3216, 0x100000001, 0x8, 0xc266}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0xbde5, 0xbf, 0xafa, 0x800, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4, 0xd}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a40)={r2, &(0x7f0000000900)="78dee0e489793816ec84ba173c78663054b9a8db80cd4b8a5eb8c99d81a2169eb8d7e1366c5a9118af65abef2455ffe0d6b7622d8c85ea69796102d6db8ba808be998aff5d8d973d9c37e44c66867eade0bfd8015d61f804123e104edf1f092e6effbec23ebc6a27852f0e34ccfed9", &(0x7f0000000980)=@buf="d1ac4e15aacf11e696771bd3afcf45bdd733580fe5b8c129f1af7e1cbfcbc1396e968ad112e616192011974a258a89e9ed31c688067d0148b63dab817484c4e1f82b257c858b9116e8757591a03d33a4d8ab444cbd77f91ca147c03e626688d8b6ba7c4058806b2229fca459660f8189802b86a1cce78899c82953aa7a016f76da0b057b461e60f083eb7b55fc86bbf714107dfcdc9765a9e2582a79d69b4b44a45a52045b59", 0x4}, 0x20) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000a80)={0x1f, 0x1b7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=@ipv4_getnexthop={0x2c, 0x6a, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x4800) r3 = getpgrp(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000bc0)='ns/time\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c00), 0x101000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000c40)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x94, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xff, 0x1f}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}]}, 0x94}, 0x1, 0x0, 0x0, 0x44084}, 0x4000000) syz_clone(0x6200a100, &(0x7f0000000e00)="b75705726f985ac68a0af625268ee05996c76b7051f1aa020981446b4bc81a54410155f350eb2a524c2bb2c660cd4bb3ebc5141101bd9d964a96c2c443da7fbd5c7a1094ef1c752a1fa492667958355e28bd746dceb9dda8ea4087aa6155e4b854d95a644b17e0a08b2d03c52a7a8a152b7329e8b60a068caaff713ed158b400d0cc93d978ee920d9fa78601f25f92a2215ab88624fe175b56694e5b15588c5572b90ca1e3b26c6fd75f27e5026531ec7323b5f2a1d62ebb142ba20883c8689e73d014dc403f0576972a7f81bd4319ee73cf0d96a707b3700c8f1701d5202dfc044d1f28729854be721129822f4d520e427d5d", 0xf3, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="be18c14ef67ab28965b53ce1ab80ddbc0736819a9636a12f3900df8d47adddd8b805ed8884ac8fb0a2154cf52262b39e579725a19c9901dad8ddd6cd5f5cfeaa7583a25523ca4b25838fb73a39576b4b43163174a351") r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001640)) 20:20:51 executing program 2: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x5) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x2002) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f00000000c0), 0x2, 0x410800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0x1, &(0x7f0000000100)="4066dc829b8fbcadc8e52b141a528aae1c21b4fb2eb906105a4d009debdd8011331090f54c46c52b54f44143c4f2dbfacce6c423ed25b407e8fdb9239b463c68cab0dc0dbfa6a1042df475799d4c827f3557907c1ace3aae70211cb2f5e5a021422f2924f3db37cc97138dc5ccd9c136ebb996d3545938415313923b9ffffcaee2f011d283bd52da7704d461a912968743d75fdaaaa9c69ae41765ff3a8b84dd5c4509d02fddfbbe6dbb7c019858c43eb9afa31e5f2247bac26c8f5cc575927074f751b29fb673fc0e", &(0x7f0000000200)=@udp6, 0x1}, 0x20) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000280)=0xff) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000002c0)={0x8, {0x7, 0xa3ef, 0x3f, 0x0, 0x2, 0x3}}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x11) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x300, 0x70bd2d, 0xffffff83, {0x4, 0x1, 0x5, [0x6, 0x5, 0x5, 0x10000, 0x0, 0x1, 0x5, 0x6, 0x7, 0x9, 0x4, 0x91c7, 0x3f, 0x81, 0x6c95, 0x0, 0xffff, 0x1, 0x200, 0xc5, 0x401, 0x800, 0x8, 0x80000001, 0x2, 0xac0c, 0xfc6, 0x3, 0x7, 0x400, 0x7fff, 0x6, 0x7fff, 0x5, 0x2, 0x10000, 0x81, 0x5867, 0x100, 0x0, 0xffffffff, 0x2, 0x800, 0x1, 0x182, 0x7, 0x16, 0x4, 0x6, 0x6212, 0x0, 0x1, 0xffffffe1, 0x8001, 0xffff, 0x0, 0x81, 0x8, 0x0, 0x101, 0x400, 0xfffffffd, 0x5], [0x10001, 0x800, 0x9, 0x10001, 0x0, 0xf2, 0x64d, 0xca5, 0x5, 0x4, 0xffffffff, 0x9, 0x0, 0xfffffff8, 0x400, 0xffffffff, 0x8, 0x81, 0x0, 0x836, 0xffff, 0x4, 0x1, 0xffff, 0x7, 0x1, 0x70000000, 0x80000001, 0x80000001, 0x3e566ffd, 0x2, 0x5, 0x0, 0xe199, 0x101, 0x20, 0xab94, 0x8020000, 0x0, 0xff, 0x1, 0x80000001, 0x1d31, 0x3, 0x884, 0x5, 0x7, 0x5, 0x8, 0x6, 0x1, 0x3, 0x7, 0xfffffe01, 0xfd6f, 0xffff4337, 0x5, 0x7f, 0x739acb7a, 0x68c3, 0x8, 0xc0, 0x9a2, 0x2], [0x2, 0x80000000, 0xd473, 0x5, 0xfffff801, 0x0, 0x81, 0x901, 0x7, 0xa4, 0x8, 0x7, 0x3a, 0x1, 0x2, 0xfff, 0x5, 0xffffffff, 0x8, 0x3, 0x4, 0x2, 0x3f, 0x0, 0xfffffff8, 0x8, 0x4, 0x6, 0x6, 0x4, 0xc6, 0x4ba, 0x385146b, 0x4, 0x1, 0x81, 0xb6, 0x7, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x6, 0x0, 0x7, 0x5, 0x9, 0x6, 0x1bf15fba, 0x3, 0x7fff, 0x9, 0xfffffffb, 0x2, 0x9, 0xff, 0x9a, 0x7fff, 0x6, 0x3, 0x1, 0x2, 0x1f], [0x4, 0x1000, 0x0, 0x80000000, 0x4, 0x6, 0x542, 0x100, 0x8001, 0x87, 0x4, 0x0, 0x99, 0x1, 0x0, 0x20, 0xdab6, 0x9, 0x40, 0x0, 0x2, 0x20, 0xffffffe0, 0x100, 0x1, 0x601, 0x3, 0x1, 0x401, 0x7fffffff, 0x5, 0x3, 0x200, 0x8001, 0x101, 0x9, 0x0, 0x1000, 0x2, 0x9, 0x6, 0x4, 0x1ff, 0x401, 0x1, 0xdcf, 0xfe, 0xe44, 0x0, 0x5, 0x89a, 0x80, 0x3, 0x9, 0x7fff, 0x6, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3], 0x16, ['/dev/loop#\x00', '/dev/loop#\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x438}, 0x1, 0x0, 0x0, 0x88b4}, 0x480c4) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x9, 0x2c24c0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000840)={0x3216, 0x100000001, 0x8, 0xc266}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0xbde5, 0xbf, 0xafa, 0x800, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4, 0xd}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a40)={r2, &(0x7f0000000900)="78dee0e489793816ec84ba173c78663054b9a8db80cd4b8a5eb8c99d81a2169eb8d7e1366c5a9118af65abef2455ffe0d6b7622d8c85ea69796102d6db8ba808be998aff5d8d973d9c37e44c66867eade0bfd8015d61f804123e104edf1f092e6effbec23ebc6a27852f0e34ccfed9", &(0x7f0000000980)=@buf="d1ac4e15aacf11e696771bd3afcf45bdd733580fe5b8c129f1af7e1cbfcbc1396e968ad112e616192011974a258a89e9ed31c688067d0148b63dab817484c4e1f82b257c858b9116e8757591a03d33a4d8ab444cbd77f91ca147c03e626688d8b6ba7c4058806b2229fca459660f8189802b86a1cce78899c82953aa7a016f76da0b057b461e60f083eb7b55fc86bbf714107dfcdc9765a9e2582a79d69b4b44a45a52045b59", 0x4}, 0x20) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000a80)={0x1f, 0x1b7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=@ipv4_getnexthop={0x2c, 0x6a, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x4800) r3 = getpgrp(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000bc0)='ns/time\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c00), 0x101000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000c40)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x94, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xff, 0x1f}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}]}, 0x94}, 0x1, 0x0, 0x0, 0x44084}, 0x4000000) syz_clone(0x6200a100, &(0x7f0000000e00)="b75705726f985ac68a0af625268ee05996c76b7051f1aa020981446b4bc81a54410155f350eb2a524c2bb2c660cd4bb3ebc5141101bd9d964a96c2c443da7fbd5c7a1094ef1c752a1fa492667958355e28bd746dceb9dda8ea4087aa6155e4b854d95a644b17e0a08b2d03c52a7a8a152b7329e8b60a068caaff713ed158b400d0cc93d978ee920d9fa78601f25f92a2215ab88624fe175b56694e5b15588c5572b90ca1e3b26c6fd75f27e5026531ec7323b5f2a1d62ebb142ba20883c8689e73d014dc403f0576972a7f81bd4319ee73cf0d96a707b3700c8f1701d5202dfc044d1f28729854be721129822f4d520e427d5d", 0xf3, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="be18c14ef67ab28965b53ce1ab80ddbc0736819a9636a12f3900df8d47adddd8b805ed8884ac8fb0a2154cf52262b39e579725a19c9901dad8ddd6cd5f5cfeaa7583a25523ca4b25838fb73a39576b4b43163174a351") r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001640)) 20:20:51 executing program 4: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x5) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x2002) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f00000000c0), 0x2, 0x410800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0x1, &(0x7f0000000100)="4066dc829b8fbcadc8e52b141a528aae1c21b4fb2eb906105a4d009debdd8011331090f54c46c52b54f44143c4f2dbfacce6c423ed25b407e8fdb9239b463c68cab0dc0dbfa6a1042df475799d4c827f3557907c1ace3aae70211cb2f5e5a021422f2924f3db37cc97138dc5ccd9c136ebb996d3545938415313923b9ffffcaee2f011d283bd52da7704d461a912968743d75fdaaaa9c69ae41765ff3a8b84dd5c4509d02fddfbbe6dbb7c019858c43eb9afa31e5f2247bac26c8f5cc575927074f751b29fb673fc0e", &(0x7f0000000200)=@udp6, 0x1}, 0x20) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000280)=0xff) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000002c0)={0x8, {0x7, 0xa3ef, 0x3f, 0x0, 0x2, 0x3}}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x11) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x300, 0x70bd2d, 0xffffff83, {0x4, 0x1, 0x5, [0x6, 0x5, 0x5, 0x10000, 0x0, 0x1, 0x5, 0x6, 0x7, 0x9, 0x4, 0x91c7, 0x3f, 0x81, 0x6c95, 0x0, 0xffff, 0x1, 0x200, 0xc5, 0x401, 0x800, 0x8, 0x80000001, 0x2, 0xac0c, 0xfc6, 0x3, 0x7, 0x400, 0x7fff, 0x6, 0x7fff, 0x5, 0x2, 0x10000, 0x81, 0x5867, 0x100, 0x0, 0xffffffff, 0x2, 0x800, 0x1, 0x182, 0x7, 0x16, 0x4, 0x6, 0x6212, 0x0, 0x1, 0xffffffe1, 0x8001, 0xffff, 0x0, 0x81, 0x8, 0x0, 0x101, 0x400, 0xfffffffd, 0x5], [0x10001, 0x800, 0x9, 0x10001, 0x0, 0xf2, 0x64d, 0xca5, 0x5, 0x4, 0xffffffff, 0x9, 0x0, 0xfffffff8, 0x400, 0xffffffff, 0x8, 0x81, 0x0, 0x836, 0xffff, 0x4, 0x1, 0xffff, 0x7, 0x1, 0x70000000, 0x80000001, 0x80000001, 0x3e566ffd, 0x2, 0x5, 0x0, 0xe199, 0x101, 0x20, 0xab94, 0x8020000, 0x0, 0xff, 0x1, 0x80000001, 0x1d31, 0x3, 0x884, 0x5, 0x7, 0x5, 0x8, 0x6, 0x1, 0x3, 0x7, 0xfffffe01, 0xfd6f, 0xffff4337, 0x5, 0x7f, 0x739acb7a, 0x68c3, 0x8, 0xc0, 0x9a2, 0x2], [0x2, 0x80000000, 0xd473, 0x5, 0xfffff801, 0x0, 0x81, 0x901, 0x7, 0xa4, 0x8, 0x7, 0x3a, 0x1, 0x2, 0xfff, 0x5, 0xffffffff, 0x8, 0x3, 0x4, 0x2, 0x3f, 0x0, 0xfffffff8, 0x8, 0x4, 0x6, 0x6, 0x4, 0xc6, 0x4ba, 0x385146b, 0x4, 0x1, 0x81, 0xb6, 0x7, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x6, 0x0, 0x7, 0x5, 0x9, 0x6, 0x1bf15fba, 0x3, 0x7fff, 0x9, 0xfffffffb, 0x2, 0x9, 0xff, 0x9a, 0x7fff, 0x6, 0x3, 0x1, 0x2, 0x1f], [0x4, 0x1000, 0x0, 0x80000000, 0x4, 0x6, 0x542, 0x100, 0x8001, 0x87, 0x4, 0x0, 0x99, 0x1, 0x0, 0x20, 0xdab6, 0x9, 0x40, 0x0, 0x2, 0x20, 0xffffffe0, 0x100, 0x1, 0x601, 0x3, 0x1, 0x401, 0x7fffffff, 0x5, 0x3, 0x200, 0x8001, 0x101, 0x9, 0x0, 0x1000, 0x2, 0x9, 0x6, 0x4, 0x1ff, 0x401, 0x1, 0xdcf, 0xfe, 0xe44, 0x0, 0x5, 0x89a, 0x80, 0x3, 0x9, 0x7fff, 0x6, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3], 0x16, ['/dev/loop#\x00', '/dev/loop#\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x438}, 0x1, 0x0, 0x0, 0x88b4}, 0x480c4) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x9, 0x2c24c0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000840)={0x3216, 0x100000001, 0x8, 0xc266}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0xbde5, 0xbf, 0xafa, 0x800, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4, 0xd}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a40)={r2, &(0x7f0000000900)="78dee0e489793816ec84ba173c78663054b9a8db80cd4b8a5eb8c99d81a2169eb8d7e1366c5a9118af65abef2455ffe0d6b7622d8c85ea69796102d6db8ba808be998aff5d8d973d9c37e44c66867eade0bfd8015d61f804123e104edf1f092e6effbec23ebc6a27852f0e34ccfed9", &(0x7f0000000980)=@buf="d1ac4e15aacf11e696771bd3afcf45bdd733580fe5b8c129f1af7e1cbfcbc1396e968ad112e616192011974a258a89e9ed31c688067d0148b63dab817484c4e1f82b257c858b9116e8757591a03d33a4d8ab444cbd77f91ca147c03e626688d8b6ba7c4058806b2229fca459660f8189802b86a1cce78899c82953aa7a016f76da0b057b461e60f083eb7b55fc86bbf714107dfcdc9765a9e2582a79d69b4b44a45a52045b59", 0x4}, 0x20) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000a80)={0x1f, 0x1b7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=@ipv4_getnexthop={0x2c, 0x6a, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x4800) r3 = getpgrp(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000bc0)='ns/time\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c00), 0x101000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000c40)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x94, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xff, 0x1f}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}]}, 0x94}, 0x1, 0x0, 0x0, 0x44084}, 0x4000000) syz_clone(0x6200a100, &(0x7f0000000e00)="b75705726f985ac68a0af625268ee05996c76b7051f1aa020981446b4bc81a54410155f350eb2a524c2bb2c660cd4bb3ebc5141101bd9d964a96c2c443da7fbd5c7a1094ef1c752a1fa492667958355e28bd746dceb9dda8ea4087aa6155e4b854d95a644b17e0a08b2d03c52a7a8a152b7329e8b60a068caaff713ed158b400d0cc93d978ee920d9fa78601f25f92a2215ab88624fe175b56694e5b15588c5572b90ca1e3b26c6fd75f27e5026531ec7323b5f2a1d62ebb142ba20883c8689e73d014dc403f0576972a7f81bd4319ee73cf0d96a707b3700c8f1701d5202dfc044d1f28729854be721129822f4d520e427d5d", 0xf3, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="be18c14ef67ab28965b53ce1ab80ddbc0736819a9636a12f3900df8d47adddd8b805ed8884ac8fb0a2154cf52262b39e579725a19c9901dad8ddd6cd5f5cfeaa7583a25523ca4b25838fb73a39576b4b43163174a351") r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001640)) 20:20:51 executing program 3: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x5) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x2002) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f00000000c0), 0x2, 0x410800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0x1, &(0x7f0000000100)="4066dc829b8fbcadc8e52b141a528aae1c21b4fb2eb906105a4d009debdd8011331090f54c46c52b54f44143c4f2dbfacce6c423ed25b407e8fdb9239b463c68cab0dc0dbfa6a1042df475799d4c827f3557907c1ace3aae70211cb2f5e5a021422f2924f3db37cc97138dc5ccd9c136ebb996d3545938415313923b9ffffcaee2f011d283bd52da7704d461a912968743d75fdaaaa9c69ae41765ff3a8b84dd5c4509d02fddfbbe6dbb7c019858c43eb9afa31e5f2247bac26c8f5cc575927074f751b29fb673fc0e", &(0x7f0000000200)=@udp6, 0x1}, 0x20) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000280)=0xff) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000002c0)={0x8, {0x7, 0xa3ef, 0x3f, 0x0, 0x2, 0x3}}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x11) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x300, 0x70bd2d, 0xffffff83, {0x4, 0x1, 0x5, [0x6, 0x5, 0x5, 0x10000, 0x0, 0x1, 0x5, 0x6, 0x7, 0x9, 0x4, 0x91c7, 0x3f, 0x81, 0x6c95, 0x0, 0xffff, 0x1, 0x200, 0xc5, 0x401, 0x800, 0x8, 0x80000001, 0x2, 0xac0c, 0xfc6, 0x3, 0x7, 0x400, 0x7fff, 0x6, 0x7fff, 0x5, 0x2, 0x10000, 0x81, 0x5867, 0x100, 0x0, 0xffffffff, 0x2, 0x800, 0x1, 0x182, 0x7, 0x16, 0x4, 0x6, 0x6212, 0x0, 0x1, 0xffffffe1, 0x8001, 0xffff, 0x0, 0x81, 0x8, 0x0, 0x101, 0x400, 0xfffffffd, 0x5], [0x10001, 0x800, 0x9, 0x10001, 0x0, 0xf2, 0x64d, 0xca5, 0x5, 0x4, 0xffffffff, 0x9, 0x0, 0xfffffff8, 0x400, 0xffffffff, 0x8, 0x81, 0x0, 0x836, 0xffff, 0x4, 0x1, 0xffff, 0x7, 0x1, 0x70000000, 0x80000001, 0x80000001, 0x3e566ffd, 0x2, 0x5, 0x0, 0xe199, 0x101, 0x20, 0xab94, 0x8020000, 0x0, 0xff, 0x1, 0x80000001, 0x1d31, 0x3, 0x884, 0x5, 0x7, 0x5, 0x8, 0x6, 0x1, 0x3, 0x7, 0xfffffe01, 0xfd6f, 0xffff4337, 0x5, 0x7f, 0x739acb7a, 0x68c3, 0x8, 0xc0, 0x9a2, 0x2], [0x2, 0x80000000, 0xd473, 0x5, 0xfffff801, 0x0, 0x81, 0x901, 0x7, 0xa4, 0x8, 0x7, 0x3a, 0x1, 0x2, 0xfff, 0x5, 0xffffffff, 0x8, 0x3, 0x4, 0x2, 0x3f, 0x0, 0xfffffff8, 0x8, 0x4, 0x6, 0x6, 0x4, 0xc6, 0x4ba, 0x385146b, 0x4, 0x1, 0x81, 0xb6, 0x7, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x6, 0x0, 0x7, 0x5, 0x9, 0x6, 0x1bf15fba, 0x3, 0x7fff, 0x9, 0xfffffffb, 0x2, 0x9, 0xff, 0x9a, 0x7fff, 0x6, 0x3, 0x1, 0x2, 0x1f], [0x4, 0x1000, 0x0, 0x80000000, 0x4, 0x6, 0x542, 0x100, 0x8001, 0x87, 0x4, 0x0, 0x99, 0x1, 0x0, 0x20, 0xdab6, 0x9, 0x40, 0x0, 0x2, 0x20, 0xffffffe0, 0x100, 0x1, 0x601, 0x3, 0x1, 0x401, 0x7fffffff, 0x5, 0x3, 0x200, 0x8001, 0x101, 0x9, 0x0, 0x1000, 0x2, 0x9, 0x6, 0x4, 0x1ff, 0x401, 0x1, 0xdcf, 0xfe, 0xe44, 0x0, 0x5, 0x89a, 0x80, 0x3, 0x9, 0x7fff, 0x6, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3], 0x16, ['/dev/loop#\x00', '/dev/loop#\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x438}, 0x1, 0x0, 0x0, 0x88b4}, 0x480c4) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x9, 0x2c24c0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000840)={0x3216, 0x100000001, 0x8, 0xc266}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0xbde5, 0xbf, 0xafa, 0x800, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4, 0xd}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a40)={r2, &(0x7f0000000900)="78dee0e489793816ec84ba173c78663054b9a8db80cd4b8a5eb8c99d81a2169eb8d7e1366c5a9118af65abef2455ffe0d6b7622d8c85ea69796102d6db8ba808be998aff5d8d973d9c37e44c66867eade0bfd8015d61f804123e104edf1f092e6effbec23ebc6a27852f0e34ccfed9", &(0x7f0000000980)=@buf="d1ac4e15aacf11e696771bd3afcf45bdd733580fe5b8c129f1af7e1cbfcbc1396e968ad112e616192011974a258a89e9ed31c688067d0148b63dab817484c4e1f82b257c858b9116e8757591a03d33a4d8ab444cbd77f91ca147c03e626688d8b6ba7c4058806b2229fca459660f8189802b86a1cce78899c82953aa7a016f76da0b057b461e60f083eb7b55fc86bbf714107dfcdc9765a9e2582a79d69b4b44a45a52045b59", 0x4}, 0x20) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000a80)={0x1f, 0x1b7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=@ipv4_getnexthop={0x2c, 0x6a, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x4800) r3 = getpgrp(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000bc0)='ns/time\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c00), 0x101000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000c40)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x94, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xff, 0x1f}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}]}, 0x94}, 0x1, 0x0, 0x0, 0x44084}, 0x4000000) syz_clone(0x6200a100, &(0x7f0000000e00)="b75705726f985ac68a0af625268ee05996c76b7051f1aa020981446b4bc81a54410155f350eb2a524c2bb2c660cd4bb3ebc5141101bd9d964a96c2c443da7fbd5c7a1094ef1c752a1fa492667958355e28bd746dceb9dda8ea4087aa6155e4b854d95a644b17e0a08b2d03c52a7a8a152b7329e8b60a068caaff713ed158b400d0cc93d978ee920d9fa78601f25f92a2215ab88624fe175b56694e5b15588c5572b90ca1e3b26c6fd75f27e5026531ec7323b5f2a1d62ebb142ba20883c8689e73d014dc403f0576972a7f81bd4319ee73cf0d96a707b3700c8f1701d5202dfc044d1f28729854be721129822f4d520e427d5d", 0xf3, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="be18c14ef67ab28965b53ce1ab80ddbc0736819a9636a12f3900df8d47adddd8b805ed8884ac8fb0a2154cf52262b39e579725a19c9901dad8ddd6cd5f5cfeaa7583a25523ca4b25838fb73a39576b4b43163174a351") r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001640)) 20:20:51 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000e80), 0x2, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) 20:20:51 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000e80), 0x2, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) 20:20:51 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000e80), 0x2, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) 20:20:51 executing program 5: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x5) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x2002) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f00000000c0), 0x2, 0x410800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0x1, &(0x7f0000000100)="4066dc829b8fbcadc8e52b141a528aae1c21b4fb2eb906105a4d009debdd8011331090f54c46c52b54f44143c4f2dbfacce6c423ed25b407e8fdb9239b463c68cab0dc0dbfa6a1042df475799d4c827f3557907c1ace3aae70211cb2f5e5a021422f2924f3db37cc97138dc5ccd9c136ebb996d3545938415313923b9ffffcaee2f011d283bd52da7704d461a912968743d75fdaaaa9c69ae41765ff3a8b84dd5c4509d02fddfbbe6dbb7c019858c43eb9afa31e5f2247bac26c8f5cc575927074f751b29fb673fc0e", &(0x7f0000000200)=@udp6, 0x1}, 0x20) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000280)=0xff) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000002c0)={0x8, {0x7, 0xa3ef, 0x3f, 0x0, 0x2, 0x3}}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x11) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x300, 0x70bd2d, 0xffffff83, {0x4, 0x1, 0x5, [0x6, 0x5, 0x5, 0x10000, 0x0, 0x1, 0x5, 0x6, 0x7, 0x9, 0x4, 0x91c7, 0x3f, 0x81, 0x6c95, 0x0, 0xffff, 0x1, 0x200, 0xc5, 0x401, 0x800, 0x8, 0x80000001, 0x2, 0xac0c, 0xfc6, 0x3, 0x7, 0x400, 0x7fff, 0x6, 0x7fff, 0x5, 0x2, 0x10000, 0x81, 0x5867, 0x100, 0x0, 0xffffffff, 0x2, 0x800, 0x1, 0x182, 0x7, 0x16, 0x4, 0x6, 0x6212, 0x0, 0x1, 0xffffffe1, 0x8001, 0xffff, 0x0, 0x81, 0x8, 0x0, 0x101, 0x400, 0xfffffffd, 0x5], [0x10001, 0x800, 0x9, 0x10001, 0x0, 0xf2, 0x64d, 0xca5, 0x5, 0x4, 0xffffffff, 0x9, 0x0, 0xfffffff8, 0x400, 0xffffffff, 0x8, 0x81, 0x0, 0x836, 0xffff, 0x4, 0x1, 0xffff, 0x7, 0x1, 0x70000000, 0x80000001, 0x80000001, 0x3e566ffd, 0x2, 0x5, 0x0, 0xe199, 0x101, 0x20, 0xab94, 0x8020000, 0x0, 0xff, 0x1, 0x80000001, 0x1d31, 0x3, 0x884, 0x5, 0x7, 0x5, 0x8, 0x6, 0x1, 0x3, 0x7, 0xfffffe01, 0xfd6f, 0xffff4337, 0x5, 0x7f, 0x739acb7a, 0x68c3, 0x8, 0xc0, 0x9a2, 0x2], [0x2, 0x80000000, 0xd473, 0x5, 0xfffff801, 0x0, 0x81, 0x901, 0x7, 0xa4, 0x8, 0x7, 0x3a, 0x1, 0x2, 0xfff, 0x5, 0xffffffff, 0x8, 0x3, 0x4, 0x2, 0x3f, 0x0, 0xfffffff8, 0x8, 0x4, 0x6, 0x6, 0x4, 0xc6, 0x4ba, 0x385146b, 0x4, 0x1, 0x81, 0xb6, 0x7, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x6, 0x0, 0x7, 0x5, 0x9, 0x6, 0x1bf15fba, 0x3, 0x7fff, 0x9, 0xfffffffb, 0x2, 0x9, 0xff, 0x9a, 0x7fff, 0x6, 0x3, 0x1, 0x2, 0x1f], [0x4, 0x1000, 0x0, 0x80000000, 0x4, 0x6, 0x542, 0x100, 0x8001, 0x87, 0x4, 0x0, 0x99, 0x1, 0x0, 0x20, 0xdab6, 0x9, 0x40, 0x0, 0x2, 0x20, 0xffffffe0, 0x100, 0x1, 0x601, 0x3, 0x1, 0x401, 0x7fffffff, 0x5, 0x3, 0x200, 0x8001, 0x101, 0x9, 0x0, 0x1000, 0x2, 0x9, 0x6, 0x4, 0x1ff, 0x401, 0x1, 0xdcf, 0xfe, 0xe44, 0x0, 0x5, 0x89a, 0x80, 0x3, 0x9, 0x7fff, 0x6, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3], 0x16, ['/dev/loop#\x00', '/dev/loop#\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x438}, 0x1, 0x0, 0x0, 0x88b4}, 0x480c4) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x9, 0x2c24c0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000840)={0x3216, 0x100000001, 0x8, 0xc266}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0xbde5, 0xbf, 0xafa, 0x800, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4, 0xd}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a40)={r2, &(0x7f0000000900)="78dee0e489793816ec84ba173c78663054b9a8db80cd4b8a5eb8c99d81a2169eb8d7e1366c5a9118af65abef2455ffe0d6b7622d8c85ea69796102d6db8ba808be998aff5d8d973d9c37e44c66867eade0bfd8015d61f804123e104edf1f092e6effbec23ebc6a27852f0e34ccfed9", &(0x7f0000000980)=@buf="d1ac4e15aacf11e696771bd3afcf45bdd733580fe5b8c129f1af7e1cbfcbc1396e968ad112e616192011974a258a89e9ed31c688067d0148b63dab817484c4e1f82b257c858b9116e8757591a03d33a4d8ab444cbd77f91ca147c03e626688d8b6ba7c4058806b2229fca459660f8189802b86a1cce78899c82953aa7a016f76da0b057b461e60f083eb7b55fc86bbf714107dfcdc9765a9e2582a79d69b4b44a45a52045b59", 0x4}, 0x20) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000a80)={0x1f, 0x1b7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=@ipv4_getnexthop={0x2c, 0x6a, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x4800) r3 = getpgrp(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000bc0)='ns/time\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c00), 0x101000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000c40)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x94, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xff, 0x1f}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}]}, 0x94}, 0x1, 0x0, 0x0, 0x44084}, 0x4000000) syz_clone(0x6200a100, &(0x7f0000000e00)="b75705726f985ac68a0af625268ee05996c76b7051f1aa020981446b4bc81a54410155f350eb2a524c2bb2c660cd4bb3ebc5141101bd9d964a96c2c443da7fbd5c7a1094ef1c752a1fa492667958355e28bd746dceb9dda8ea4087aa6155e4b854d95a644b17e0a08b2d03c52a7a8a152b7329e8b60a068caaff713ed158b400d0cc93d978ee920d9fa78601f25f92a2215ab88624fe175b56694e5b15588c5572b90ca1e3b26c6fd75f27e5026531ec7323b5f2a1d62ebb142ba20883c8689e73d014dc403f0576972a7f81bd4319ee73cf0d96a707b3700c8f1701d5202dfc044d1f28729854be721129822f4d520e427d5d", 0xf3, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="be18c14ef67ab28965b53ce1ab80ddbc0736819a9636a12f3900df8d47adddd8b805ed8884ac8fb0a2154cf52262b39e579725a19c9901dad8ddd6cd5f5cfeaa7583a25523ca4b25838fb73a39576b4b43163174a351") r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001640)) 20:20:51 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000e80), 0x2, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) 20:20:51 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000e80), 0x2, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) 20:20:51 executing program 2: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x5) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x2002) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f00000000c0), 0x2, 0x410800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0x1, &(0x7f0000000100)="4066dc829b8fbcadc8e52b141a528aae1c21b4fb2eb906105a4d009debdd8011331090f54c46c52b54f44143c4f2dbfacce6c423ed25b407e8fdb9239b463c68cab0dc0dbfa6a1042df475799d4c827f3557907c1ace3aae70211cb2f5e5a021422f2924f3db37cc97138dc5ccd9c136ebb996d3545938415313923b9ffffcaee2f011d283bd52da7704d461a912968743d75fdaaaa9c69ae41765ff3a8b84dd5c4509d02fddfbbe6dbb7c019858c43eb9afa31e5f2247bac26c8f5cc575927074f751b29fb673fc0e", &(0x7f0000000200)=@udp6, 0x1}, 0x20) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000280)=0xff) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000002c0)={0x8, {0x7, 0xa3ef, 0x3f, 0x0, 0x2, 0x3}}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x11) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x300, 0x70bd2d, 0xffffff83, {0x4, 0x1, 0x5, [0x6, 0x5, 0x5, 0x10000, 0x0, 0x1, 0x5, 0x6, 0x7, 0x9, 0x4, 0x91c7, 0x3f, 0x81, 0x6c95, 0x0, 0xffff, 0x1, 0x200, 0xc5, 0x401, 0x800, 0x8, 0x80000001, 0x2, 0xac0c, 0xfc6, 0x3, 0x7, 0x400, 0x7fff, 0x6, 0x7fff, 0x5, 0x2, 0x10000, 0x81, 0x5867, 0x100, 0x0, 0xffffffff, 0x2, 0x800, 0x1, 0x182, 0x7, 0x16, 0x4, 0x6, 0x6212, 0x0, 0x1, 0xffffffe1, 0x8001, 0xffff, 0x0, 0x81, 0x8, 0x0, 0x101, 0x400, 0xfffffffd, 0x5], [0x10001, 0x800, 0x9, 0x10001, 0x0, 0xf2, 0x64d, 0xca5, 0x5, 0x4, 0xffffffff, 0x9, 0x0, 0xfffffff8, 0x400, 0xffffffff, 0x8, 0x81, 0x0, 0x836, 0xffff, 0x4, 0x1, 0xffff, 0x7, 0x1, 0x70000000, 0x80000001, 0x80000001, 0x3e566ffd, 0x2, 0x5, 0x0, 0xe199, 0x101, 0x20, 0xab94, 0x8020000, 0x0, 0xff, 0x1, 0x80000001, 0x1d31, 0x3, 0x884, 0x5, 0x7, 0x5, 0x8, 0x6, 0x1, 0x3, 0x7, 0xfffffe01, 0xfd6f, 0xffff4337, 0x5, 0x7f, 0x739acb7a, 0x68c3, 0x8, 0xc0, 0x9a2, 0x2], [0x2, 0x80000000, 0xd473, 0x5, 0xfffff801, 0x0, 0x81, 0x901, 0x7, 0xa4, 0x8, 0x7, 0x3a, 0x1, 0x2, 0xfff, 0x5, 0xffffffff, 0x8, 0x3, 0x4, 0x2, 0x3f, 0x0, 0xfffffff8, 0x8, 0x4, 0x6, 0x6, 0x4, 0xc6, 0x4ba, 0x385146b, 0x4, 0x1, 0x81, 0xb6, 0x7, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x6, 0x0, 0x7, 0x5, 0x9, 0x6, 0x1bf15fba, 0x3, 0x7fff, 0x9, 0xfffffffb, 0x2, 0x9, 0xff, 0x9a, 0x7fff, 0x6, 0x3, 0x1, 0x2, 0x1f], [0x4, 0x1000, 0x0, 0x80000000, 0x4, 0x6, 0x542, 0x100, 0x8001, 0x87, 0x4, 0x0, 0x99, 0x1, 0x0, 0x20, 0xdab6, 0x9, 0x40, 0x0, 0x2, 0x20, 0xffffffe0, 0x100, 0x1, 0x601, 0x3, 0x1, 0x401, 0x7fffffff, 0x5, 0x3, 0x200, 0x8001, 0x101, 0x9, 0x0, 0x1000, 0x2, 0x9, 0x6, 0x4, 0x1ff, 0x401, 0x1, 0xdcf, 0xfe, 0xe44, 0x0, 0x5, 0x89a, 0x80, 0x3, 0x9, 0x7fff, 0x6, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3], 0x16, ['/dev/loop#\x00', '/dev/loop#\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x438}, 0x1, 0x0, 0x0, 0x88b4}, 0x480c4) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x9, 0x2c24c0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000840)={0x3216, 0x100000001, 0x8, 0xc266}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0xbde5, 0xbf, 0xafa, 0x800, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4, 0xd}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a40)={r2, &(0x7f0000000900)="78dee0e489793816ec84ba173c78663054b9a8db80cd4b8a5eb8c99d81a2169eb8d7e1366c5a9118af65abef2455ffe0d6b7622d8c85ea69796102d6db8ba808be998aff5d8d973d9c37e44c66867eade0bfd8015d61f804123e104edf1f092e6effbec23ebc6a27852f0e34ccfed9", &(0x7f0000000980)=@buf="d1ac4e15aacf11e696771bd3afcf45bdd733580fe5b8c129f1af7e1cbfcbc1396e968ad112e616192011974a258a89e9ed31c688067d0148b63dab817484c4e1f82b257c858b9116e8757591a03d33a4d8ab444cbd77f91ca147c03e626688d8b6ba7c4058806b2229fca459660f8189802b86a1cce78899c82953aa7a016f76da0b057b461e60f083eb7b55fc86bbf714107dfcdc9765a9e2582a79d69b4b44a45a52045b59", 0x4}, 0x20) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000a80)={0x1f, 0x1b7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=@ipv4_getnexthop={0x2c, 0x6a, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x4800) r3 = getpgrp(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000bc0)='ns/time\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c00), 0x101000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000c40)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x94, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xff, 0x1f}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}]}, 0x94}, 0x1, 0x0, 0x0, 0x44084}, 0x4000000) syz_clone(0x6200a100, &(0x7f0000000e00)="b75705726f985ac68a0af625268ee05996c76b7051f1aa020981446b4bc81a54410155f350eb2a524c2bb2c660cd4bb3ebc5141101bd9d964a96c2c443da7fbd5c7a1094ef1c752a1fa492667958355e28bd746dceb9dda8ea4087aa6155e4b854d95a644b17e0a08b2d03c52a7a8a152b7329e8b60a068caaff713ed158b400d0cc93d978ee920d9fa78601f25f92a2215ab88624fe175b56694e5b15588c5572b90ca1e3b26c6fd75f27e5026531ec7323b5f2a1d62ebb142ba20883c8689e73d014dc403f0576972a7f81bd4319ee73cf0d96a707b3700c8f1701d5202dfc044d1f28729854be721129822f4d520e427d5d", 0xf3, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="be18c14ef67ab28965b53ce1ab80ddbc0736819a9636a12f3900df8d47adddd8b805ed8884ac8fb0a2154cf52262b39e579725a19c9901dad8ddd6cd5f5cfeaa7583a25523ca4b25838fb73a39576b4b43163174a351") r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001640)) 20:20:51 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000e80), 0x2, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) 20:20:51 executing program 3: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x5) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x2002) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f00000000c0), 0x2, 0x410800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0x1, &(0x7f0000000100)="4066dc829b8fbcadc8e52b141a528aae1c21b4fb2eb906105a4d009debdd8011331090f54c46c52b54f44143c4f2dbfacce6c423ed25b407e8fdb9239b463c68cab0dc0dbfa6a1042df475799d4c827f3557907c1ace3aae70211cb2f5e5a021422f2924f3db37cc97138dc5ccd9c136ebb996d3545938415313923b9ffffcaee2f011d283bd52da7704d461a912968743d75fdaaaa9c69ae41765ff3a8b84dd5c4509d02fddfbbe6dbb7c019858c43eb9afa31e5f2247bac26c8f5cc575927074f751b29fb673fc0e", &(0x7f0000000200)=@udp6, 0x1}, 0x20) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000280)=0xff) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000002c0)={0x8, {0x7, 0xa3ef, 0x3f, 0x0, 0x2, 0x3}}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x11) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x300, 0x70bd2d, 0xffffff83, {0x4, 0x1, 0x5, [0x6, 0x5, 0x5, 0x10000, 0x0, 0x1, 0x5, 0x6, 0x7, 0x9, 0x4, 0x91c7, 0x3f, 0x81, 0x6c95, 0x0, 0xffff, 0x1, 0x200, 0xc5, 0x401, 0x800, 0x8, 0x80000001, 0x2, 0xac0c, 0xfc6, 0x3, 0x7, 0x400, 0x7fff, 0x6, 0x7fff, 0x5, 0x2, 0x10000, 0x81, 0x5867, 0x100, 0x0, 0xffffffff, 0x2, 0x800, 0x1, 0x182, 0x7, 0x16, 0x4, 0x6, 0x6212, 0x0, 0x1, 0xffffffe1, 0x8001, 0xffff, 0x0, 0x81, 0x8, 0x0, 0x101, 0x400, 0xfffffffd, 0x5], [0x10001, 0x800, 0x9, 0x10001, 0x0, 0xf2, 0x64d, 0xca5, 0x5, 0x4, 0xffffffff, 0x9, 0x0, 0xfffffff8, 0x400, 0xffffffff, 0x8, 0x81, 0x0, 0x836, 0xffff, 0x4, 0x1, 0xffff, 0x7, 0x1, 0x70000000, 0x80000001, 0x80000001, 0x3e566ffd, 0x2, 0x5, 0x0, 0xe199, 0x101, 0x20, 0xab94, 0x8020000, 0x0, 0xff, 0x1, 0x80000001, 0x1d31, 0x3, 0x884, 0x5, 0x7, 0x5, 0x8, 0x6, 0x1, 0x3, 0x7, 0xfffffe01, 0xfd6f, 0xffff4337, 0x5, 0x7f, 0x739acb7a, 0x68c3, 0x8, 0xc0, 0x9a2, 0x2], [0x2, 0x80000000, 0xd473, 0x5, 0xfffff801, 0x0, 0x81, 0x901, 0x7, 0xa4, 0x8, 0x7, 0x3a, 0x1, 0x2, 0xfff, 0x5, 0xffffffff, 0x8, 0x3, 0x4, 0x2, 0x3f, 0x0, 0xfffffff8, 0x8, 0x4, 0x6, 0x6, 0x4, 0xc6, 0x4ba, 0x385146b, 0x4, 0x1, 0x81, 0xb6, 0x7, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x6, 0x0, 0x7, 0x5, 0x9, 0x6, 0x1bf15fba, 0x3, 0x7fff, 0x9, 0xfffffffb, 0x2, 0x9, 0xff, 0x9a, 0x7fff, 0x6, 0x3, 0x1, 0x2, 0x1f], [0x4, 0x1000, 0x0, 0x80000000, 0x4, 0x6, 0x542, 0x100, 0x8001, 0x87, 0x4, 0x0, 0x99, 0x1, 0x0, 0x20, 0xdab6, 0x9, 0x40, 0x0, 0x2, 0x20, 0xffffffe0, 0x100, 0x1, 0x601, 0x3, 0x1, 0x401, 0x7fffffff, 0x5, 0x3, 0x200, 0x8001, 0x101, 0x9, 0x0, 0x1000, 0x2, 0x9, 0x6, 0x4, 0x1ff, 0x401, 0x1, 0xdcf, 0xfe, 0xe44, 0x0, 0x5, 0x89a, 0x80, 0x3, 0x9, 0x7fff, 0x6, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3], 0x16, ['/dev/loop#\x00', '/dev/loop#\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x438}, 0x1, 0x0, 0x0, 0x88b4}, 0x480c4) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x9, 0x2c24c0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000840)={0x3216, 0x100000001, 0x8, 0xc266}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0xbde5, 0xbf, 0xafa, 0x800, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4, 0xd}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a40)={r2, &(0x7f0000000900)="78dee0e489793816ec84ba173c78663054b9a8db80cd4b8a5eb8c99d81a2169eb8d7e1366c5a9118af65abef2455ffe0d6b7622d8c85ea69796102d6db8ba808be998aff5d8d973d9c37e44c66867eade0bfd8015d61f804123e104edf1f092e6effbec23ebc6a27852f0e34ccfed9", &(0x7f0000000980)=@buf="d1ac4e15aacf11e696771bd3afcf45bdd733580fe5b8c129f1af7e1cbfcbc1396e968ad112e616192011974a258a89e9ed31c688067d0148b63dab817484c4e1f82b257c858b9116e8757591a03d33a4d8ab444cbd77f91ca147c03e626688d8b6ba7c4058806b2229fca459660f8189802b86a1cce78899c82953aa7a016f76da0b057b461e60f083eb7b55fc86bbf714107dfcdc9765a9e2582a79d69b4b44a45a52045b59", 0x4}, 0x20) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000a80)={0x1f, 0x1b7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=@ipv4_getnexthop={0x2c, 0x6a, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x4800) r3 = getpgrp(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000bc0)='ns/time\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c00), 0x101000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000c40)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x94, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xff, 0x1f}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}]}, 0x94}, 0x1, 0x0, 0x0, 0x44084}, 0x4000000) syz_clone(0x6200a100, &(0x7f0000000e00)="b75705726f985ac68a0af625268ee05996c76b7051f1aa020981446b4bc81a54410155f350eb2a524c2bb2c660cd4bb3ebc5141101bd9d964a96c2c443da7fbd5c7a1094ef1c752a1fa492667958355e28bd746dceb9dda8ea4087aa6155e4b854d95a644b17e0a08b2d03c52a7a8a152b7329e8b60a068caaff713ed158b400d0cc93d978ee920d9fa78601f25f92a2215ab88624fe175b56694e5b15588c5572b90ca1e3b26c6fd75f27e5026531ec7323b5f2a1d62ebb142ba20883c8689e73d014dc403f0576972a7f81bd4319ee73cf0d96a707b3700c8f1701d5202dfc044d1f28729854be721129822f4d520e427d5d", 0xf3, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="be18c14ef67ab28965b53ce1ab80ddbc0736819a9636a12f3900df8d47adddd8b805ed8884ac8fb0a2154cf52262b39e579725a19c9901dad8ddd6cd5f5cfeaa7583a25523ca4b25838fb73a39576b4b43163174a351") r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001640)) 20:20:51 executing program 0: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) open(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0'}, 0xb) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000000f40)=[{{0x0, 0x0, 0x0}}], 0x28000, 0x4000008) 20:20:52 executing program 4: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x5) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x2002) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f00000000c0), 0x2, 0x410800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0x1, &(0x7f0000000100)="4066dc829b8fbcadc8e52b141a528aae1c21b4fb2eb906105a4d009debdd8011331090f54c46c52b54f44143c4f2dbfacce6c423ed25b407e8fdb9239b463c68cab0dc0dbfa6a1042df475799d4c827f3557907c1ace3aae70211cb2f5e5a021422f2924f3db37cc97138dc5ccd9c136ebb996d3545938415313923b9ffffcaee2f011d283bd52da7704d461a912968743d75fdaaaa9c69ae41765ff3a8b84dd5c4509d02fddfbbe6dbb7c019858c43eb9afa31e5f2247bac26c8f5cc575927074f751b29fb673fc0e", &(0x7f0000000200)=@udp6, 0x1}, 0x20) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000280)=0xff) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000002c0)={0x8, {0x7, 0xa3ef, 0x3f, 0x0, 0x2, 0x3}}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x11) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x300, 0x70bd2d, 0xffffff83, {0x4, 0x1, 0x5, [0x6, 0x5, 0x5, 0x10000, 0x0, 0x1, 0x5, 0x6, 0x7, 0x9, 0x4, 0x91c7, 0x3f, 0x81, 0x6c95, 0x0, 0xffff, 0x1, 0x200, 0xc5, 0x401, 0x800, 0x8, 0x80000001, 0x2, 0xac0c, 0xfc6, 0x3, 0x7, 0x400, 0x7fff, 0x6, 0x7fff, 0x5, 0x2, 0x10000, 0x81, 0x5867, 0x100, 0x0, 0xffffffff, 0x2, 0x800, 0x1, 0x182, 0x7, 0x16, 0x4, 0x6, 0x6212, 0x0, 0x1, 0xffffffe1, 0x8001, 0xffff, 0x0, 0x81, 0x8, 0x0, 0x101, 0x400, 0xfffffffd, 0x5], [0x10001, 0x800, 0x9, 0x10001, 0x0, 0xf2, 0x64d, 0xca5, 0x5, 0x4, 0xffffffff, 0x9, 0x0, 0xfffffff8, 0x400, 0xffffffff, 0x8, 0x81, 0x0, 0x836, 0xffff, 0x4, 0x1, 0xffff, 0x7, 0x1, 0x70000000, 0x80000001, 0x80000001, 0x3e566ffd, 0x2, 0x5, 0x0, 0xe199, 0x101, 0x20, 0xab94, 0x8020000, 0x0, 0xff, 0x1, 0x80000001, 0x1d31, 0x3, 0x884, 0x5, 0x7, 0x5, 0x8, 0x6, 0x1, 0x3, 0x7, 0xfffffe01, 0xfd6f, 0xffff4337, 0x5, 0x7f, 0x739acb7a, 0x68c3, 0x8, 0xc0, 0x9a2, 0x2], [0x2, 0x80000000, 0xd473, 0x5, 0xfffff801, 0x0, 0x81, 0x901, 0x7, 0xa4, 0x8, 0x7, 0x3a, 0x1, 0x2, 0xfff, 0x5, 0xffffffff, 0x8, 0x3, 0x4, 0x2, 0x3f, 0x0, 0xfffffff8, 0x8, 0x4, 0x6, 0x6, 0x4, 0xc6, 0x4ba, 0x385146b, 0x4, 0x1, 0x81, 0xb6, 0x7, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x6, 0x0, 0x7, 0x5, 0x9, 0x6, 0x1bf15fba, 0x3, 0x7fff, 0x9, 0xfffffffb, 0x2, 0x9, 0xff, 0x9a, 0x7fff, 0x6, 0x3, 0x1, 0x2, 0x1f], [0x4, 0x1000, 0x0, 0x80000000, 0x4, 0x6, 0x542, 0x100, 0x8001, 0x87, 0x4, 0x0, 0x99, 0x1, 0x0, 0x20, 0xdab6, 0x9, 0x40, 0x0, 0x2, 0x20, 0xffffffe0, 0x100, 0x1, 0x601, 0x3, 0x1, 0x401, 0x7fffffff, 0x5, 0x3, 0x200, 0x8001, 0x101, 0x9, 0x0, 0x1000, 0x2, 0x9, 0x6, 0x4, 0x1ff, 0x401, 0x1, 0xdcf, 0xfe, 0xe44, 0x0, 0x5, 0x89a, 0x80, 0x3, 0x9, 0x7fff, 0x6, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3], 0x16, ['/dev/loop#\x00', '/dev/loop#\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x438}, 0x1, 0x0, 0x0, 0x88b4}, 0x480c4) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x9, 0x2c24c0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000840)={0x3216, 0x100000001, 0x8, 0xc266}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0xbde5, 0xbf, 0xafa, 0x800, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4, 0xd}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a40)={r2, &(0x7f0000000900)="78dee0e489793816ec84ba173c78663054b9a8db80cd4b8a5eb8c99d81a2169eb8d7e1366c5a9118af65abef2455ffe0d6b7622d8c85ea69796102d6db8ba808be998aff5d8d973d9c37e44c66867eade0bfd8015d61f804123e104edf1f092e6effbec23ebc6a27852f0e34ccfed9", &(0x7f0000000980)=@buf="d1ac4e15aacf11e696771bd3afcf45bdd733580fe5b8c129f1af7e1cbfcbc1396e968ad112e616192011974a258a89e9ed31c688067d0148b63dab817484c4e1f82b257c858b9116e8757591a03d33a4d8ab444cbd77f91ca147c03e626688d8b6ba7c4058806b2229fca459660f8189802b86a1cce78899c82953aa7a016f76da0b057b461e60f083eb7b55fc86bbf714107dfcdc9765a9e2582a79d69b4b44a45a52045b59", 0x4}, 0x20) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000a80)={0x1f, 0x1b7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=@ipv4_getnexthop={0x2c, 0x6a, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x4800) r3 = getpgrp(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000bc0)='ns/time\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c00), 0x101000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000c40)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x94, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xff, 0x1f}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}]}, 0x94}, 0x1, 0x0, 0x0, 0x44084}, 0x4000000) syz_clone(0x6200a100, &(0x7f0000000e00)="b75705726f985ac68a0af625268ee05996c76b7051f1aa020981446b4bc81a54410155f350eb2a524c2bb2c660cd4bb3ebc5141101bd9d964a96c2c443da7fbd5c7a1094ef1c752a1fa492667958355e28bd746dceb9dda8ea4087aa6155e4b854d95a644b17e0a08b2d03c52a7a8a152b7329e8b60a068caaff713ed158b400d0cc93d978ee920d9fa78601f25f92a2215ab88624fe175b56694e5b15588c5572b90ca1e3b26c6fd75f27e5026531ec7323b5f2a1d62ebb142ba20883c8689e73d014dc403f0576972a7f81bd4319ee73cf0d96a707b3700c8f1701d5202dfc044d1f28729854be721129822f4d520e427d5d", 0xf3, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="be18c14ef67ab28965b53ce1ab80ddbc0736819a9636a12f3900df8d47adddd8b805ed8884ac8fb0a2154cf52262b39e579725a19c9901dad8ddd6cd5f5cfeaa7583a25523ca4b25838fb73a39576b4b43163174a351") r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001640)) 20:20:52 executing program 1: syz_emit_ethernet(0x3f, &(0x7f0000000140)={@link_local, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "000676", 0x9, 0x3a, 0x0, @local, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "ad"}}}}}}, 0x0) 20:20:53 executing program 0: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) open(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0'}, 0xb) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000000f40)=[{{0x0, 0x0, 0x0}}], 0x28000, 0x4000008) 20:20:53 executing program 1: syz_emit_ethernet(0x3f, &(0x7f0000000140)={@link_local, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "000676", 0x9, 0x3a, 0x0, @local, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "ad"}}}}}}, 0x0) 20:20:53 executing program 5: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) open(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0'}, 0xb) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000000f40)=[{{0x0, 0x0, 0x0}}], 0x28000, 0x4000008) 20:20:54 executing program 1: syz_emit_ethernet(0x3f, &(0x7f0000000140)={@link_local, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "000676", 0x9, 0x3a, 0x0, @local, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "ad"}}}}}}, 0x0) 20:20:54 executing program 0: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) open(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0'}, 0xb) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000000f40)=[{{0x0, 0x0, 0x0}}], 0x28000, 0x4000008) 20:20:54 executing program 1: syz_emit_ethernet(0x3f, &(0x7f0000000140)={@link_local, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "000676", 0x9, 0x3a, 0x0, @local, @mcast2, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "ad"}}}}}}, 0x0) 20:20:59 executing program 0: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) open(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0'}, 0xb) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000000f40)=[{{0x0, 0x0, 0x0}}], 0x28000, 0x4000008) 20:20:59 executing program 5: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) open(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0'}, 0xb) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000000f40)=[{{0x0, 0x0, 0x0}}], 0x28000, 0x4000008) 20:21:01 executing program 5: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) open(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0'}, 0xb) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000000f40)=[{{0x0, 0x0, 0x0}}], 0x28000, 0x4000008) 20:21:01 executing program 3: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) open(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0'}, 0xb) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000000f40)=[{{0x0, 0x0, 0x0}}], 0x28000, 0x4000008) 20:21:01 executing program 2: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) open(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0'}, 0xb) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000000f40)=[{{0x0, 0x0, 0x0}}], 0x28000, 0x4000008) 20:21:01 executing program 1: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) open(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0'}, 0xb) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000000f40)=[{{0x0, 0x0, 0x0}}], 0x28000, 0x4000008) 20:21:01 executing program 4: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x5) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x2002) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f00000000c0), 0x2, 0x410800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0x1, &(0x7f0000000100)="4066dc829b8fbcadc8e52b141a528aae1c21b4fb2eb906105a4d009debdd8011331090f54c46c52b54f44143c4f2dbfacce6c423ed25b407e8fdb9239b463c68cab0dc0dbfa6a1042df475799d4c827f3557907c1ace3aae70211cb2f5e5a021422f2924f3db37cc97138dc5ccd9c136ebb996d3545938415313923b9ffffcaee2f011d283bd52da7704d461a912968743d75fdaaaa9c69ae41765ff3a8b84dd5c4509d02fddfbbe6dbb7c019858c43eb9afa31e5f2247bac26c8f5cc575927074f751b29fb673fc0e", &(0x7f0000000200)=@udp6, 0x1}, 0x20) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000280)=0xff) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000002c0)={0x8, {0x7, 0xa3ef, 0x3f, 0x0, 0x2, 0x3}}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x11) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x300, 0x70bd2d, 0xffffff83, {0x4, 0x1, 0x5, [0x6, 0x5, 0x5, 0x10000, 0x0, 0x1, 0x5, 0x6, 0x7, 0x9, 0x4, 0x91c7, 0x3f, 0x81, 0x6c95, 0x0, 0xffff, 0x1, 0x200, 0xc5, 0x401, 0x800, 0x8, 0x80000001, 0x2, 0xac0c, 0xfc6, 0x3, 0x7, 0x400, 0x7fff, 0x6, 0x7fff, 0x5, 0x2, 0x10000, 0x81, 0x5867, 0x100, 0x0, 0xffffffff, 0x2, 0x800, 0x1, 0x182, 0x7, 0x16, 0x4, 0x6, 0x6212, 0x0, 0x1, 0xffffffe1, 0x8001, 0xffff, 0x0, 0x81, 0x8, 0x0, 0x101, 0x400, 0xfffffffd, 0x5], [0x10001, 0x800, 0x9, 0x10001, 0x0, 0xf2, 0x64d, 0xca5, 0x5, 0x4, 0xffffffff, 0x9, 0x0, 0xfffffff8, 0x400, 0xffffffff, 0x8, 0x81, 0x0, 0x836, 0xffff, 0x4, 0x1, 0xffff, 0x7, 0x1, 0x70000000, 0x80000001, 0x80000001, 0x3e566ffd, 0x2, 0x5, 0x0, 0xe199, 0x101, 0x20, 0xab94, 0x8020000, 0x0, 0xff, 0x1, 0x80000001, 0x1d31, 0x3, 0x884, 0x5, 0x7, 0x5, 0x8, 0x6, 0x1, 0x3, 0x7, 0xfffffe01, 0xfd6f, 0xffff4337, 0x5, 0x7f, 0x739acb7a, 0x68c3, 0x8, 0xc0, 0x9a2, 0x2], [0x2, 0x80000000, 0xd473, 0x5, 0xfffff801, 0x0, 0x81, 0x901, 0x7, 0xa4, 0x8, 0x7, 0x3a, 0x1, 0x2, 0xfff, 0x5, 0xffffffff, 0x8, 0x3, 0x4, 0x2, 0x3f, 0x0, 0xfffffff8, 0x8, 0x4, 0x6, 0x6, 0x4, 0xc6, 0x4ba, 0x385146b, 0x4, 0x1, 0x81, 0xb6, 0x7, 0x8, 0x0, 0x7ff, 0x0, 0x4, 0x6, 0x0, 0x7, 0x5, 0x9, 0x6, 0x1bf15fba, 0x3, 0x7fff, 0x9, 0xfffffffb, 0x2, 0x9, 0xff, 0x9a, 0x7fff, 0x6, 0x3, 0x1, 0x2, 0x1f], [0x4, 0x1000, 0x0, 0x80000000, 0x4, 0x6, 0x542, 0x100, 0x8001, 0x87, 0x4, 0x0, 0x99, 0x1, 0x0, 0x20, 0xdab6, 0x9, 0x40, 0x0, 0x2, 0x20, 0xffffffe0, 0x100, 0x1, 0x601, 0x3, 0x1, 0x401, 0x7fffffff, 0x5, 0x3, 0x200, 0x8001, 0x101, 0x9, 0x0, 0x1000, 0x2, 0x9, 0x6, 0x4, 0x1ff, 0x401, 0x1, 0xdcf, 0xfe, 0xe44, 0x0, 0x5, 0x89a, 0x80, 0x3, 0x9, 0x7fff, 0x6, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3], 0x16, ['/dev/loop#\x00', '/dev/loop#\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x438}, 0x1, 0x0, 0x0, 0x88b4}, 0x480c4) r1 = syz_open_dev$loop(&(0x7f0000000800), 0x9, 0x2c24c0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000840)={0x3216, 0x100000001, 0x8, 0xc266}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0xbde5, 0xbf, 0xafa, 0x800, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4, 0xd}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a40)={r2, &(0x7f0000000900)="78dee0e489793816ec84ba173c78663054b9a8db80cd4b8a5eb8c99d81a2169eb8d7e1366c5a9118af65abef2455ffe0d6b7622d8c85ea69796102d6db8ba808be998aff5d8d973d9c37e44c66867eade0bfd8015d61f804123e104edf1f092e6effbec23ebc6a27852f0e34ccfed9", &(0x7f0000000980)=@buf="d1ac4e15aacf11e696771bd3afcf45bdd733580fe5b8c129f1af7e1cbfcbc1396e968ad112e616192011974a258a89e9ed31c688067d0148b63dab817484c4e1f82b257c858b9116e8757591a03d33a4d8ab444cbd77f91ca147c03e626688d8b6ba7c4058806b2229fca459660f8189802b86a1cce78899c82953aa7a016f76da0b057b461e60f083eb7b55fc86bbf714107dfcdc9765a9e2582a79d69b4b44a45a52045b59", 0x4}, 0x20) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000a80)={0x1f, 0x1b7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=@ipv4_getnexthop={0x2c, 0x6a, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8}, @NHA_GROUPS={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x4800) r3 = getpgrp(0x0) syz_open_procfs$namespace(r3, &(0x7f0000000bc0)='ns/time\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c00), 0x101000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000c40)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r5, &(0x7f0000000dc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x94, 0x0, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xff, 0x1f}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x20}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}]}, 0x94}, 0x1, 0x0, 0x0, 0x44084}, 0x4000000) syz_clone(0x6200a100, &(0x7f0000000e00)="b75705726f985ac68a0af625268ee05996c76b7051f1aa020981446b4bc81a54410155f350eb2a524c2bb2c660cd4bb3ebc5141101bd9d964a96c2c443da7fbd5c7a1094ef1c752a1fa492667958355e28bd746dceb9dda8ea4087aa6155e4b854d95a644b17e0a08b2d03c52a7a8a152b7329e8b60a068caaff713ed158b400d0cc93d978ee920d9fa78601f25f92a2215ab88624fe175b56694e5b15588c5572b90ca1e3b26c6fd75f27e5026531ec7323b5f2a1d62ebb142ba20883c8689e73d014dc403f0576972a7f81bd4319ee73cf0d96a707b3700c8f1701d5202dfc044d1f28729854be721129822f4d520e427d5d", 0xf3, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="be18c14ef67ab28965b53ce1ab80ddbc0736819a9636a12f3900df8d47adddd8b805ed8884ac8fb0a2154cf52262b39e579725a19c9901dad8ddd6cd5f5cfeaa7583a25523ca4b25838fb73a39576b4b43163174a351") r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001640)) 20:21:01 executing program 0: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) open(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0'}, 0xb) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000000f40)=[{{0x0, 0x0, 0x0}}], 0x28000, 0x4000008) 20:21:05 executing program 5: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) open(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0'}, 0xb) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000000f40)=[{{0x0, 0x0, 0x0}}], 0x28000, 0x4000008) 20:21:05 executing program 1: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) open(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0'}, 0xb) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000000f40)=[{{0x0, 0x0, 0x0}}], 0x28000, 0x4000008) 20:21:05 executing program 3: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) open(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0'}, 0xb) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000000f40)=[{{0x0, 0x0, 0x0}}], 0x28000, 0x4000008) 20:21:05 executing program 0: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) open(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0'}, 0xb) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000000f40)=[{{0x0, 0x0, 0x0}}], 0x28000, 0x4000008) 20:21:05 executing program 2: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) open(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0'}, 0xb) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000000f40)=[{{0x0, 0x0, 0x0}}], 0x28000, 0x4000008) 20:21:07 executing program 5: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) open(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0'}, 0xb) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000000f40)=[{{0x0, 0x0, 0x0}}], 0x28000, 0x4000008) 20:21:10 executing program 5: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) open(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0'}, 0xb) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000000f40)=[{{0x0, 0x0, 0x0}}], 0x28000, 0x4000008) 20:21:10 executing program 1: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) open(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0'}, 0xb) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000000f40)=[{{0x0, 0x0, 0x0}}], 0x28000, 0x4000008) 20:21:11 executing program 2: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) open(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0'}, 0xb) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000000f40)=[{{0x0, 0x0, 0x0}}], 0x28000, 0x4000008) 20:21:11 executing program 0: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) open(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0'}, 0xb) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000000f40)=[{{0x0, 0x0, 0x0}}], 0x28000, 0x4000008) 20:21:16 executing program 1: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) open(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0'}, 0xb) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000000f40)=[{{0x0, 0x0, 0x0}}], 0x28000, 0x4000008) 20:21:16 executing program 3: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) open(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0'}, 0xb) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000000f40)=[{{0x0, 0x0, 0x0}}], 0x28000, 0x4000008) 20:21:16 executing program 5: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) open(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0'}, 0xb) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000000f40)=[{{0x0, 0x0, 0x0}}], 0x28000, 0x4000008) 20:21:16 executing program 0: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) open(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0'}, 0xb) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000000f40)=[{{0x0, 0x0, 0x0}}], 0x28000, 0x4000008) 20:21:16 executing program 2: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) open(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0'}, 0xb) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000000f40)=[{{0x0, 0x0, 0x0}}], 0x28000, 0x4000008) 20:21:16 executing program 4: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) open(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0'}, 0xb) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000000f40)=[{{0x0, 0x0, 0x0}}], 0x28000, 0x4000008) 20:21:19 executing program 2: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) open(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0'}, 0xb) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000000f40)=[{{0x0, 0x0, 0x0}}], 0x28000, 0x4000008) 20:21:21 executing program 3: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) open(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0'}, 0xb) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000000f40)=[{{0x0, 0x0, 0x0}}], 0x28000, 0x4000008) 20:21:21 executing program 1: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) open(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0'}, 0xb) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000000f40)=[{{0x0, 0x0, 0x0}}], 0x28000, 0x4000008) 20:21:21 executing program 0: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) open(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0'}, 0xb) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000000f40)=[{{0x0, 0x0, 0x0}}], 0x28000, 0x4000008) 20:21:22 executing program 5: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) open(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0'}, 0xb) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000000f40)=[{{0x0, 0x0, 0x0}}], 0x28000, 0x4000008) 20:21:22 executing program 4: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) open(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0'}, 0xb) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000000f40)=[{{0x0, 0x0, 0x0}}], 0x28000, 0x4000008) 20:21:22 executing program 2: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) open(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0'}, 0xb) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000000f40)=[{{0x0, 0x0, 0x0}}], 0x28000, 0x4000008) 20:21:23 executing program 3: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) open(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0'}, 0xb) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000000f40)=[{{0x0, 0x0, 0x0}}], 0x28000, 0x4000008) 20:21:25 executing program 0: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) open(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0'}, 0xb) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000000f40)=[{{0x0, 0x0, 0x0}}], 0x28000, 0x4000008) 20:21:26 executing program 2: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) open(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0'}, 0xb) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000000f40)=[{{0x0, 0x0, 0x0}}], 0x28000, 0x4000008) 20:21:27 executing program 5: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) open(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0'}, 0xb) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000000f40)=[{{0x0, 0x0, 0x0}}], 0x28000, 0x4000008) 20:21:28 executing program 0: set_mempolicy(0x1, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000004000000000000000000850000006d00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='mmap_lock_acquire_returned\x00', r0}, 0x10) 20:21:28 executing program 1: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) open(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0'}, 0xb) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000000f40)=[{{0x0, 0x0, 0x0}}], 0x28000, 0x4000008) 20:21:28 executing program 3: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) open(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0'}, 0xb) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000000f40)=[{{0x0, 0x0, 0x0}}], 0x28000, 0x4000008) 20:21:29 executing program 2: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) open(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0'}, 0xb) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000000f40)=[{{0x0, 0x0, 0x0}}], 0x28000, 0x4000008) 20:21:29 executing program 4: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) open(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0'}, 0xb) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000000f40)=[{{0x0, 0x0, 0x0}}], 0x28000, 0x4000008) [ 178.975726][ T26] kauditd_printk_skb: 4 callbacks suppressed [ 178.975745][ T26] audit: type=1400 audit(1676146889.570:128): avc: denied { prog_load } for pid=6183 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 20:21:32 executing program 1: openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000000), 0x80200, 0x0) 20:21:32 executing program 3: open$dir(&(0x7f0000000480)='./file0\x00', 0x44040, 0x0) mount(&(0x7f0000000040)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='proc\x00', 0x0, 0x0) mount$cgroup(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x100002, 0x0) [ 182.281731][ T26] audit: type=1400 audit(1676146889.570:129): avc: denied { perfmon } for pid=6183 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 182.308439][ T26] audit: type=1400 audit(1676146892.900:130): avc: denied { prog_run } for pid=6183 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 20:21:32 executing program 0: set_mempolicy(0x1, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000004000000000000000000850000006d00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='mmap_lock_acquire_returned\x00', r0}, 0x10) 20:21:33 executing program 5: syz_mount_image$reiserfs(&(0x7f0000001100), &(0x7f0000000040)='./file0\x00', 0x80, &(0x7f0000000240)=ANY=[], 0x1, 0x10ec, &(0x7f00000011c0)="$eJzs2D2LE0EcBvBnNukjc/0iaGEhxx3xC1yhkMbC2kaOq7wqqZR8HD+OpLIP6U0RsFfWZOMLAZGES/P7wTCzD/ufl3ImAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0BkmX0ty0SS1z5okJWnbxWSVpO3zR58HTUre3E1mL6fjV7Mkg5+/l651VV1Z6vWTWsd1XK/ri4ubp3X24eP7d/f3d9PdNCVtlpv5bV6vT3qUstsPAAAA8KfvRxudeX0AAADgX072kAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABwArUfNElK0raLySpJe95tAQAAAEcqafJ2dCjfPgP88jxfRmWfd/230o2v8ulAPQAAAPB/ym/38WcZ7u/lXfY4w1xebr93XdY3ySDJ1V/zLDfz276VhzwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPCDHTgWAAAAABDmb51GxwYAAAAAAAAAAAAAAABMFQAA//8ptdS5") r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) ftruncate(r0, 0x1) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[], 0x208e24b) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[], 0x208e24b) sync() r3 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r1, &(0x7f00000000c0)=0x10001, 0x532e000000000000, 0x0) 20:21:33 executing program 3: open$dir(&(0x7f0000000480)='./file0\x00', 0x44040, 0x0) mount(&(0x7f0000000040)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='proc\x00', 0x0, 0x0) mount$cgroup(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x100002, 0x0) 20:21:34 executing program 4: open$dir(&(0x7f0000000480)='./file0\x00', 0x44040, 0x0) mount(&(0x7f0000000040)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='proc\x00', 0x0, 0x0) mount$cgroup(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x100002, 0x0) 20:21:34 executing program 1: openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000000), 0x80200, 0x0) [ 183.386428][ T26] audit: type=1800 audit(1676146893.000:131): pid=6219 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=1184 res=0 errno=0 20:21:34 executing program 2: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) open(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0'}, 0xb) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000000f40)=[{{0x0, 0x0, 0x0}}], 0x28000, 0x4000008) 20:21:34 executing program 1: openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000000), 0x80200, 0x0) 20:21:34 executing program 4: open$dir(&(0x7f0000000480)='./file0\x00', 0x44040, 0x0) mount(&(0x7f0000000040)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='proc\x00', 0x0, 0x0) mount$cgroup(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x100002, 0x0) 20:21:34 executing program 3: open$dir(&(0x7f0000000480)='./file0\x00', 0x44040, 0x0) mount(&(0x7f0000000040)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='proc\x00', 0x0, 0x0) mount$cgroup(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x100002, 0x0) [ 183.558106][ T26] audit: type=1400 audit(1676146893.000:132): avc: denied { mounton } for pid=6216 comm="syz-executor.3" path="/root/syzkaller-testdir3305567474/syzkaller.b76QqX/37/file0" dev="sda1" ino=1184 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=file permissive=1 20:21:34 executing program 0: set_mempolicy(0x1, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000004000000000000000000850000006d00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='mmap_lock_acquire_returned\x00', r0}, 0x10) [ 183.727509][ T26] audit: type=1400 audit(1676146893.000:133): avc: denied { mount } for pid=6216 comm="syz-executor.3" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 20:21:34 executing program 3: open$dir(&(0x7f0000000480)='./file0\x00', 0x44040, 0x0) mount(&(0x7f0000000040)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='proc\x00', 0x0, 0x0) mount$cgroup(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x100002, 0x0) 20:21:34 executing program 1: openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000000), 0x80200, 0x0) 20:21:35 executing program 4: open$dir(&(0x7f0000000480)='./file0\x00', 0x44040, 0x0) mount(&(0x7f0000000040)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='proc\x00', 0x0, 0x0) mount$cgroup(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x100002, 0x0) [ 184.759070][ T26] audit: type=1800 audit(1676146894.090:134): pid=6230 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=1159 res=0 errno=0 [ 184.860523][ T26] audit: type=1800 audit(1676146894.100:135): pid=6228 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=1173 res=0 errno=0 [ 184.928682][ T6229] loop5: detected capacity change from 0 to 8192 [ 184.964339][ T26] audit: type=1800 audit(1676146894.290:136): pid=6241 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=1173 res=0 errno=0 [ 184.988773][ T6229] REISERFS warning: read_super_block: reiserfs filesystem is deprecated and scheduled to be removed from the kernel in 2025 [ 185.003735][ T6229] REISERFS (device loop5): found reiserfs format "3.6" with non-standard journal [ 185.016671][ T6229] REISERFS (device loop5): using ordered data mode [ 185.024529][ T6229] reiserfs: using flush barriers [ 185.032491][ T26] audit: type=1800 audit(1676146894.300:137): pid=6242 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=1174 res=0 errno=0 [ 185.054580][ T6229] REISERFS (device loop5): journal params: device loop5, size 512, journal first block 18, max trans len 256, max batch 225, max commit age 30, max trans age 30 [ 185.072691][ T26] audit: type=1800 audit(1676146895.410:138): pid=6251 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=1167 res=0 errno=0 [ 185.095856][ T6229] REISERFS (device loop5): checking transaction log (loop5) [ 185.137237][ T26] audit: type=1800 audit(1676146895.460:139): pid=6254 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=1173 res=0 errno=0 [ 185.228339][ T6229] REISERFS (device loop5): Using r5 hash to sort names [ 185.253409][ T6229] REISERFS (device loop5): Created .reiserfs_priv - reserved for xattr storage. [ 185.286752][ T26] audit: type=1400 audit(1676146895.880:140): avc: denied { mount } for pid=6224 comm="syz-executor.5" name="/" dev="loop5" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 185.417147][ T26] audit: type=1804 audit(1676146896.010:141): pid=6256 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir956611216/syzkaller.Eo5Dtz/35/file0/bus" dev="loop5" ino=4 res=1 errno=0 20:21:36 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) stat(0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") getresgid(0x0, 0x0, 0x0) socket$tipc(0x1e, 0x0, 0x0) stat(0x0, &(0x7f0000000e40)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x5, 0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0xffffffff, 0xfffffffe}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0xef84) 20:21:36 executing program 2: open$dir(&(0x7f0000000480)='./file0\x00', 0x44040, 0x0) mount(&(0x7f0000000040)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='proc\x00', 0x0, 0x0) mount$cgroup(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x100002, 0x0) 20:21:36 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)={0x3c, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) 20:21:36 executing program 0: set_mempolicy(0x1, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000004000000000000000000850000006d00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='mmap_lock_acquire_returned\x00', r0}, 0x10) 20:21:36 executing program 4: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) 20:21:36 executing program 5: syz_mount_image$reiserfs(&(0x7f0000001100), &(0x7f0000000040)='./file0\x00', 0x80, &(0x7f0000000240)=ANY=[], 0x1, 0x10ec, &(0x7f00000011c0)="$eJzs2D2LE0EcBvBnNukjc/0iaGEhxx3xC1yhkMbC2kaOq7wqqZR8HD+OpLIP6U0RsFfWZOMLAZGES/P7wTCzD/ufl3ImAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0BkmX0ty0SS1z5okJWnbxWSVpO3zR58HTUre3E1mL6fjV7Mkg5+/l651VV1Z6vWTWsd1XK/ri4ubp3X24eP7d/f3d9PdNCVtlpv5bV6vT3qUstsPAAAA8KfvRxudeX0AAADgX072kAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABwArUfNElK0raLySpJe95tAQAAAEcqafJ2dCjfPgP88jxfRmWfd/230o2v8ulAPQAAAPB/ym/38WcZ7u/lXfY4w1xebr93XdY3ySDJ1V/zLDfz276VhzwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPCDHTgWAAAAABDmb51GxwYAAAAAAAAAAAAAAABMFQAA//8ptdS5") r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) ftruncate(r0, 0x1) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[], 0x208e24b) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[], 0x208e24b) sync() r3 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r1, &(0x7f00000000c0)=0x10001, 0x532e000000000000, 0x0) [ 185.581315][ T26] audit: type=1400 audit(1676146896.180:142): avc: denied { unmount } for pid=5086 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 185.728471][ T26] audit: type=1800 audit(1676146896.250:143): pid=6266 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=1180 res=0 errno=0 [ 185.797744][ T6270] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 185.806081][ T6270] __nla_validate_parse: 6 callbacks suppressed [ 185.806118][ T6270] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 185.852658][ T6270] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 185.860842][ T6270] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:21:36 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)={0x3c, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) [ 185.999325][ T5089] Bluetooth: hci3: command 0x0406 tx timeout [ 185.999500][ T47] Bluetooth: hci4: command 0x0406 tx timeout [ 185.999563][ T5085] Bluetooth: hci1: command 0x0406 tx timeout [ 186.018048][ T5097] Bluetooth: hci2: command 0x0406 tx timeout [ 186.018135][ T4379] Bluetooth: hci5: command 0x0406 tx timeout [ 186.018174][ T5081] Bluetooth: hci0: command 0x0406 tx timeout [ 186.111323][ T6270] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 186.141524][ T6271] netlink: 'syz-executor.4': attribute type 27 has an invalid length. 20:21:37 executing program 2: open$dir(&(0x7f0000000480)='./file0\x00', 0x44040, 0x0) mount(&(0x7f0000000040)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='proc\x00', 0x0, 0x0) mount$cgroup(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x100002, 0x0) 20:21:37 executing program 0: syz_mount_image$reiserfs(&(0x7f0000001100), &(0x7f0000000040)='./file0\x00', 0x80, &(0x7f0000000240)=ANY=[], 0x1, 0x10ec, &(0x7f00000011c0)="$eJzs2D2LE0EcBvBnNukjc/0iaGEhxx3xC1yhkMbC2kaOq7wqqZR8HD+OpLIP6U0RsFfWZOMLAZGES/P7wTCzD/ufl3ImAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0BkmX0ty0SS1z5okJWnbxWSVpO3zR58HTUre3E1mL6fjV7Mkg5+/l651VV1Z6vWTWsd1XK/ri4ubp3X24eP7d/f3d9PdNCVtlpv5bV6vT3qUstsPAAAA8KfvRxudeX0AAADgX072kAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABwArUfNElK0raLySpJe95tAQAAAEcqafJ2dCjfPgP88jxfRmWfd/230o2v8ulAPQAAAPB/ym/38WcZ7u/lXfY4w1xebr93XdY3ySDJ1V/zLDfz276VhzwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPCDHTgWAAAAABDmb51GxwYAAAAAAAAAAAAAAABMFQAA//8ptdS5") r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) ftruncate(r0, 0x1) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[], 0x208e24b) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[], 0x208e24b) sync() r3 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r1, &(0x7f00000000c0)=0x10001, 0x532e000000000000, 0x0) 20:21:37 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)={0x3c, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) [ 186.623368][ T6268] loop1: detected capacity change from 0 to 2048 20:21:37 executing program 2: open$dir(&(0x7f0000000480)='./file0\x00', 0x44040, 0x0) mount(&(0x7f0000000040)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='proc\x00', 0x0, 0x0) mount$cgroup(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x100002, 0x0) 20:21:37 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)={0x3c, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) 20:21:37 executing program 2: syz_mount_image$reiserfs(&(0x7f0000001100), &(0x7f0000000040)='./file0\x00', 0x80, &(0x7f0000000240)=ANY=[], 0x1, 0x10ec, &(0x7f00000011c0)="$eJzs2D2LE0EcBvBnNukjc/0iaGEhxx3xC1yhkMbC2kaOq7wqqZR8HD+OpLIP6U0RsFfWZOMLAZGES/P7wTCzD/ufl3ImAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0BkmX0ty0SS1z5okJWnbxWSVpO3zR58HTUre3E1mL6fjV7Mkg5+/l651VV1Z6vWTWsd1XK/ri4ubp3X24eP7d/f3d9PdNCVtlpv5bV6vT3qUstsPAAAA8KfvRxudeX0AAADgX072kAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABwArUfNElK0raLySpJe95tAQAAAEcqafJ2dCjfPgP88jxfRmWfd/230o2v8ulAPQAAAPB/ym/38WcZ7u/lXfY4w1xebr93XdY3ySDJ1V/zLDfz276VhzwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPCDHTgWAAAAABDmb51GxwYAAAAAAAAAAAAAAABMFQAA//8ptdS5") r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) ftruncate(r0, 0x1) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[], 0x208e24b) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[], 0x208e24b) sync() r3 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r1, &(0x7f00000000c0)=0x10001, 0x532e000000000000, 0x0) 20:21:37 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) stat(0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") getresgid(0x0, 0x0, 0x0) socket$tipc(0x1e, 0x0, 0x0) stat(0x0, &(0x7f0000000e40)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x5, 0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0xffffffff, 0xfffffffe}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0xef84) 20:21:37 executing program 3: syz_mount_image$reiserfs(&(0x7f0000001100), &(0x7f0000000040)='./file0\x00', 0x80, &(0x7f0000000240)=ANY=[], 0x1, 0x10ec, &(0x7f00000011c0)="$eJzs2D2LE0EcBvBnNukjc/0iaGEhxx3xC1yhkMbC2kaOq7wqqZR8HD+OpLIP6U0RsFfWZOMLAZGES/P7wTCzD/ufl3ImAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0BkmX0ty0SS1z5okJWnbxWSVpO3zR58HTUre3E1mL6fjV7Mkg5+/l651VV1Z6vWTWsd1XK/ri4ubp3X24eP7d/f3d9PdNCVtlpv5bV6vT3qUstsPAAAA8KfvRxudeX0AAADgX072kAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABwArUfNElK0raLySpJe95tAQAAAEcqafJ2dCjfPgP88jxfRmWfd/230o2v8ulAPQAAAPB/ym/38WcZ7u/lXfY4w1xebr93XdY3ySDJ1V/zLDfz276VhzwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPCDHTgWAAAAABDmb51GxwYAAAAAAAAAAAAAAABMFQAA//8ptdS5") r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) ftruncate(r0, 0x1) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[], 0x208e24b) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[], 0x208e24b) sync() r3 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r1, &(0x7f00000000c0)=0x10001, 0x532e000000000000, 0x0) [ 187.146307][ T6279] loop0: detected capacity change from 0 to 8192 [ 187.246327][ T6279] REISERFS warning: read_super_block: reiserfs filesystem is deprecated and scheduled to be removed from the kernel in 2025 [ 187.268220][ T6286] loop5: detected capacity change from 0 to 8192 [ 187.332129][ T6279] REISERFS (device loop0): found reiserfs format "3.6" with non-standard journal [ 187.342940][ T6286] REISERFS warning: read_super_block: reiserfs filesystem is deprecated and scheduled to be removed from the kernel in 2025 [ 187.357153][ T6279] REISERFS (device loop0): using ordered data mode [ 187.378944][ T6286] REISERFS (device loop5): found reiserfs format "3.6" with non-standard journal [ 187.388193][ T6279] reiserfs: using flush barriers [ 187.402123][ T6291] loop2: detected capacity change from 0 to 8192 [ 187.409591][ T6286] REISERFS (device loop5): using ordered data mode [ 187.416290][ T6286] reiserfs: using flush barriers [ 187.424676][ T6279] REISERFS (device loop0): journal params: device loop0, size 512, journal first block 18, max trans len 256, max batch 225, max commit age 30, max trans age 30 [ 187.441385][ T6291] REISERFS warning: read_super_block: reiserfs filesystem is deprecated and scheduled to be removed from the kernel in 2025 [ 187.454425][ T6286] REISERFS (device loop5): reiserfs filesystem is deprecated and scheduled to be removed from the kernel in 2025 [ 187.455099][ T6279] REISERFS (device loop0): checking transaction log (loop0) [ 187.456724][ T6286] REISERFS (device loop5): checking transaction log (loop5) [ 187.490245][ T6291] REISERFS (device loop2): found reiserfs format "3.6" with non-standard journal [ 187.499911][ T6291] REISERFS (device loop2): using ordered data mode [ 187.525295][ T6291] reiserfs: using flush barriers [ 187.545498][ T6296] loop1: detected capacity change from 0 to 2048 [ 187.569549][ T6291] REISERFS (device loop2): journal params: device loop2, size 512, journal first block 18, max trans len 256, max batch 225, max commit age 30, max trans age 30 [ 187.650173][ T6291] REISERFS (device loop2): checking transaction log (loop2) [ 187.714435][ T6290] loop3: detected capacity change from 0 to 8192 [ 187.759879][ T6286] REISERFS (device loop5): Using r5 hash to sort names [ 187.776647][ T6286] REISERFS (device loop5): Created .reiserfs_priv - reserved for xattr storage. [ 187.789913][ T6290] REISERFS warning: read_super_block: reiserfs filesystem is deprecated and scheduled to be removed from the kernel in 2025 [ 187.938977][ T6290] REISERFS (device loop3): found reiserfs format "3.6" with non-standard journal [ 187.962510][ T6290] REISERFS (device loop3): using ordered data mode [ 187.971276][ T6279] REISERFS (device loop0): Using r5 hash to sort names [ 187.979095][ T6290] reiserfs: using flush barriers [ 187.996485][ T6290] REISERFS (device loop3): journal params: device loop3, size 512, journal first block 18, max trans len 256, max batch 225, max commit age 30, max trans age 30 [ 188.008073][ T6279] REISERFS (device loop0): Created .reiserfs_priv - reserved for xattr storage. [ 188.019493][ T6290] REISERFS (device loop3): checking transaction log (loop3) [ 188.116781][ T6291] REISERFS (device loop2): Using r5 hash to sort names [ 188.125000][ T6271] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.133520][ T6271] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.194327][ T6291] REISERFS (device loop2): Created .reiserfs_priv - reserved for xattr storage. 20:21:38 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) stat(0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") getresgid(0x0, 0x0, 0x0) socket$tipc(0x1e, 0x0, 0x0) stat(0x0, &(0x7f0000000e40)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x5, 0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0xffffffff, 0xfffffffe}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0xef84) [ 188.420657][ T6290] REISERFS (device loop3): Using r5 hash to sort names [ 188.428131][ T6290] REISERFS (device loop3): Created .reiserfs_priv - reserved for xattr storage. [ 188.781258][ T6304] loop1: detected capacity change from 0 to 2048 [ 189.732720][ T6271] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 189.809738][ T6271] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 190.187298][ T6271] netdevsim netdevsim4 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 190.196396][ T6271] netdevsim netdevsim4 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 190.205307][ T6271] netdevsim netdevsim4 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 190.214213][ T6271] netdevsim netdevsim4 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 20:21:40 executing program 4: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) 20:21:40 executing program 0: syz_mount_image$reiserfs(&(0x7f0000001100), &(0x7f0000000040)='./file0\x00', 0x80, &(0x7f0000000240)=ANY=[], 0x1, 0x10ec, &(0x7f00000011c0)="$eJzs2D2LE0EcBvBnNukjc/0iaGEhxx3xC1yhkMbC2kaOq7wqqZR8HD+OpLIP6U0RsFfWZOMLAZGES/P7wTCzD/ufl3ImAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0BkmX0ty0SS1z5okJWnbxWSVpO3zR58HTUre3E1mL6fjV7Mkg5+/l651VV1Z6vWTWsd1XK/ri4ubp3X24eP7d/f3d9PdNCVtlpv5bV6vT3qUstsPAAAA8KfvRxudeX0AAADgX072kAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABwArUfNElK0raLySpJe95tAQAAAEcqafJ2dCjfPgP88jxfRmWfd/230o2v8ulAPQAAAPB/ym/38WcZ7u/lXfY4w1xebr93XdY3ySDJ1V/zLDfz276VhzwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPCDHTgWAAAAABDmb51GxwYAAAAAAAAAAAAAAABMFQAA//8ptdS5") r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) ftruncate(r0, 0x1) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[], 0x208e24b) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[], 0x208e24b) sync() r3 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r1, &(0x7f00000000c0)=0x10001, 0x532e000000000000, 0x0) 20:21:40 executing program 5: syz_mount_image$reiserfs(&(0x7f0000001100), &(0x7f0000000040)='./file0\x00', 0x80, &(0x7f0000000240)=ANY=[], 0x1, 0x10ec, &(0x7f00000011c0)="$eJzs2D2LE0EcBvBnNukjc/0iaGEhxx3xC1yhkMbC2kaOq7wqqZR8HD+OpLIP6U0RsFfWZOMLAZGES/P7wTCzD/ufl3ImAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0BkmX0ty0SS1z5okJWnbxWSVpO3zR58HTUre3E1mL6fjV7Mkg5+/l651VV1Z6vWTWsd1XK/ri4ubp3X24eP7d/f3d9PdNCVtlpv5bV6vT3qUstsPAAAA8KfvRxudeX0AAADgX072kAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABwArUfNElK0raLySpJe95tAQAAAEcqafJ2dCjfPgP88jxfRmWfd/230o2v8ulAPQAAAPB/ym/38WcZ7u/lXfY4w1xebr93XdY3ySDJ1V/zLDfz276VhzwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPCDHTgWAAAAABDmb51GxwYAAAAAAAAAAAAAAABMFQAA//8ptdS5") r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) ftruncate(r0, 0x1) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[], 0x208e24b) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[], 0x208e24b) sync() r3 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r1, &(0x7f00000000c0)=0x10001, 0x532e000000000000, 0x0) 20:21:40 executing program 3: syz_mount_image$reiserfs(&(0x7f0000001100), &(0x7f0000000040)='./file0\x00', 0x80, &(0x7f0000000240)=ANY=[], 0x1, 0x10ec, &(0x7f00000011c0)="$eJzs2D2LE0EcBvBnNukjc/0iaGEhxx3xC1yhkMbC2kaOq7wqqZR8HD+OpLIP6U0RsFfWZOMLAZGES/P7wTCzD/ufl3ImAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0BkmX0ty0SS1z5okJWnbxWSVpO3zR58HTUre3E1mL6fjV7Mkg5+/l651VV1Z6vWTWsd1XK/ri4ubp3X24eP7d/f3d9PdNCVtlpv5bV6vT3qUstsPAAAA8KfvRxudeX0AAADgX072kAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABwArUfNElK0raLySpJe95tAQAAAEcqafJ2dCjfPgP88jxfRmWfd/230o2v8ulAPQAAAPB/ym/38WcZ7u/lXfY4w1xebr93XdY3ySDJ1V/zLDfz276VhzwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPCDHTgWAAAAABDmb51GxwYAAAAAAAAAAAAAAABMFQAA//8ptdS5") r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) ftruncate(r0, 0x1) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[], 0x208e24b) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[], 0x208e24b) sync() r3 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r1, &(0x7f00000000c0)=0x10001, 0x532e000000000000, 0x0) 20:21:40 executing program 2: syz_mount_image$reiserfs(&(0x7f0000001100), &(0x7f0000000040)='./file0\x00', 0x80, &(0x7f0000000240)=ANY=[], 0x1, 0x10ec, &(0x7f00000011c0)="$eJzs2D2LE0EcBvBnNukjc/0iaGEhxx3xC1yhkMbC2kaOq7wqqZR8HD+OpLIP6U0RsFfWZOMLAZGES/P7wTCzD/ufl3ImAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0BkmX0ty0SS1z5okJWnbxWSVpO3zR58HTUre3E1mL6fjV7Mkg5+/l651VV1Z6vWTWsd1XK/ri4ubp3X24eP7d/f3d9PdNCVtlpv5bV6vT3qUstsPAAAA8KfvRxudeX0AAADgX072kAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABwArUfNElK0raLySpJe95tAQAAAEcqafJ2dCjfPgP88jxfRmWfd/230o2v8ulAPQAAAPB/ym/38WcZ7u/lXfY4w1xebr93XdY3ySDJ1V/zLDfz276VhzwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPCDHTgWAAAAABDmb51GxwYAAAAAAAAAAAAAAABMFQAA//8ptdS5") r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) ftruncate(r0, 0x1) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[], 0x208e24b) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[], 0x208e24b) sync() r3 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r1, &(0x7f00000000c0)=0x10001, 0x532e000000000000, 0x0) 20:21:40 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) stat(0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") getresgid(0x0, 0x0, 0x0) socket$tipc(0x1e, 0x0, 0x0) stat(0x0, &(0x7f0000000e40)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x5, 0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0xffffffff, 0xfffffffe}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0xef84) [ 190.540236][ T6316] loop1: detected capacity change from 0 to 2048 [ 190.623342][ T26] kauditd_printk_skb: 13 callbacks suppressed [ 190.623361][ T26] audit: type=1800 audit(1676146901.220:157): pid=6316 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=1048627 res=0 errno=0 [ 190.702388][ T6312] loop0: detected capacity change from 0 to 8192 [ 190.723651][ T6319] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 190.731947][ T6319] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 190.742558][ T6310] loop5: detected capacity change from 0 to 8192 [ 190.751250][ T6311] loop3: detected capacity change from 0 to 8192 [ 190.764657][ T6319] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 190.770536][ T26] audit: type=1804 audit(1676146901.270:158): pid=6316 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir754339577/syzkaller.9EnLvI/52/file0/file0" dev="loop1" ino=1048627 res=1 errno=0 [ 190.772060][ T6319] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 190.808776][ T6319] 8021q: adding VLAN 0 to HW filter on device bond0 [ 190.817047][ T6319] 8021q: adding VLAN 0 to HW filter on device team0 [ 190.833779][ T6311] REISERFS warning: read_super_block: reiserfs filesystem is deprecated and scheduled to be removed from the kernel in 2025 [ 190.855156][ T6319] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 190.866178][ T6312] REISERFS warning: read_super_block: reiserfs filesystem is deprecated and scheduled to be removed from the kernel in 2025 [ 190.871370][ T6323] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 190.885475][ T6310] REISERFS warning: read_super_block: reiserfs filesystem is deprecated and scheduled to be removed from the kernel in 2025 [ 190.908039][ T6314] loop2: detected capacity change from 0 to 8192 [ 190.914730][ T6311] REISERFS (device loop3): found reiserfs format "3.6" with non-standard journal [ 190.950361][ T6312] REISERFS (device loop0): found reiserfs format "3.6" with non-standard journal [ 190.953786][ T6311] REISERFS (device loop3): using ordered data mode [ 190.959916][ T6312] REISERFS (device loop0): using ordered data mode [ 190.973565][ T6312] reiserfs: using flush barriers [ 190.980178][ T6312] REISERFS (device loop0): journal params: device loop0, size 512, journal first block 18, max trans len 256, max batch 225, max commit age 30, max trans age 30 [ 190.984342][ T6314] REISERFS warning: read_super_block: reiserfs filesystem is deprecated and scheduled to be removed from the kernel in 2025 [ 190.996908][ T6310] REISERFS (device loop5): found reiserfs format "3.6" with non-standard journal [ 191.023725][ T6311] reiserfs: using flush barriers [ 191.030101][ T6312] REISERFS (device loop0): checking transaction log (loop0) [ 191.044476][ T6310] REISERFS (device loop5): using ordered data mode [ 191.047678][ T6314] REISERFS (device loop2): found reiserfs format "3.6" with non-standard journal [ 191.086084][ T6311] REISERFS (device loop3): journal params: device loop3, size 512, journal first block 18, max trans len 256, max batch 225, max commit age 30, max trans age 30 [ 191.115650][ T6310] reiserfs: using flush barriers [ 191.144116][ T6314] REISERFS (device loop2): using ordered data mode [ 191.163305][ T6310] REISERFS (device loop5): journal params: device loop5, size 512, journal first block 18, max trans len 256, max batch 225, max commit age 30, max trans age 30 [ 191.181951][ T6314] reiserfs: using flush barriers [ 191.195394][ T6311] REISERFS (device loop3): checking transaction log (loop3) [ 191.224734][ T6314] REISERFS (device loop2): journal params: device loop2, size 512, journal first block 18, max trans len 256, max batch 225, max commit age 30, max trans age 30 [ 191.249683][ T6310] REISERFS (device loop5): checking transaction log (loop5) [ 191.393690][ T6312] REISERFS (device loop0): Using r5 hash to sort names [ 191.419478][ T6312] REISERFS (device loop0): Created .reiserfs_priv - reserved for xattr storage. [ 191.437784][ T6314] REISERFS (device loop2): checking transaction log (loop2) 20:21:42 executing program 1: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) [ 191.616108][ T6310] REISERFS (device loop5): Using r5 hash to sort names [ 191.627098][ T26] audit: type=1804 audit(1676146902.220:159): pid=6325 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir3326156338/syzkaller.JQdaLw/50/file0/bus" dev="loop0" ino=4 res=1 errno=0 [ 191.680891][ T6310] REISERFS (device loop5): Created .reiserfs_priv - reserved for xattr storage. [ 191.745769][ T6311] REISERFS (device loop3): Using r5 hash to sort names [ 191.780102][ T6311] REISERFS (device loop3): Created .reiserfs_priv - reserved for xattr storage. [ 191.930181][ T26] audit: type=1804 audit(1676146902.530:160): pid=6330 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir956611216/syzkaller.Eo5Dtz/37/file0/bus" dev="loop5" ino=4 res=1 errno=0 [ 191.993423][ T6314] REISERFS (device loop2): Using r5 hash to sort names [ 192.041095][ T6314] REISERFS (device loop2): Created .reiserfs_priv - reserved for xattr storage. [ 192.063220][ T26] audit: type=1804 audit(1676146902.660:161): pid=6333 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir3305567474/syzkaller.b76QqX/46/file0/bus" dev="loop3" ino=4 res=1 errno=0 20:21:42 executing program 0: syz_mount_image$reiserfs(&(0x7f0000001100), &(0x7f0000000040)='./file0\x00', 0x80, &(0x7f0000000240)=ANY=[], 0x1, 0x10ec, &(0x7f00000011c0)="$eJzs2D2LE0EcBvBnNukjc/0iaGEhxx3xC1yhkMbC2kaOq7wqqZR8HD+OpLIP6U0RsFfWZOMLAZGES/P7wTCzD/ufl3ImAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0BkmX0ty0SS1z5okJWnbxWSVpO3zR58HTUre3E1mL6fjV7Mkg5+/l651VV1Z6vWTWsd1XK/ri4ubp3X24eP7d/f3d9PdNCVtlpv5bV6vT3qUstsPAAAA8KfvRxudeX0AAADgX072kAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABwArUfNElK0raLySpJe95tAQAAAEcqafJ2dCjfPgP88jxfRmWfd/230o2v8ulAPQAAAPB/ym/38WcZ7u/lXfY4w1xebr93XdY3ySDJ1V/zLDfz276VhzwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPCDHTgWAAAAABDmb51GxwYAAAAAAAAAAAAAAABMFQAA//8ptdS5") r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) ftruncate(r0, 0x1) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[], 0x208e24b) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[], 0x208e24b) sync() r3 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r1, &(0x7f00000000c0)=0x10001, 0x532e000000000000, 0x0) 20:21:42 executing program 3: syz_mount_image$reiserfs(&(0x7f0000001100), &(0x7f0000000040)='./file0\x00', 0x80, &(0x7f0000000240)=ANY=[], 0x1, 0x10ec, &(0x7f00000011c0)="$eJzs2D2LE0EcBvBnNukjc/0iaGEhxx3xC1yhkMbC2kaOq7wqqZR8HD+OpLIP6U0RsFfWZOMLAZGES/P7wTCzD/ufl3ImAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0BkmX0ty0SS1z5okJWnbxWSVpO3zR58HTUre3E1mL6fjV7Mkg5+/l651VV1Z6vWTWsd1XK/ri4ubp3X24eP7d/f3d9PdNCVtlpv5bV6vT3qUstsPAAAA8KfvRxudeX0AAADgX072kAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABwArUfNElK0raLySpJe95tAQAAAEcqafJ2dCjfPgP88jxfRmWfd/230o2v8ulAPQAAAPB/ym/38WcZ7u/lXfY4w1xebr93XdY3ySDJ1V/zLDfz276VhzwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPCDHTgWAAAAABDmb51GxwYAAAAAAAAAAAAAAABMFQAA//8ptdS5") r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) ftruncate(r0, 0x1) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[], 0x208e24b) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[], 0x208e24b) sync() r3 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r1, &(0x7f00000000c0)=0x10001, 0x532e000000000000, 0x0) [ 192.302058][ T6330] syz-executor.5 (6330) used greatest stack depth: 22664 bytes left [ 192.366602][ T26] audit: type=1804 audit(1676146902.960:162): pid=6334 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir3701763314/syzkaller.hdK9YS/48/file0/bus" dev="loop2" ino=4 res=1 errno=0 20:21:43 executing program 5: syz_mount_image$reiserfs(&(0x7f0000001100), &(0x7f0000000040)='./file0\x00', 0x80, &(0x7f0000000240)=ANY=[], 0x1, 0x10ec, &(0x7f00000011c0)="$eJzs2D2LE0EcBvBnNukjc/0iaGEhxx3xC1yhkMbC2kaOq7wqqZR8HD+OpLIP6U0RsFfWZOMLAZGES/P7wTCzD/ufl3ImAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0BkmX0ty0SS1z5okJWnbxWSVpO3zR58HTUre3E1mL6fjV7Mkg5+/l651VV1Z6vWTWsd1XK/ri4ubp3X24eP7d/f3d9PdNCVtlpv5bV6vT3qUstsPAAAA8KfvRxudeX0AAADgX072kAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABwArUfNElK0raLySpJe95tAQAAAEcqafJ2dCjfPgP88jxfRmWfd/230o2v8ulAPQAAAPB/ym/38WcZ7u/lXfY4w1xebr93XdY3ySDJ1V/zLDfz276VhzwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPCDHTgWAAAAABDmb51GxwYAAAAAAAAAAAAAAABMFQAA//8ptdS5") r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) ftruncate(r0, 0x1) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[], 0x208e24b) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[], 0x208e24b) sync() r3 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r1, &(0x7f00000000c0)=0x10001, 0x532e000000000000, 0x0) 20:21:43 executing program 2: syz_mount_image$reiserfs(&(0x7f0000001100), &(0x7f0000000040)='./file0\x00', 0x80, &(0x7f0000000240)=ANY=[], 0x1, 0x10ec, &(0x7f00000011c0)="$eJzs2D2LE0EcBvBnNukjc/0iaGEhxx3xC1yhkMbC2kaOq7wqqZR8HD+OpLIP6U0RsFfWZOMLAZGES/P7wTCzD/ufl3ImAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0BkmX0ty0SS1z5okJWnbxWSVpO3zR58HTUre3E1mL6fjV7Mkg5+/l651VV1Z6vWTWsd1XK/ri4ubp3X24eP7d/f3d9PdNCVtlpv5bV6vT3qUstsPAAAA8KfvRxudeX0AAADgX072kAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABwArUfNElK0raLySpJe95tAQAAAEcqafJ2dCjfPgP88jxfRmWfd/230o2v8ulAPQAAAPB/ym/38WcZ7u/lXfY4w1xebr93XdY3ySDJ1V/zLDfz276VhzwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPCDHTgWAAAAABDmb51GxwYAAAAAAAAAAAAAAABMFQAA//8ptdS5") r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) ftruncate(r0, 0x1) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[], 0x208e24b) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[], 0x208e24b) sync() r3 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r1, &(0x7f00000000c0)=0x10001, 0x532e000000000000, 0x0) [ 192.924984][ T6329] netlink: 'syz-executor.1': attribute type 27 has an invalid length. [ 192.933379][ T6329] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 192.957059][ T6329] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 192.964810][ T6329] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 192.977512][ T6329] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 192.993532][ T6331] netlink: 'syz-executor.1': attribute type 27 has an invalid length. [ 193.292841][ T6339] loop0: detected capacity change from 0 to 8192 [ 193.294051][ T6338] loop5: detected capacity change from 0 to 8192 [ 193.323231][ T6340] loop3: detected capacity change from 0 to 8192 [ 193.325919][ T6339] REISERFS warning: read_super_block: reiserfs filesystem is deprecated and scheduled to be removed from the kernel in 2025 [ 193.356212][ T6338] REISERFS warning: read_super_block: reiserfs filesystem is deprecated and scheduled to be removed from the kernel in 2025 [ 193.363306][ T6339] REISERFS (device loop0): found reiserfs format "3.6" with non-standard journal [ 193.382291][ T6338] REISERFS (device loop5): found reiserfs format "3.6" with non-standard journal [ 193.399186][ T6339] REISERFS (device loop0): using ordered data mode [ 193.413158][ T6339] reiserfs: using flush barriers [ 193.422296][ T6340] REISERFS warning: read_super_block: reiserfs filesystem is deprecated and scheduled to be removed from the kernel in 2025 [ 193.435131][ T6338] REISERFS (device loop5): using ordered data mode [ 193.442570][ T6340] REISERFS (device loop3): found reiserfs format "3.6" with non-standard journal [ 193.448790][ T6342] loop2: detected capacity change from 0 to 8192 [ 193.465111][ T6339] REISERFS (device loop0): journal params: device loop0, size 512, journal first block 18, max trans len 256, max batch 225, max commit age 30, max trans age 30 [ 193.489718][ T6340] REISERFS (device loop3): using ordered data mode [ 193.498256][ T6342] REISERFS warning: read_super_block: reiserfs filesystem is deprecated and scheduled to be removed from the kernel in 2025 [ 193.505684][ T6338] reiserfs: using flush barriers [ 193.530512][ T6340] reiserfs: using flush barriers [ 193.535956][ T6339] REISERFS (device loop0): checking transaction log (loop0) [ 193.543593][ T6338] REISERFS (device loop5): journal params: device loop5, size 512, journal first block 18, max trans len 256, max batch 225, max commit age 30, max trans age 30 20:21:44 executing program 4: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) [ 193.561443][ T6342] REISERFS (device loop2): found reiserfs format "3.6" with non-standard journal [ 193.574138][ T6340] REISERFS (device loop3): journal params: device loop3, size 512, journal first block 18, max trans len 256, max batch 225, max commit age 30, max trans age 30 [ 193.609102][ T6342] REISERFS (device loop2): using ordered data mode [ 193.629244][ T6342] reiserfs: using flush barriers [ 193.635021][ T6340] REISERFS (device loop3): checking transaction log (loop3) [ 193.650666][ T6342] REISERFS (device loop2): journal params: device loop2, size 512, journal first block 18, max trans len 256, max batch 225, max commit age 30, max trans age 30 [ 193.678478][ T6338] REISERFS (device loop5): checking transaction log (loop5) [ 193.727736][ T6342] REISERFS (device loop2): checking transaction log (loop2) [ 193.835170][ T6339] REISERFS (device loop0): Using r5 hash to sort names [ 193.890750][ T6339] REISERFS (device loop0): Created .reiserfs_priv - reserved for xattr storage. [ 193.963719][ T6340] REISERFS (device loop3): Using r5 hash to sort names [ 194.015424][ T6340] REISERFS (device loop3): Created .reiserfs_priv - reserved for xattr storage. [ 194.141269][ T6338] REISERFS (device loop5): Using r5 hash to sort names [ 194.155085][ T1209] ieee802154 phy0 wpan0: encryption failed: -22 [ 194.161815][ T1209] ieee802154 phy1 wpan1: encryption failed: -22 [ 194.188773][ T6342] REISERFS (device loop2): Using r5 hash to sort names [ 194.199450][ T6338] REISERFS (device loop5): Created .reiserfs_priv - reserved for xattr storage. [ 194.235217][ T6342] REISERFS (device loop2): Created .reiserfs_priv - reserved for xattr storage. [ 194.247379][ T26] audit: type=1804 audit(1676146904.840:163): pid=6353 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir3326156338/syzkaller.JQdaLw/51/file0/bus" dev="loop0" ino=4 res=1 errno=0 20:21:45 executing program 0: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) [ 194.581739][ T26] audit: type=1804 audit(1676146905.180:164): pid=6355 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir956611216/syzkaller.Eo5Dtz/38/file0/bus" dev="loop5" ino=4 res=1 errno=0 [ 194.721511][ T26] audit: type=1804 audit(1676146905.210:165): pid=6354 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir3305567474/syzkaller.b76QqX/47/file0/bus" dev="loop3" ino=4 res=1 errno=0 [ 194.834446][ T26] audit: type=1804 audit(1676146905.240:166): pid=6356 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir3701763314/syzkaller.hdK9YS/49/file0/bus" dev="loop2" ino=4 res=1 errno=0 [ 194.930961][ T6331] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.938449][ T6331] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.465210][ T6331] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 196.512408][ T6331] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 196.874282][ T6331] netdevsim netdevsim1 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 196.883290][ T6331] netdevsim netdevsim1 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 196.892349][ T6331] netdevsim netdevsim1 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 196.901409][ T6331] netdevsim netdevsim1 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 20:21:47 executing program 1: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) [ 197.043188][ T6350] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 197.052014][ T6350] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 197.092413][ T6350] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 197.099899][ T6350] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 197.108051][ T6350] 8021q: adding VLAN 0 to HW filter on device bond0 [ 197.116268][ T6350] 8021q: adding VLAN 0 to HW filter on device team0 [ 197.128691][ T6350] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 197.144809][ T6351] netlink: 'syz-executor.4': attribute type 27 has an invalid length. 20:21:48 executing program 4: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) [ 198.360117][ T6360] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 198.368398][ T6360] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 198.388008][ T6360] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 198.395483][ T6360] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 198.407168][ T6360] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 198.423288][ T6361] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 199.717287][ T6361] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.724971][ T6361] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.341811][ T6361] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 200.386985][ T6361] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 200.732946][ T6361] netdevsim netdevsim0 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 200.742251][ T6361] netdevsim netdevsim0 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 200.751215][ T6361] netdevsim netdevsim0 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 200.760202][ T6361] netdevsim netdevsim0 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 20:21:51 executing program 0: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) [ 200.897715][ T6366] netlink: 'syz-executor.1': attribute type 27 has an invalid length. [ 200.906058][ T6366] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 200.939859][ T6366] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 200.947212][ T6366] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 200.955718][ T6366] 8021q: adding VLAN 0 to HW filter on device bond0 [ 200.965529][ T6366] 8021q: adding VLAN 0 to HW filter on device team0 [ 200.977539][ T6366] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 200.993542][ T6367] netlink: 'syz-executor.1': attribute type 27 has an invalid length. 20:21:52 executing program 1: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) [ 202.172274][ T6372] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 202.181003][ T6372] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 202.209514][ T6372] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 202.216831][ T6372] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 202.225715][ T6372] 8021q: adding VLAN 0 to HW filter on device bond0 [ 202.234043][ T6372] 8021q: adding VLAN 0 to HW filter on device team0 [ 202.244950][ T6372] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 202.261297][ T6373] netlink: 'syz-executor.4': attribute type 27 has an invalid length. 20:21:54 executing program 4: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) [ 203.448721][ T6378] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 203.457641][ T6378] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 203.487492][ T6378] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 203.495719][ T6378] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 203.504343][ T6378] 8021q: adding VLAN 0 to HW filter on device bond0 [ 203.512854][ T6378] 8021q: adding VLAN 0 to HW filter on device team0 [ 203.537225][ T6378] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 203.553377][ T6379] netlink: 'syz-executor.0': attribute type 27 has an invalid length. 20:21:55 executing program 0: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) [ 204.733176][ T6384] netlink: 'syz-executor.1': attribute type 27 has an invalid length. [ 204.741559][ T6384] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 204.768643][ T6384] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 204.776018][ T6384] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 204.784428][ T6384] 8021q: adding VLAN 0 to HW filter on device bond0 [ 204.794480][ T6384] 8021q: adding VLAN 0 to HW filter on device team0 [ 204.804631][ T6384] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 204.820772][ T6385] netlink: 'syz-executor.1': attribute type 27 has an invalid length. 20:21:56 executing program 1: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) [ 206.011138][ T6390] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 206.019692][ T6390] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 206.054459][ T6390] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 206.062796][ T6390] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 206.071374][ T6390] 8021q: adding VLAN 0 to HW filter on device bond0 [ 206.079972][ T6390] 8021q: adding VLAN 0 to HW filter on device team0 [ 206.093625][ T6390] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 206.109689][ T6391] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 207.305429][ T6396] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 207.313729][ T6396] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 207.342423][ T6396] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 207.349962][ T6396] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 207.358142][ T6396] 8021q: adding VLAN 0 to HW filter on device bond0 [ 207.366027][ T6396] 8021q: adding VLAN 0 to HW filter on device team0 [ 207.376801][ T6396] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 207.393436][ T6397] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 207.717601][ T6402] netlink: 'syz-executor.1': attribute type 27 has an invalid length. [ 207.725906][ T6402] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 207.753775][ T6402] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 207.761412][ T6402] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 207.770420][ T6402] 8021q: adding VLAN 0 to HW filter on device bond0 [ 207.778125][ T6402] 8021q: adding VLAN 0 to HW filter on device team0 [ 207.790281][ T6402] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 207.808095][ T6403] netlink: 'syz-executor.1': attribute type 27 has an invalid length. 20:22:37 executing program 4: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) [ 247.518115][ T6414] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 247.526518][ T6414] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 247.619285][ T6414] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 247.626987][ T6414] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 247.638849][ T6414] 8021q: adding VLAN 0 to HW filter on device bond0 [ 247.651470][ T6414] 8021q: adding VLAN 0 to HW filter on device team0 [ 247.685942][ T6414] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 247.702109][ T6415] netlink: 'syz-executor.4': attribute type 27 has an invalid length. 20:22:38 executing program 0: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) 20:22:38 executing program 1: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) 20:22:38 executing program 3: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) 20:22:40 executing program 5: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) 20:22:40 executing program 2: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) 20:22:41 executing program 4: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) [ 250.456462][ T6423] netlink: 'syz-executor.1': attribute type 27 has an invalid length. [ 250.464815][ T6423] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 250.475885][ T26] audit: type=1400 audit(1676146961.070:167): avc: denied { append } for pid=4406 comm="syslogd" name="messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 250.495744][ T6423] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 250.507328][ T6423] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 250.515974][ T6423] 8021q: adding VLAN 0 to HW filter on device bond0 [ 250.524145][ T6423] 8021q: adding VLAN 0 to HW filter on device team0 [ 250.531094][ T26] audit: type=1400 audit(1676146961.070:168): avc: denied { open } for pid=4406 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 250.554363][ T26] audit: type=1400 audit(1676146961.070:169): avc: denied { getattr } for pid=4406 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 250.577527][ T6423] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 250.593689][ T6422] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 250.602786][ T6422] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 250.636823][ T6422] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 250.644250][ T6422] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 250.654035][ T6422] 8021q: adding VLAN 0 to HW filter on device bond0 [ 250.662314][ T6422] 8021q: adding VLAN 0 to HW filter on device team0 [ 250.673435][ T6422] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 250.689386][ T6425] netlink: 'syz-executor.1': attribute type 27 has an invalid length. 20:22:42 executing program 1: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) [ 251.535148][ T6424] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 252.856755][ T5097] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 252.865249][ T5097] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 252.876523][ T5097] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 252.886830][ T5097] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 252.894831][ T5097] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 252.902984][ T5085] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 252.913930][ T5085] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 252.922356][ T5085] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 252.934923][ T5085] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 252.942767][ T5085] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 252.950314][ T5085] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 253.021752][ T5085] Bluetooth: hci8: unexpected cc 0x1003 length: 249 > 9 [ 253.030915][ T5085] Bluetooth: hci8: unexpected cc 0x1001 length: 249 > 9 [ 253.038964][ T5085] Bluetooth: hci8: unexpected cc 0x0c23 length: 249 > 4 [ 253.048005][ T5085] Bluetooth: hci8: unexpected cc 0x0c25 length: 249 > 3 [ 253.055382][ T5085] Bluetooth: hci8: unexpected cc 0x0c38 length: 249 > 2 [ 253.201535][ T6432] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 253.209838][ T6432] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 20:22:43 executing program 0: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) [ 253.244275][ T6432] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 253.251646][ T6432] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 253.260240][ T6432] 8021q: adding VLAN 0 to HW filter on device bond0 [ 253.269656][ T6432] 8021q: adding VLAN 0 to HW filter on device team0 [ 253.282143][ T6432] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 253.298145][ T6433] netlink: 'syz-executor.4': attribute type 27 has an invalid length. 20:22:45 executing program 4: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) [ 254.468979][ T6441] netlink: 'syz-executor.1': attribute type 27 has an invalid length. [ 254.477239][ T6441] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 254.512395][ T6441] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 254.519804][ T6441] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 254.527853][ T6441] 8021q: adding VLAN 0 to HW filter on device bond0 [ 254.535706][ T6441] 8021q: adding VLAN 0 to HW filter on device team0 [ 254.545895][ T6441] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 254.561841][ T6442] netlink: 'syz-executor.1': attribute type 27 has an invalid length. [ 254.949316][ T5085] Bluetooth: hci6: command 0x0409 tx timeout [ 255.039357][ T5085] Bluetooth: hci7: command 0x0409 tx timeout [ 255.109417][ T5085] Bluetooth: hci8: command 0x0409 tx timeout [ 255.591663][ T1209] ieee802154 phy0 wpan0: encryption failed: -22 [ 255.598026][ T1209] ieee802154 phy1 wpan1: encryption failed: -22 20:22:46 executing program 1: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) [ 255.739846][ T6453] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 255.748761][ T6453] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 255.779773][ T6453] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 255.787100][ T6453] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 255.795422][ T6453] 8021q: adding VLAN 0 to HW filter on device bond0 [ 255.803809][ T6453] 8021q: adding VLAN 0 to HW filter on device team0 [ 255.826591][ T6453] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 255.842926][ T6454] netlink: 'syz-executor.0': attribute type 27 has an invalid length. 20:22:47 executing program 0: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) [ 257.011805][ T6459] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 257.020170][ T6459] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 257.031577][ T5085] Bluetooth: hci6: command 0x041b tx timeout [ 257.055651][ T6459] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 257.063365][ T6459] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 257.071672][ T6459] 8021q: adding VLAN 0 to HW filter on device bond0 [ 257.079854][ T6459] 8021q: adding VLAN 0 to HW filter on device team0 [ 257.090155][ T6459] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 257.106144][ T6460] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 257.114450][ T5081] Bluetooth: hci7: command 0x041b tx timeout [ 257.121325][ T26] audit: type=1400 audit(1676146967.720:170): avc: denied { rename } for pid=4406 comm="syslogd" name="messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 257.144315][ T26] audit: type=1400 audit(1676146967.720:171): avc: denied { unlink } for pid=4406 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 257.178424][ T26] audit: type=1400 audit(1676146967.720:172): avc: denied { create } for pid=4406 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 257.208956][ T5085] Bluetooth: hci8: command 0x041b tx timeout 20:22:48 executing program 4: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) [ 258.391782][ T6465] netlink: 'syz-executor.1': attribute type 27 has an invalid length. [ 258.400099][ T6465] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 258.432477][ T6465] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 258.439882][ T6465] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 258.448360][ T6465] 8021q: adding VLAN 0 to HW filter on device bond0 [ 258.456589][ T6465] 8021q: adding VLAN 0 to HW filter on device team0 [ 258.469270][ T6465] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 258.487138][ T6466] netlink: 'syz-executor.1': attribute type 27 has an invalid length. [ 259.129082][ T5085] Bluetooth: hci6: command 0x040f tx timeout [ 259.189162][ T5081] Bluetooth: hci7: command 0x040f tx timeout [ 259.269052][ T5081] Bluetooth: hci8: command 0x040f tx timeout 20:22:50 executing program 1: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) [ 259.631426][ T6471] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 259.639745][ T6471] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 259.670040][ T6471] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 259.677346][ T6471] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 259.685651][ T6471] 8021q: adding VLAN 0 to HW filter on device bond0 [ 259.694246][ T6471] 8021q: adding VLAN 0 to HW filter on device team0 [ 259.704926][ T6471] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 259.721769][ T6472] netlink: 'syz-executor.0': attribute type 27 has an invalid length. 20:22:51 executing program 0: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) [ 261.069373][ T6477] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 261.077637][ T6477] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 261.111857][ T6477] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 261.119370][ T6477] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 261.127907][ T6477] 8021q: adding VLAN 0 to HW filter on device bond0 [ 261.136218][ T6477] 8021q: adding VLAN 0 to HW filter on device team0 [ 261.159748][ T6477] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 261.177021][ T6478] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 261.189135][ T5081] Bluetooth: hci6: command 0x0419 tx timeout [ 261.269104][ T5085] Bluetooth: hci7: command 0x0419 tx timeout [ 261.388965][ T5081] Bluetooth: hci8: command 0x0419 tx timeout [ 262.498611][ T6483] netlink: 'syz-executor.1': attribute type 27 has an invalid length. [ 262.506922][ T6483] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 262.537004][ T6483] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 262.544359][ T6483] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 262.553008][ T6483] 8021q: adding VLAN 0 to HW filter on device bond0 [ 262.561653][ T6483] 8021q: adding VLAN 0 to HW filter on device team0 [ 262.594150][ T6483] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 262.612347][ T6484] netlink: 'syz-executor.1': attribute type 27 has an invalid length. [ 262.946724][ T6489] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 262.955085][ T6489] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 262.988776][ T6489] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 262.996627][ T6489] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 263.005006][ T6489] 8021q: adding VLAN 0 to HW filter on device bond0 [ 263.013676][ T6489] 8021q: adding VLAN 0 to HW filter on device team0 [ 263.024236][ T6489] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 263.041105][ T6490] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 263.578551][ T6448] chnl_net:caif_netlink_parms(): no params data found [ 263.632054][ T6445] chnl_net:caif_netlink_parms(): no params data found [ 263.721073][ T6444] chnl_net:caif_netlink_parms(): no params data found [ 263.758077][ T6448] bridge0: port 1(bridge_slave_0) entered blocking state [ 263.765296][ T6448] bridge0: port 1(bridge_slave_0) entered disabled state [ 263.773788][ T6448] device bridge_slave_0 entered promiscuous mode [ 263.782005][ T6445] bridge0: port 1(bridge_slave_0) entered blocking state [ 263.789329][ T6445] bridge0: port 1(bridge_slave_0) entered disabled state [ 263.797224][ T6445] device bridge_slave_0 entered promiscuous mode [ 263.823231][ T6448] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.831898][ T6448] bridge0: port 2(bridge_slave_1) entered disabled state [ 263.840293][ T6448] device bridge_slave_1 entered promiscuous mode [ 263.847630][ T6445] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.854846][ T6445] bridge0: port 2(bridge_slave_1) entered disabled state [ 263.862720][ T6445] device bridge_slave_1 entered promiscuous mode [ 263.936696][ T6448] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 263.948509][ T6445] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 263.981197][ T6448] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 263.991730][ T6445] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 264.010573][ T6444] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.017903][ T6444] bridge0: port 1(bridge_slave_0) entered disabled state [ 264.026023][ T6444] device bridge_slave_0 entered promiscuous mode [ 264.055594][ T6444] bridge0: port 2(bridge_slave_1) entered blocking state [ 264.062910][ T6444] bridge0: port 2(bridge_slave_1) entered disabled state [ 264.075548][ T6444] device bridge_slave_1 entered promiscuous mode [ 264.087885][ T6445] team0: Port device team_slave_0 added [ 264.097778][ T6445] team0: Port device team_slave_1 added [ 264.142548][ T6448] team0: Port device team_slave_0 added [ 264.161746][ T6445] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 264.168744][ T6445] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 264.195757][ T6445] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 264.208319][ T6448] team0: Port device team_slave_1 added [ 264.216823][ T6444] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 264.227315][ T6445] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 264.234957][ T6445] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 264.261601][ T6445] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 264.282322][ T6444] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 264.329320][ T6444] team0: Port device team_slave_0 added [ 264.335684][ T6448] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 264.343102][ T6448] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 264.369761][ T6448] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 264.395777][ T6444] team0: Port device team_slave_1 added [ 264.411478][ T6448] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 264.418454][ T6448] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 264.445919][ T6448] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 264.484480][ T6445] device hsr_slave_0 entered promiscuous mode [ 264.494584][ T6445] device hsr_slave_1 entered promiscuous mode [ 264.501462][ T6445] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 264.509338][ T6445] Cannot create hsr debugfs directory [ 264.515416][ T6444] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 264.522583][ T6444] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 264.550056][ T6444] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 264.563599][ T6444] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 264.570713][ T6444] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 264.596877][ T6444] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 264.676032][ T6448] device hsr_slave_0 entered promiscuous mode [ 264.683336][ T6448] device hsr_slave_1 entered promiscuous mode [ 264.690185][ T6448] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 264.697756][ T6448] Cannot create hsr debugfs directory [ 264.712614][ T6444] device hsr_slave_0 entered promiscuous mode [ 264.720304][ T6444] device hsr_slave_1 entered promiscuous mode [ 264.726919][ T6444] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 264.735025][ T6444] Cannot create hsr debugfs directory [ 265.015343][ T6444] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 265.098068][ T6444] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 265.191803][ T6444] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 265.288408][ T6444] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 265.464739][ T6448] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 265.562357][ T6448] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 265.649436][ T6448] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 265.752036][ T6448] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 265.900271][ T6448] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 265.910968][ T6448] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 265.920709][ T6448] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 265.930731][ T6448] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 265.967088][ T6445] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 266.056172][ T6445] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 266.099194][ T6448] 8021q: adding VLAN 0 to HW filter on device bond0 [ 266.114781][ T897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 266.127492][ T897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 266.157816][ T6445] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 266.176734][ T6448] 8021q: adding VLAN 0 to HW filter on device team0 [ 266.189582][ T897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 266.199405][ T897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 266.207987][ T897] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.215144][ T897] bridge0: port 1(bridge_slave_0) entered forwarding state [ 266.265821][ T6445] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 266.292584][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 266.309786][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 266.318666][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 266.344589][ T5145] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.351772][ T5145] bridge0: port 2(bridge_slave_1) entered forwarding state [ 266.360184][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 266.371381][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 266.381871][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 266.391963][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 266.412334][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 266.422123][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 266.431627][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 266.441189][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 266.450664][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 266.463221][ T6448] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 266.480011][ T6448] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 266.495526][ T897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 266.505069][ T897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 266.652678][ T6444] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 266.677186][ T6444] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 266.699125][ T6444] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 266.741278][ T6444] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 266.774061][ T897] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 266.784562][ T897] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 266.811688][ T6448] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 266.848055][ T6445] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 266.858468][ T6445] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 266.883575][ T6445] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 266.896246][ T6445] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 266.913867][ T900] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 266.923163][ T900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 266.950129][ T5340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 266.959435][ T5340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 266.968244][ T5340] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 266.976635][ T5340] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 266.995257][ T6448] device veth0_vlan entered promiscuous mode [ 267.023959][ T6448] device veth1_vlan entered promiscuous mode [ 267.067438][ T6444] 8021q: adding VLAN 0 to HW filter on device bond0 [ 267.095721][ T6448] device veth0_macvtap entered promiscuous mode [ 267.109442][ T5139] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 267.118486][ T5139] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 267.127631][ T5139] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 267.136646][ T5139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 267.145731][ T5139] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 267.153778][ T5139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 267.162536][ T5139] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 267.172868][ T6448] device veth1_macvtap entered promiscuous mode [ 267.194907][ T6444] 8021q: adding VLAN 0 to HW filter on device team0 [ 267.211402][ T6448] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 267.222419][ T6448] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 267.232775][ T6448] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 267.243645][ T6448] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 267.254312][ T6448] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 267.265050][ T6448] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 267.276728][ T6448] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 267.291665][ T897] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 267.300537][ T897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 267.309384][ T897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 267.317771][ T897] bridge0: port 1(bridge_slave_0) entered blocking state [ 267.324905][ T897] bridge0: port 1(bridge_slave_0) entered forwarding state [ 267.333431][ T897] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 267.342458][ T897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 267.354926][ T6448] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 267.372130][ T6448] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 267.382327][ T6448] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 267.394874][ T6448] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 267.405714][ T6448] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 267.416660][ T6448] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 267.427701][ T6448] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 267.447814][ T5139] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 267.456123][ T5139] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 267.466169][ T5139] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 267.474997][ T5139] bridge0: port 2(bridge_slave_1) entered blocking state [ 267.482337][ T5139] bridge0: port 2(bridge_slave_1) entered forwarding state [ 267.491227][ T5139] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 267.500795][ T5139] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 267.509990][ T5139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 267.520539][ T5139] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 267.534903][ T6448] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 267.544392][ T6448] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 267.553415][ T6448] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 267.562592][ T6448] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 267.593109][ T5135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 267.603459][ T5135] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 267.612494][ T5135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 267.622284][ T5135] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 267.631372][ T5135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 267.640010][ T5135] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 267.648252][ T5135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 267.657083][ T5135] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 267.668566][ T6445] 8021q: adding VLAN 0 to HW filter on device bond0 [ 267.679830][ T6444] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 267.698008][ T5135] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 267.738744][ T5139] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 267.760001][ T5139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 267.784965][ T6445] 8021q: adding VLAN 0 to HW filter on device team0 [ 267.819720][ T5139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 267.830364][ T5139] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 267.839981][ T5139] bridge0: port 1(bridge_slave_0) entered blocking state [ 267.847124][ T5139] bridge0: port 1(bridge_slave_0) entered forwarding state [ 267.864490][ T8] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 267.883240][ T897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 267.889138][ T8] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 267.892786][ T897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 267.909799][ T897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 267.918384][ T897] bridge0: port 2(bridge_slave_1) entered blocking state [ 267.925585][ T897] bridge0: port 2(bridge_slave_1) entered forwarding state [ 267.934281][ T897] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 267.942827][ T897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 267.978535][ T897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 267.988260][ T897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 267.998442][ T897] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 268.008486][ T897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 268.018648][ T897] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 268.053051][ T897] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 268.061803][ T897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 268.070928][ T897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 268.085025][ T6445] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 268.104467][ T6445] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 268.128694][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 268.139876][ T5191] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 268.148025][ T5191] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 268.157107][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 268.190249][ T900] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 268.198326][ T900] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 268.206171][ T900] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 268.236121][ T6444] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 268.243221][ T26] audit: type=1400 audit(1676146978.820:173): avc: denied { mounton } for pid=6448 comm="syz-executor.2" path="/dev/binderfs" dev="devtmpfs" ino=2321 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 268.324608][ T6064] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 268.349754][ T6064] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 268.376173][ T6444] device veth0_vlan entered promiscuous mode [ 268.387202][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 268.412267][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 268.436424][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 268.445326][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 268.507354][ T6524] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 268.515790][ T6524] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 268.555959][ T6524] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 268.564296][ T6524] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 268.599019][ T6524] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 268.784882][ T6444] device veth1_vlan entered promiscuous mode [ 269.347721][ T6525] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 269.713834][ T6525] bridge0: port 2(bridge_slave_1) entered disabled state [ 269.721312][ T6525] bridge0: port 1(bridge_slave_0) entered disabled state [ 270.154765][ T6525] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 270.199441][ T6525] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 270.583136][ T6525] netdevsim netdevsim2 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 270.592536][ T6525] netdevsim netdevsim2 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 270.601644][ T6525] netdevsim netdevsim2 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 270.610581][ T6525] netdevsim netdevsim2 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 270.746759][ T5139] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 270.755671][ T5139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 270.772991][ T6444] device veth0_macvtap entered promiscuous mode [ 270.791172][ T6444] device veth1_macvtap entered promiscuous mode [ 270.819571][ T5135] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 270.827679][ T5135] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 270.835735][ T5135] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 270.854460][ T6444] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 270.865656][ T6444] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 270.876348][ T6444] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 270.887781][ T6444] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 270.897917][ T6444] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 270.908588][ T6444] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 270.920509][ T6444] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 270.930092][ T6445] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 270.952051][ T5139] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 270.961180][ T5139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 270.972567][ T6444] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 270.998960][ T6444] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 271.011166][ T6444] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 271.021825][ T6444] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 271.032284][ T6444] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 271.042847][ T6444] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 271.061570][ T6444] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 271.081510][ T6064] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 271.091124][ T6064] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 271.103165][ T6444] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 271.113869][ T6444] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 271.123503][ T6444] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 271.132728][ T6444] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 271.239624][ T74] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 271.247784][ T74] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 271.282476][ T5140] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 271.328027][ T5191] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 271.343003][ T5191] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 271.365433][ T6064] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 271.538346][ T6536] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 271.547030][ T6536] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 271.582823][ T6536] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 271.590871][ T6536] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 271.627275][ T6536] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 271.643491][ T6537] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 272.742244][ T6537] bridge0: port 2(bridge_slave_1) entered disabled state [ 272.749750][ T6537] bridge0: port 1(bridge_slave_0) entered disabled state [ 273.176560][ T6537] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 273.221275][ T6537] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 273.613072][ T6537] netdevsim netdevsim3 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 273.622368][ T6537] netdevsim netdevsim3 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 273.631347][ T6537] netdevsim netdevsim3 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 273.641224][ T6537] netdevsim netdevsim3 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 20:23:04 executing program 3: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) [ 273.792016][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 273.801490][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 273.834656][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 273.845403][ T5145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 273.858319][ T6445] device veth0_vlan entered promiscuous mode [ 273.866655][ T5143] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 273.875951][ T5143] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 273.888588][ T6445] device veth1_vlan entered promiscuous mode [ 273.914684][ T5135] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 274.037097][ T5135] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 274.100265][ T5135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 274.820053][ T5135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 274.829958][ T6541] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 274.838168][ T6541] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 274.873128][ T6541] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 274.880657][ T6541] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 274.888919][ T6541] 8021q: adding VLAN 0 to HW filter on device bond0 [ 274.897256][ T6541] 8021q: adding VLAN 0 to HW filter on device team0 [ 274.907459][ T6541] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 274.923522][ T6542] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 275.276920][ T6445] device veth0_macvtap entered promiscuous mode [ 275.301954][ T6445] device veth1_macvtap entered promiscuous mode [ 275.321722][ T6445] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 275.334440][ T6445] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 275.344620][ T6445] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 275.355251][ T6445] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 275.365903][ T6445] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 275.376665][ T6445] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 275.388389][ T6445] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 275.399381][ T6445] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 275.410386][ T6445] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 275.421057][ T6445] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 275.432701][ T6445] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 275.442893][ T6445] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 275.453648][ T6445] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 275.465283][ T6445] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 275.472910][ T5143] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 275.483631][ T5143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 275.492853][ T5143] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 275.505165][ T5143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 275.516834][ T6445] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 275.526058][ T6445] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 275.534989][ T6445] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 275.543898][ T6445] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 275.613792][ T5191] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 275.634080][ T5191] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 275.648340][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 275.653206][ T5135] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 275.662123][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 275.673940][ T6064] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 275.854724][ T6547] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 275.863274][ T6547] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 275.904957][ T6547] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 275.913148][ T6547] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 275.947405][ T6547] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 276.731310][ T6548] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 277.085343][ T6548] bridge0: port 2(bridge_slave_1) entered disabled state [ 277.092905][ T6548] bridge0: port 1(bridge_slave_0) entered disabled state [ 277.515598][ T6548] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 277.568394][ T6548] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 277.953460][ T6548] netdevsim netdevsim5 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 277.962644][ T6548] netdevsim netdevsim5 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 277.971631][ T6548] netdevsim netdevsim5 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 277.980588][ T6548] netdevsim netdevsim5 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 20:23:08 executing program 5: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) 20:23:08 executing program 4: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) 20:23:08 executing program 1: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) 20:23:08 executing program 0: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) 20:23:08 executing program 2: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) 20:23:08 executing program 3: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) [ 280.521144][ T6566] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 280.529510][ T6566] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 281.000635][ T6566] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 281.009420][ T6566] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 281.028893][ T6566] 8021q: adding VLAN 0 to HW filter on device bond0 [ 281.053009][ T6566] 8021q: adding VLAN 0 to HW filter on device team0 20:23:14 executing program 5: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) [ 283.942370][ T6566] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 283.959466][ T6574] netlink: 'syz-executor.4': attribute type 27 has an invalid length. 20:23:15 executing program 4: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) [ 285.179520][ T6565] netlink: 'syz-executor.1': attribute type 27 has an invalid length. [ 285.187774][ T6565] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 285.220252][ T6565] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 285.227581][ T6565] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 285.236003][ T6565] 8021q: adding VLAN 0 to HW filter on device bond0 [ 285.244344][ T6565] 8021q: adding VLAN 0 to HW filter on device team0 [ 285.255192][ T6565] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 285.271264][ T6569] netlink: 'syz-executor.1': attribute type 27 has an invalid length. 20:23:17 executing program 1: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) [ 286.484832][ T6567] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 286.493164][ T6567] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 286.526442][ T6567] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 286.533929][ T6567] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 286.543340][ T6567] 8021q: adding VLAN 0 to HW filter on device bond0 [ 286.551948][ T6567] 8021q: adding VLAN 0 to HW filter on device team0 [ 286.564262][ T6567] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 286.580664][ T6568] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 286.588959][ T6568] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 286.623277][ T6568] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 286.630734][ T6568] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 286.639084][ T6568] 8021q: adding VLAN 0 to HW filter on device bond0 [ 286.648109][ T6568] 8021q: adding VLAN 0 to HW filter on device team0 [ 286.657911][ T6568] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 286.674120][ T6570] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 286.682767][ T6570] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 286.714360][ T6570] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 286.721737][ T6570] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 286.730405][ T6570] 8021q: adding VLAN 0 to HW filter on device bond0 [ 286.739067][ T6570] 8021q: adding VLAN 0 to HW filter on device team0 [ 286.767263][ T6570] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 286.784551][ T6571] netlink: 'syz-executor.0': attribute type 27 has an invalid length. 20:23:18 executing program 0: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) [ 287.907160][ T6572] netlink: 'syz-executor.2': attribute type 27 has an invalid length. 20:23:19 executing program 2: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) [ 289.135752][ T6573] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 290.386643][ T6583] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 290.395102][ T6583] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 290.426407][ T6583] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 290.433815][ T6583] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 290.442340][ T6583] 8021q: adding VLAN 0 to HW filter on device bond0 [ 290.450646][ T6583] 8021q: adding VLAN 0 to HW filter on device team0 [ 290.463874][ T6583] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 20:23:21 executing program 3: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) [ 290.480562][ T6584] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 291.708905][ T6589] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 291.717123][ T6589] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 291.746189][ T6589] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 291.753617][ T6589] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 291.762261][ T6589] 8021q: adding VLAN 0 to HW filter on device bond0 [ 291.771530][ T6589] 8021q: adding VLAN 0 to HW filter on device team0 [ 291.787148][ T6589] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 20:23:22 executing program 5: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) [ 291.803392][ T6590] netlink: 'syz-executor.4': attribute type 27 has an invalid length. 20:23:23 executing program 4: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) [ 293.036639][ T6595] netlink: 'syz-executor.1': attribute type 27 has an invalid length. [ 293.045057][ T6595] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 293.075251][ T6595] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 293.082685][ T6595] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 293.091374][ T6595] 8021q: adding VLAN 0 to HW filter on device bond0 [ 293.100422][ T6595] 8021q: adding VLAN 0 to HW filter on device team0 [ 293.111028][ T6595] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 293.126999][ T6596] netlink: 'syz-executor.1': attribute type 27 has an invalid length. 20:23:24 executing program 1: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) [ 294.351924][ T6601] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 294.360517][ T6601] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 294.395122][ T6601] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 294.402525][ T6601] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 294.411165][ T6601] 8021q: adding VLAN 0 to HW filter on device bond0 [ 294.418880][ T6601] 8021q: adding VLAN 0 to HW filter on device team0 [ 294.431337][ T6601] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 294.447490][ T6602] netlink: 'syz-executor.0': attribute type 27 has an invalid length. 20:23:26 executing program 0: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) [ 295.646317][ T6607] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 295.654613][ T6607] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 295.690201][ T6607] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 295.697594][ T6607] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 295.705960][ T6607] 8021q: adding VLAN 0 to HW filter on device bond0 [ 295.714250][ T6607] 8021q: adding VLAN 0 to HW filter on device team0 [ 295.725030][ T6607] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 295.741048][ T6608] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 296.954102][ T6613] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 296.962431][ T6613] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 20:23:27 executing program 2: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) [ 297.000517][ T6613] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 297.007914][ T6613] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 297.016541][ T6613] 8021q: adding VLAN 0 to HW filter on device bond0 [ 297.024880][ T6613] 8021q: adding VLAN 0 to HW filter on device team0 [ 297.037252][ T6613] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 297.053478][ T6614] netlink: 'syz-executor.3': attribute type 27 has an invalid length. 20:23:28 executing program 3: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) [ 298.276618][ T6619] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 298.284963][ T6619] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 298.315341][ T6619] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 298.323604][ T6619] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 298.332255][ T6619] 8021q: adding VLAN 0 to HW filter on device bond0 [ 298.341755][ T6619] 8021q: adding VLAN 0 to HW filter on device team0 [ 298.352326][ T6619] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 298.368282][ T6620] netlink: 'syz-executor.5': attribute type 27 has an invalid length. 20:23:30 executing program 5: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) [ 299.596215][ T6625] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 299.604622][ T6625] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 299.635071][ T6625] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 299.642470][ T6625] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 299.651057][ T6625] 8021q: adding VLAN 0 to HW filter on device bond0 [ 299.658692][ T6625] 8021q: adding VLAN 0 to HW filter on device team0 [ 299.669897][ T6625] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 299.686132][ T6626] netlink: 'syz-executor.4': attribute type 27 has an invalid length. 20:23:31 executing program 4: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) [ 300.915283][ T6631] netlink: 'syz-executor.1': attribute type 27 has an invalid length. [ 300.923687][ T6631] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 300.958704][ T6631] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 300.966068][ T6631] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 300.974719][ T6631] 8021q: adding VLAN 0 to HW filter on device bond0 [ 300.983957][ T6631] 8021q: adding VLAN 0 to HW filter on device team0 [ 300.995316][ T6631] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 301.011305][ T6632] netlink: 'syz-executor.1': attribute type 27 has an invalid length. 20:23:32 executing program 1: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) [ 302.232582][ T6637] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 302.241132][ T6637] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 302.274218][ T6637] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 302.281821][ T6637] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 302.290472][ T6637] 8021q: adding VLAN 0 to HW filter on device bond0 [ 302.298119][ T6637] 8021q: adding VLAN 0 to HW filter on device team0 [ 302.307940][ T6637] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 302.324556][ T6638] netlink: 'syz-executor.0': attribute type 27 has an invalid length. 20:23:34 executing program 0: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) [ 303.545558][ T6643] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 303.553913][ T6643] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 303.586264][ T6643] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 303.593705][ T6643] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 303.602369][ T6643] 8021q: adding VLAN 0 to HW filter on device bond0 [ 303.610990][ T6643] 8021q: adding VLAN 0 to HW filter on device team0 [ 303.621397][ T6643] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 303.637358][ T6644] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 304.839100][ T6649] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 304.847342][ T6649] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 304.878188][ T6649] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:23:35 executing program 2: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) [ 304.885591][ T6649] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 304.893999][ T6649] 8021q: adding VLAN 0 to HW filter on device bond0 [ 304.902315][ T6649] 8021q: adding VLAN 0 to HW filter on device team0 [ 304.924060][ T6649] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 304.940437][ T6650] netlink: 'syz-executor.3': attribute type 27 has an invalid length. 20:23:36 executing program 3: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) [ 306.174403][ T6655] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 306.182954][ T6655] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 306.215606][ T6655] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 306.223093][ T6655] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 306.231947][ T6655] 8021q: adding VLAN 0 to HW filter on device bond0 [ 306.240231][ T6655] 8021q: adding VLAN 0 to HW filter on device team0 [ 306.259473][ T6655] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 306.276195][ T6656] netlink: 'syz-executor.5': attribute type 27 has an invalid length. 20:23:38 executing program 5: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) [ 307.494586][ T6661] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 307.502919][ T6661] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 307.536189][ T6661] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 307.543761][ T6661] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 307.552436][ T6661] 8021q: adding VLAN 0 to HW filter on device bond0 [ 307.560992][ T6661] 8021q: adding VLAN 0 to HW filter on device team0 [ 307.571509][ T6661] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 307.587857][ T6662] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 308.807429][ T6667] netlink: 'syz-executor.1': attribute type 27 has an invalid length. [ 308.815823][ T6667] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 308.846351][ T6667] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:23:39 executing program 4: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) [ 308.853717][ T6667] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 308.862486][ T6667] 8021q: adding VLAN 0 to HW filter on device bond0 [ 308.870826][ T6667] 8021q: adding VLAN 0 to HW filter on device team0 [ 308.886488][ T6667] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 308.902447][ T6668] netlink: 'syz-executor.1': attribute type 27 has an invalid length. [ 310.126366][ T6673] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 310.134813][ T6673] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 310.165730][ T6673] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:23:40 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) stat(0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") getresgid(0x0, 0x0, 0x0) socket$tipc(0x1e, 0x0, 0x0) stat(0x0, &(0x7f0000000e40)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x5, 0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0xffffffff, 0xfffffffe}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0xef84) [ 310.173083][ T6673] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 310.181651][ T6673] 8021q: adding VLAN 0 to HW filter on device bond0 [ 310.189567][ T6673] 8021q: adding VLAN 0 to HW filter on device team0 [ 310.203139][ T6673] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 310.219383][ T6674] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 310.332177][ T6702] loop1: detected capacity change from 0 to 2048 [ 310.361410][ T26] audit: type=1800 audit(1676147020.960:174): pid=6702 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=1048637 res=0 errno=0 [ 310.388192][ T26] audit: type=1804 audit(1676147020.980:175): pid=6702 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir754339577/syzkaller.9EnLvI/65/file0/file0" dev="loop1" ino=1048637 res=1 errno=0 20:23:41 executing program 0: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) [ 310.695710][ T6679] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 310.704086][ T6679] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 310.736239][ T6679] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 310.743677][ T6679] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 310.752391][ T6679] 8021q: adding VLAN 0 to HW filter on device bond0 [ 310.767070][ T6679] 8021q: adding VLAN 0 to HW filter on device team0 [ 310.777139][ T6679] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 310.793174][ T6680] netlink: 'syz-executor.2': attribute type 27 has an invalid length. 20:23:41 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) stat(0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") getresgid(0x0, 0x0, 0x0) socket$tipc(0x1e, 0x0, 0x0) stat(0x0, &(0x7f0000000e40)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x5, 0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0xffffffff, 0xfffffffe}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r3, r4, 0x0, 0xef84) [ 311.960945][ T6711] loop1: detected capacity change from 0 to 2048 [ 312.013386][ T26] audit: type=1800 audit(1676147022.610:176): pid=6711 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=1048638 res=0 errno=0 [ 312.040979][ T26] audit: type=1804 audit(1676147022.640:177): pid=6711 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir754339577/syzkaller.9EnLvI/66/file0/file0" dev="loop1" ino=1048638 res=1 errno=0 [ 312.137325][ T6685] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 312.146314][ T6685] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 20:23:42 executing program 2: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) [ 312.179290][ T6685] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 312.187033][ T6685] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 312.196017][ T6685] 8021q: adding VLAN 0 to HW filter on device bond0 [ 312.204635][ T6685] 8021q: adding VLAN 0 to HW filter on device team0 [ 312.215869][ T6685] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 312.231913][ T6686] netlink: 'syz-executor.3': attribute type 27 has an invalid length. 20:23:43 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) stat(0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") getresgid(0x0, 0x0, 0x0) socket$tipc(0x1e, 0x0, 0x0) stat(0x0, &(0x7f0000000e40)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x5, 0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0xffffffff, 0xfffffffe}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0xef84) [ 313.421379][ T6720] loop1: detected capacity change from 0 to 2048 [ 313.454907][ T26] audit: type=1800 audit(1676147024.050:178): pid=6720 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=1048639 res=0 errno=0 [ 313.507631][ T26] audit: type=1804 audit(1676147024.050:179): pid=6720 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir754339577/syzkaller.9EnLvI/67/file0/file0" dev="loop1" ino=1048639 res=1 errno=0 [ 313.599582][ T6691] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 313.607815][ T6691] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 20:23:44 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) stat(0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") getresgid(0x0, 0x0, 0x0) socket$tipc(0x1e, 0x0, 0x0) stat(0x0, &(0x7f0000000e40)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x5, 0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0xffffffff, 0xfffffffe}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0xef84) [ 313.641407][ T6691] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 313.648796][ T6691] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 313.658218][ T6691] 8021q: adding VLAN 0 to HW filter on device bond0 [ 313.666631][ T6691] 8021q: adding VLAN 0 to HW filter on device team0 [ 313.678417][ T6691] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 313.694415][ T6692] netlink: 'syz-executor.5': attribute type 27 has an invalid length. [ 313.878615][ T26] audit: type=1800 audit(1676147024.470:180): pid=6723 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=1175 res=0 errno=0 [ 313.928932][ T26] audit: type=1804 audit(1676147024.500:181): pid=6723 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir592040614/syzkaller.1vPKuO/6/file0" dev="sda1" ino=1175 res=1 errno=0 [ 314.208169][ T6697] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 314.216463][ T6697] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 20:23:44 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) stat(0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") getresgid(0x0, 0x0, 0x0) socket$tipc(0x1e, 0x0, 0x0) stat(0x0, &(0x7f0000000e40)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x5, 0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0xffffffff, 0xfffffffe}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0xef84) 20:23:44 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) stat(0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") getresgid(0x0, 0x0, 0x0) socket$tipc(0x1e, 0x0, 0x0) stat(0x0, &(0x7f0000000e40)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x5, 0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0xffffffff, 0xfffffffe}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r3, r4, 0x0, 0xef84) [ 314.248591][ T6697] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 314.255960][ T6697] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 314.264602][ T6697] 8021q: adding VLAN 0 to HW filter on device bond0 [ 314.272923][ T6697] 8021q: adding VLAN 0 to HW filter on device team0 [ 314.292104][ T6697] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 314.308616][ T6698] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 314.452990][ T6729] loop1: detected capacity change from 0 to 2048 [ 314.505199][ T26] audit: type=1800 audit(1676147025.100:182): pid=6729 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=1048640 res=0 errno=0 20:23:45 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) stat(0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") getresgid(0x0, 0x0, 0x0) socket$tipc(0x1e, 0x0, 0x0) stat(0x0, &(0x7f0000000e40)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x5, 0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0xffffffff, 0xfffffffe}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r3, r4, 0x0, 0xef84) [ 314.610160][ T26] audit: type=1804 audit(1676147025.160:183): pid=6731 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir754339577/syzkaller.9EnLvI/68/file0/file0" dev="loop1" ino=1048640 res=1 errno=0 20:23:45 executing program 4: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) [ 315.104873][ T6706] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 315.113168][ T6706] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 315.147549][ T6706] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 315.154935][ T6706] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 315.163580][ T6706] 8021q: adding VLAN 0 to HW filter on device bond0 [ 315.171883][ T6706] 8021q: adding VLAN 0 to HW filter on device team0 20:23:45 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) stat(0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") getresgid(0x0, 0x0, 0x0) socket$tipc(0x1e, 0x0, 0x0) stat(0x0, &(0x7f0000000e40)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x5, 0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0xffffffff, 0xfffffffe}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0xef84) [ 315.184309][ T6706] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 315.200623][ T6707] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 316.249399][ T6743] loop1: detected capacity change from 0 to 2048 20:23:46 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) stat(0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") getresgid(0x0, 0x0, 0x0) socket$tipc(0x1e, 0x0, 0x0) stat(0x0, &(0x7f0000000e40)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x5, 0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0xffffffff, 0xfffffffe}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r3, r4, 0x0, 0xef84) [ 316.290075][ T26] kauditd_printk_skb: 4 callbacks suppressed [ 316.290094][ T26] audit: type=1800 audit(1676147026.890:188): pid=6743 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=1048641 res=0 errno=0 [ 316.366736][ T26] audit: type=1804 audit(1676147026.920:189): pid=6743 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir754339577/syzkaller.9EnLvI/69/file0/file0" dev="loop1" ino=1048641 res=1 errno=0 20:23:47 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) stat(0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") getresgid(0x0, 0x0, 0x0) socket$tipc(0x1e, 0x0, 0x0) stat(0x0, &(0x7f0000000e40)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x5, 0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0xffffffff, 0xfffffffe}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0xef84) [ 316.662345][ T26] audit: type=1800 audit(1676147027.260:190): pid=6745 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=1175 res=0 errno=0 [ 316.685248][ T26] audit: type=1804 audit(1676147027.270:191): pid=6745 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir300834875/syzkaller.z4jmXP/7/file0" dev="sda1" ino=1175 res=1 errno=0 [ 316.796727][ T26] audit: type=1800 audit(1676147027.390:192): pid=6750 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=1156 res=0 errno=0 [ 316.827094][ T26] audit: type=1804 audit(1676147027.400:193): pid=6750 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir592040614/syzkaller.1vPKuO/8/file0" dev="sda1" ino=1156 res=1 errno=0 20:23:47 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) stat(0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") getresgid(0x0, 0x0, 0x0) socket$tipc(0x1e, 0x0, 0x0) stat(0x0, &(0x7f0000000e40)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x5, 0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0xffffffff, 0xfffffffe}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r3, r4, 0x0, 0xef84) [ 316.913734][ T6715] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 316.922082][ T6715] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 20:23:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) stat(0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") getresgid(0x0, 0x0, 0x0) socket$tipc(0x1e, 0x0, 0x0) stat(0x0, &(0x7f0000000e40)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x5, 0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0xffffffff, 0xfffffffe}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r3, r4, 0x0, 0xef84) [ 316.955850][ T6715] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 316.963265][ T6715] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 316.971898][ T6715] 8021q: adding VLAN 0 to HW filter on device bond0 [ 316.980119][ T6715] 8021q: adding VLAN 0 to HW filter on device team0 [ 317.011667][ T6715] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 317.027849][ T6716] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 317.033746][ T1209] ieee802154 phy0 wpan0: encryption failed: -22 [ 317.043266][ T1209] ieee802154 phy1 wpan1: encryption failed: -22 [ 317.097771][ T6754] loop1: detected capacity change from 0 to 2048 [ 317.130311][ T26] audit: type=1800 audit(1676147027.730:194): pid=6754 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=1048642 res=0 errno=0 [ 317.183893][ T6756] loop0: detected capacity change from 0 to 2048 [ 317.191312][ T26] audit: type=1804 audit(1676147027.780:195): pid=6754 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir754339577/syzkaller.9EnLvI/70/file0/file0" dev="loop1" ino=1048642 res=1 errno=0 [ 317.285874][ T26] audit: type=1800 audit(1676147027.860:196): pid=6756 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=1048643 res=0 errno=0 [ 317.406319][ T26] audit: type=1804 audit(1676147027.870:197): pid=6756 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir3326156338/syzkaller.JQdaLw/64/file0/file0" dev="loop0" ino=1048643 res=1 errno=0 [ 317.841776][ T6738] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 317.850058][ T6738] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 20:23:48 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) stat(0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") getresgid(0x0, 0x0, 0x0) socket$tipc(0x1e, 0x0, 0x0) stat(0x0, &(0x7f0000000e40)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x5, 0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0xffffffff, 0xfffffffe}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0xef84) 20:23:48 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) stat(0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") getresgid(0x0, 0x0, 0x0) socket$tipc(0x1e, 0x0, 0x0) stat(0x0, &(0x7f0000000e40)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x5, 0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0xffffffff, 0xfffffffe}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0xef84) 20:23:48 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) stat(0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") getresgid(0x0, 0x0, 0x0) socket$tipc(0x1e, 0x0, 0x0) stat(0x0, &(0x7f0000000e40)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x5, 0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0xffffffff, 0xfffffffe}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0xef84) 20:23:48 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) stat(0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") getresgid(0x0, 0x0, 0x0) socket$tipc(0x1e, 0x0, 0x0) stat(0x0, &(0x7f0000000e40)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x5, 0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0xffffffff, 0xfffffffe}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0xef84) [ 317.884133][ T6738] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 317.891583][ T6738] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 317.900177][ T6738] 8021q: adding VLAN 0 to HW filter on device bond0 [ 317.909857][ T6738] 8021q: adding VLAN 0 to HW filter on device team0 20:23:48 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) stat(0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") getresgid(0x0, 0x0, 0x0) socket$tipc(0x1e, 0x0, 0x0) stat(0x0, &(0x7f0000000e40)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x5, 0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0xffffffff, 0xfffffffe}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r3, r4, 0x0, 0xef84) [ 317.926371][ T6738] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 317.943531][ T6739] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 318.091303][ T6765] loop1: detected capacity change from 0 to 2048 [ 318.167920][ T6770] loop0: detected capacity change from 0 to 2048 20:23:49 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) stat(0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") getresgid(0x0, 0x0, 0x0) socket$tipc(0x1e, 0x0, 0x0) stat(0x0, &(0x7f0000000e40)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x5, 0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0xffffffff, 0xfffffffe}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0xef84) 20:23:49 executing program 4: r0 = dup(0xffffffffffffffff) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x0, 0xfffffffffffffffc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) ftruncate(r0, 0xfffffffffffffffb) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000340)='./file0\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100001000000000000000000080000000000000029000000", @ANYRES32=0x0, @ANYBLOB="14001b00000000000000002100000000000000040000000000000000000000f37b3fb727008cb27cbdf183afb4001859b07edec01c4c36ca63c2dbb2c66ee60d732cc73669d3b130c4d7227ff40bdffae201891f9a686fbfff3c03b011f3fe578efe776e9625a1b9402846accd78a94f026b241174496ae582b3c5f4adc38c8d84959bd183c74b2a6cf8bfbc920869cc3a34"], 0x40}], 0x1}, 0x0) sendmsg$netlink(r6, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000600)={0x38, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback={0x21}}, @typed={0x4}]}, 0x38}], 0x1}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001040)=""/16) 20:23:49 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) stat(0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") getresgid(0x0, 0x0, 0x0) socket$tipc(0x1e, 0x0, 0x0) stat(0x0, &(0x7f0000000e40)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x5, 0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0xffffffff, 0xfffffffe}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r3, r4, 0x0, 0xef84) 20:23:49 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) stat(0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") getresgid(0x0, 0x0, 0x0) socket$tipc(0x1e, 0x0, 0x0) stat(0x0, &(0x7f0000000e40)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x5, 0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0xffffffff, 0xfffffffe}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0xef84) 20:23:49 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) stat(0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") getresgid(0x0, 0x0, 0x0) socket$tipc(0x1e, 0x0, 0x0) stat(0x0, &(0x7f0000000e40)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x5, 0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0xffffffff, 0xfffffffe}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0xef84) [ 319.075836][ T6774] loop1: detected capacity change from 0 to 2048 20:23:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) stat(0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") getresgid(0x0, 0x0, 0x0) socket$tipc(0x1e, 0x0, 0x0) stat(0x0, &(0x7f0000000e40)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x5, 0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0xffffffff, 0xfffffffe}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0xef84) [ 319.247837][ T6786] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 319.256198][ T6786] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 319.357458][ T6786] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 319.365454][ T6786] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 319.377097][ T6786] 8021q: adding VLAN 0 to HW filter on device bond0 [ 319.385356][ T6786] 8021q: adding VLAN 0 to HW filter on device team0 [ 319.535292][ T6786] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 319.632308][ T6788] netlink: 'syz-executor.4': attribute type 27 has an invalid length. 20:23:50 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) stat(0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") getresgid(0x0, 0x0, 0x0) socket$tipc(0x1e, 0x0, 0x0) stat(0x0, &(0x7f0000000e40)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x5, 0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0xffffffff, 0xfffffffe}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0xef84) [ 320.356894][ T6792] loop0: detected capacity change from 0 to 2048 20:23:51 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) stat(0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") getresgid(0x0, 0x0, 0x0) socket$tipc(0x1e, 0x0, 0x0) stat(0x0, &(0x7f0000000e40)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x5, 0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0xffffffff, 0xfffffffe}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r3, r4, 0x0, 0xef84) 20:23:51 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) stat(0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") getresgid(0x0, 0x0, 0x0) socket$tipc(0x1e, 0x0, 0x0) stat(0x0, &(0x7f0000000e40)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x5, 0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0xffffffff, 0xfffffffe}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r3, r4, 0x0, 0xef84) [ 320.592819][ T6797] loop1: detected capacity change from 0 to 2048 20:23:51 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) stat(0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") getresgid(0x0, 0x0, 0x0) socket$tipc(0x1e, 0x0, 0x0) stat(0x0, &(0x7f0000000e40)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x5, 0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0xffffffff, 0xfffffffe}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0xef84) 20:23:51 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) stat(0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") getresgid(0x0, 0x0, 0x0) socket$tipc(0x1e, 0x0, 0x0) stat(0x0, &(0x7f0000000e40)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x5, 0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0xffffffff, 0xfffffffe}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0xef84) [ 321.300818][ T26] kauditd_printk_skb: 26 callbacks suppressed [ 321.300837][ T26] audit: type=1800 audit(1676147031.900:224): pid=6805 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=1156 res=0 errno=0 [ 321.309677][ T6809] loop0: detected capacity change from 0 to 2048 20:23:52 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) stat(0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") getresgid(0x0, 0x0, 0x0) socket$tipc(0x1e, 0x0, 0x0) stat(0x0, &(0x7f0000000e40)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x5, 0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0xffffffff, 0xfffffffe}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0xef84) 20:23:52 executing program 4: syz_mount_image$reiserfs(&(0x7f0000001100), &(0x7f0000000040)='./file0\x00', 0x80, &(0x7f0000000240)=ANY=[], 0x1, 0x10ec, &(0x7f00000011c0)="$eJzs2D2LE0EcBvBnNukjc/0iaGEhxx3xC1yhkMbC2kaOq7wqqZR8HD+OpLIP6U0RsFfWZOMLAZGES/P7wTCzD/ufl3ImAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0BkmX0ty0SS1z5okJWnbxWSVpO3zR58HTUre3E1mL6fjV7Mkg5+/l651VV1Z6vWTWsd1XK/ri4ubp3X24eP7d/f3d9PdNCVtlpv5bV6vT3qUstsPAAAA8KfvRxudeX0AAADgX072kAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABwArUfNElK0raLySpJe95tAQAAAEcqafJ2dCjfPgP88jxfRmWfd/230o2v8ulAPQAAAPB/ym/38WcZ7u/lXfY4w1xebr93XdY3ySDJ1V/zLDfz276VhzwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPCDHTgWAAAAABDmb51GxwYAAAAAAAAAAAAAAABMFQAA//8ptdS5") r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) ftruncate(r0, 0x1) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[], 0x208e24b) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[], 0x208e24b) sync() r3 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r1, &(0x7f00000000c0)=0x10001, 0x532e000000000000, 0x0) [ 321.469150][ T26] audit: type=1804 audit(1676147031.900:225): pid=6805 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir592040614/syzkaller.1vPKuO/11/file0" dev="sda1" ino=1156 res=1 errno=0 20:23:52 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) stat(0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") getresgid(0x0, 0x0, 0x0) socket$tipc(0x1e, 0x0, 0x0) stat(0x0, &(0x7f0000000e40)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x5, 0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0xffffffff, 0xfffffffe}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0xef84) [ 321.572319][ T6812] loop1: detected capacity change from 0 to 2048 [ 321.601605][ T26] audit: type=1800 audit(1676147032.150:226): pid=6809 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=1048649 res=0 errno=0 [ 321.723223][ T26] audit: type=1804 audit(1676147032.160:227): pid=6809 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir3326156338/syzkaller.JQdaLw/67/file0/file0" dev="loop0" ino=1048649 res=1 errno=0 [ 321.827425][ T26] audit: type=1800 audit(1676147032.280:228): pid=6812 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=1048650 res=0 errno=0 20:23:52 executing program 2: syz_mount_image$reiserfs(&(0x7f0000001100), &(0x7f0000000040)='./file0\x00', 0x80, &(0x7f0000000240)=ANY=[], 0x1, 0x10ec, &(0x7f00000011c0)="$eJzs2D2LE0EcBvBnNukjc/0iaGEhxx3xC1yhkMbC2kaOq7wqqZR8HD+OpLIP6U0RsFfWZOMLAZGES/P7wTCzD/ufl3ImAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0BkmX0ty0SS1z5okJWnbxWSVpO3zR58HTUre3E1mL6fjV7Mkg5+/l651VV1Z6vWTWsd1XK/ri4ubp3X24eP7d/f3d9PdNCVtlpv5bV6vT3qUstsPAAAA8KfvRxudeX0AAADgX072kAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABwArUfNElK0raLySpJe95tAQAAAEcqafJ2dCjfPgP88jxfRmWfd/230o2v8ulAPQAAAPB/ym/38WcZ7u/lXfY4w1xebr93XdY3ySDJ1V/zLDfz276VhzwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPCDHTgWAAAAABDmb51GxwYAAAAAAAAAAAAAAABMFQAA//8ptdS5") r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) ftruncate(r0, 0x1) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[], 0x208e24b) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[], 0x208e24b) sync() r3 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r1, &(0x7f00000000c0)=0x10001, 0x532e000000000000, 0x0) [ 321.913792][ T6814] loop4: detected capacity change from 0 to 8192 [ 321.926258][ T26] audit: type=1804 audit(1676147032.280:229): pid=6812 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir754339577/syzkaller.9EnLvI/74/file0/file0" dev="loop1" ino=1048650 res=1 errno=0 [ 321.998523][ T6814] REISERFS warning: read_super_block: reiserfs filesystem is deprecated and scheduled to be removed from the kernel in 2025 [ 322.036256][ T6814] REISERFS (device loop4): found reiserfs format "3.6" with non-standard journal 20:23:52 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) stat(0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") getresgid(0x0, 0x0, 0x0) socket$tipc(0x1e, 0x0, 0x0) stat(0x0, &(0x7f0000000e40)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x5, 0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0xffffffff, 0xfffffffe}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0xef84) [ 322.058702][ T26] audit: type=1800 audit(1676147032.650:230): pid=6817 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=1185 res=0 errno=0 [ 322.099816][ T6814] REISERFS (device loop4): using ordered data mode [ 322.127126][ T6814] reiserfs: using flush barriers [ 322.147374][ T26] audit: type=1804 audit(1676147032.680:231): pid=6817 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir300834875/syzkaller.z4jmXP/11/file0" dev="sda1" ino=1185 res=1 errno=0 [ 322.192417][ T6814] REISERFS (device loop4): journal params: device loop4, size 512, journal first block 18, max trans len 256, max batch 225, max commit age 30, max trans age 30 20:23:52 executing program 3: syz_mount_image$reiserfs(&(0x7f0000001100), &(0x7f0000000040)='./file0\x00', 0x80, &(0x7f0000000240)=ANY=[], 0x1, 0x10ec, &(0x7f00000011c0)="$eJzs2D2LE0EcBvBnNukjc/0iaGEhxx3xC1yhkMbC2kaOq7wqqZR8HD+OpLIP6U0RsFfWZOMLAZGES/P7wTCzD/ufl3ImAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0BkmX0ty0SS1z5okJWnbxWSVpO3zR58HTUre3E1mL6fjV7Mkg5+/l651VV1Z6vWTWsd1XK/ri4ubp3X24eP7d/f3d9PdNCVtlpv5bV6vT3qUstsPAAAA8KfvRxudeX0AAADgX072kAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABwArUfNElK0raLySpJe95tAQAAAEcqafJ2dCjfPgP88jxfRmWfd/230o2v8ulAPQAAAPB/ym/38WcZ7u/lXfY4w1xebr93XdY3ySDJ1V/zLDfz276VhzwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPCDHTgWAAAAABDmb51GxwYAAAAAAAAAAAAAAABMFQAA//8ptdS5") r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) ftruncate(r0, 0x1) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[], 0x208e24b) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[], 0x208e24b) sync() r3 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r1, &(0x7f00000000c0)=0x10001, 0x532e000000000000, 0x0) 20:23:52 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) stat(0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") getresgid(0x0, 0x0, 0x0) socket$tipc(0x1e, 0x0, 0x0) stat(0x0, &(0x7f0000000e40)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x5, 0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0xffffffff, 0xfffffffe}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0xef84) [ 322.257730][ T6814] REISERFS (device loop4): checking transaction log (loop4) [ 322.430394][ T6823] loop0: detected capacity change from 0 to 2048 [ 322.491368][ T26] audit: type=1800 audit(1676147033.090:232): pid=6823 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=1048651 res=0 errno=0 [ 322.622419][ T26] audit: type=1804 audit(1676147033.090:233): pid=6823 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir3326156338/syzkaller.JQdaLw/68/file0/file0" dev="loop0" ino=1048651 res=1 errno=0 [ 322.636668][ T6828] loop1: detected capacity change from 0 to 2048 20:23:53 executing program 5: syz_mount_image$reiserfs(&(0x7f0000001100), &(0x7f0000000040)='./file0\x00', 0x80, &(0x7f0000000240)=ANY=[], 0x1, 0x10ec, &(0x7f00000011c0)="$eJzs2D2LE0EcBvBnNukjc/0iaGEhxx3xC1yhkMbC2kaOq7wqqZR8HD+OpLIP6U0RsFfWZOMLAZGES/P7wTCzD/ufl3ImAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0BkmX0ty0SS1z5okJWnbxWSVpO3zR58HTUre3E1mL6fjV7Mkg5+/l651VV1Z6vWTWsd1XK/ri4ubp3X24eP7d/f3d9PdNCVtlpv5bV6vT3qUstsPAAAA8KfvRxudeX0AAADgX072kAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABwArUfNElK0raLySpJe95tAQAAAEcqafJ2dCjfPgP88jxfRmWfd/230o2v8ulAPQAAAPB/ym/38WcZ7u/lXfY4w1xebr93XdY3ySDJ1V/zLDfz276VhzwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPCDHTgWAAAAABDmb51GxwYAAAAAAAAAAAAAAABMFQAA//8ptdS5") r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) ftruncate(r0, 0x1) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[], 0x208e24b) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[], 0x208e24b) sync() r3 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r1, &(0x7f00000000c0)=0x10001, 0x532e000000000000, 0x0) [ 322.799300][ T6814] REISERFS (device loop4): Using r5 hash to sort names [ 322.844781][ T6814] REISERFS (device loop4): Created .reiserfs_priv - reserved for xattr storage. 20:23:53 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) stat(0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") getresgid(0x0, 0x0, 0x0) socket$tipc(0x1e, 0x0, 0x0) stat(0x0, &(0x7f0000000e40)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x5, 0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0xffffffff, 0xfffffffe}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r3, r4, 0x0, 0xef84) [ 323.342075][ T6835] loop0: detected capacity change from 0 to 2048 20:23:54 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) stat(0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYRESHEX=r2], 0x1, 0x522, &(0x7f0000000a80)="$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") getresgid(0x0, 0x0, 0x0) socket$tipc(0x1e, 0x0, 0x0) stat(0x0, &(0x7f0000000e40)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x5, 0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0xffffffff, 0xfffffffe}, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x460c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0xef84) [ 323.631474][ T6841] loop1: detected capacity change from 0 to 2048 20:23:54 executing program 0: syz_mount_image$reiserfs(&(0x7f0000001100), &(0x7f0000000040)='./file0\x00', 0x80, &(0x7f0000000240)=ANY=[], 0x1, 0x10ec, &(0x7f00000011c0)="$eJzs2D2LE0EcBvBnNukjc/0iaGEhxx3xC1yhkMbC2kaOq7wqqZR8HD+OpLIP6U0RsFfWZOMLAZGES/P7wTCzD/ufl3ImAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0BkmX0ty0SS1z5okJWnbxWSVpO3zR58HTUre3E1mL6fjV7Mkg5+/l651VV1Z6vWTWsd1XK/ri4ubp3X24eP7d/f3d9PdNCVtlpv5bV6vT3qUstsPAAAA8KfvRxudeX0AAADgX072kAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABwArUfNElK0raLySpJe95tAQAAAEcqafJ2dCjfPgP88jxfRmWfd/230o2v8ulAPQAAAPB/ym/38WcZ7u/lXfY4w1xebr93XdY3ySDJ1V/zLDfz276VhzwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPCDHTgWAAAAABDmb51GxwYAAAAAAAAAAAAAAABMFQAA//8ptdS5") r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) ftruncate(r0, 0x1) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[], 0x208e24b) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[], 0x208e24b) sync() r3 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r1, &(0x7f00000000c0)=0x10001, 0x532e000000000000, 0x0) [ 324.180510][ T6843] loop0: detected capacity change from 0 to 8192 [ 324.192352][ T6843] REISERFS warning: read_super_block: reiserfs filesystem is deprecated and scheduled to be removed from the kernel in 2025 [ 324.205489][ T6843] REISERFS (device loop0): found reiserfs format "3.6" with non-standard journal [ 324.215376][ T6843] REISERFS (device loop0): using ordered data mode [ 324.222352][ T6843] reiserfs: using flush barriers [ 324.228499][ T6843] REISERFS (device loop0): journal params: device loop0, size 512, journal first block 18, max trans len 256, max batch 225, max commit age 30, max trans age 30 [ 324.245343][ T6843] REISERFS (device loop0): checking transaction log (loop0) [ 324.331409][ T6843] REISERFS (device loop0): Using r5 hash to sort names [ 324.338681][ T6843] REISERFS (device loop0): Created .reiserfs_priv - reserved for xattr storage. 20:23:55 executing program 1: syz_mount_image$reiserfs(&(0x7f0000001100), &(0x7f0000000040)='./file0\x00', 0x80, &(0x7f0000000240)=ANY=[], 0x1, 0x10ec, &(0x7f00000011c0)="$eJzs2D2LE0EcBvBnNukjc/0iaGEhxx3xC1yhkMbC2kaOq7wqqZR8HD+OpLIP6U0RsFfWZOMLAZGES/P7wTCzD/ufl3ImAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0BkmX0ty0SS1z5okJWnbxWSVpO3zR58HTUre3E1mL6fjV7Mkg5+/l651VV1Z6vWTWsd1XK/ri4ubp3X24eP7d/f3d9PdNCVtlpv5bV6vT3qUstsPAAAA8KfvRxudeX0AAADgX072kAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABwArUfNElK0raLySpJe95tAQAAAEcqafJ2dCjfPgP88jxfRmWfd/230o2v8ulAPQAAAPB/ym/38WcZ7u/lXfY4w1xebr93XdY3ySDJ1V/zLDfz276VhzwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPCDHTgWAAAAABDmb51GxwYAAAAAAAAAAAAAAABMFQAA//8ptdS5") r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) ftruncate(r0, 0x1) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[], 0x208e24b) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[], 0x208e24b) sync() r3 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r1, &(0x7f00000000c0)=0x10001, 0x532e000000000000, 0x0) [ 324.521618][ T6846] loop1: detected capacity change from 0 to 8192 [ 324.533642][ T6846] REISERFS warning: read_super_block: reiserfs filesystem is deprecated and scheduled to be removed from the kernel in 2025 [ 324.546784][ T6846] REISERFS (device loop1): found reiserfs format "3.6" with non-standard journal [ 324.558664][ T6846] REISERFS (device loop1): using ordered data mode [ 324.566774][ T6846] reiserfs: using flush barriers [ 324.575026][ T6846] REISERFS (device loop1): journal params: device loop1, size 512, journal first block 18, max trans len 256, max batch 225, max commit age 30, max trans age 30 [ 324.592061][ T6846] REISERFS (device loop1): checking transaction log (loop1) [ 324.656929][ T6846] REISERFS (device loop1): Using r5 hash to sort names [ 324.664367][ T6846] REISERFS (device loop1): Created .reiserfs_priv - reserved for xattr storage. [ 346.479096][ T27] INFO: task kworker/0:5:5136 blocked for more than 143 seconds. [ 346.487120][ T27] Not tainted 6.2.0-rc7-syzkaller-00213-g47e9aa14ce5a #0 [ 346.496464][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 346.505445][ T27] task:kworker/0:5 state:D stack:25552 pid:5136 ppid:2 flags:0x00004000 [ 346.515409][ T27] Workqueue: events_long flush_old_commits [ 346.521599][ T27] Call Trace: [ 346.524880][ T27] [ 346.527822][ T27] __schedule+0xb8a/0x5450 [ 346.532783][ T27] ? wq_worker_sleeping+0x1e9/0x250 [ 346.538063][ T27] ? io_schedule_timeout+0x150/0x150 [ 346.543681][ T27] ? mark_held_locks+0x9f/0xe0 [ 346.549174][ T27] ? rwlock_bug.part.0+0x90/0x90 [ 346.554158][ T27] ? _raw_spin_unlock_irq+0x23/0x50 [ 346.561794][ T27] ? lockdep_hardirqs_on+0x7d/0x100 [ 346.567038][ T27] schedule+0xde/0x1b0 [ 346.571747][ T27] schedule_preempt_disabled+0x13/0x20 [ 346.577270][ T27] __mutex_lock+0xa48/0x1360 [ 346.582272][ T27] ? reiserfs_write_lock+0x79/0x100 [ 346.587585][ T27] ? mutex_lock_io_nested+0x11a0/0x11a0 [ 346.593449][ T27] ? dquot_writeback_dquots+0x25d/0xa30 [ 346.599408][ T27] ? dquot_scan_active+0x2d0/0x2d0 [ 346.604583][ T27] reiserfs_write_lock+0x79/0x100 [ 346.610047][ T27] reiserfs_sync_fs+0x81/0x130 [ 346.614854][ T27] ? handle_quota_files+0x3b0/0x3b0 [ 346.620566][ T27] ? do_raw_spin_lock+0x124/0x2b0 [ 346.625626][ T27] ? rwlock_bug.part.0+0x90/0x90 [ 346.631497][ T27] ? do_raw_spin_unlock+0x175/0x230 [ 346.636748][ T27] flush_old_commits+0xfb/0x200 [ 346.642097][ T27] process_one_work+0x9bf/0x1710 [ 346.647079][ T27] ? pwq_dec_nr_in_flight+0x2a0/0x2a0 [ 346.653194][ T27] ? rwlock_bug.part.0+0x90/0x90 [ 346.658168][ T27] ? _raw_spin_lock_irq+0x45/0x50 [ 346.663689][ T27] worker_thread+0x669/0x1090 [ 346.668405][ T27] ? __kthread_parkme+0x163/0x220 [ 346.674031][ T27] ? process_one_work+0x1710/0x1710 [ 346.679797][ T27] kthread+0x2e8/0x3a0 [ 346.683925][ T27] ? kthread_complete_and_exit+0x40/0x40 [ 346.689963][ T27] ret_from_fork+0x1f/0x30 [ 346.694418][ T27] [ 346.697505][ T27] INFO: task kworker/u4:9:5231 blocked for more than 143 seconds. [ 346.705832][ T27] Not tainted 6.2.0-rc7-syzkaller-00213-g47e9aa14ce5a #0 [ 346.713987][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 346.722979][ T27] task:kworker/u4:9 state:D stack:25904 pid:5231 ppid:2 flags:0x00004000 [ 346.732443][ T27] Workqueue: writeback wb_workfn (flush-7:3) [ 346.738539][ T27] Call Trace: [ 346.742266][ T27] [ 346.745233][ T27] __schedule+0xb8a/0x5450 [ 346.750063][ T27] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 346.756521][ T27] ? io_schedule_timeout+0x150/0x150 [ 346.762245][ T27] ? __mutex_lock+0xa43/0x1360 [ 346.767055][ T27] ? do_raw_spin_lock+0x124/0x2b0 [ 346.772345][ T27] ? rwlock_bug.part.0+0x90/0x90 [ 346.777292][ T27] schedule+0xde/0x1b0 [ 346.781779][ T27] schedule_preempt_disabled+0x13/0x20 [ 346.787292][ T27] __mutex_lock+0xa48/0x1360 [ 346.792680][ T27] ? reiserfs_write_lock+0x79/0x100 [ 346.797925][ T27] ? mutex_lock_io_nested+0x11a0/0x11a0 [ 346.803826][ T27] ? page_vma_mapped_walk+0x10b2/0x1ed0 [ 346.809725][ T27] reiserfs_write_lock+0x79/0x100 [ 346.814787][ T27] map_block_for_writepage+0x24c/0x1900 [ 346.820675][ T27] ? lock_chain_count+0x20/0x20 [ 346.825575][ T27] ? reiserfs_get_blocks_direct_io+0x300/0x300 [ 346.832034][ T27] ? __lock_acquire+0xbc3/0x56d0 [ 346.836986][ T27] ? memset+0x24/0x50 [ 346.841397][ T27] ? zero_user_segments.constprop.0+0x322/0x6f0 [ 346.847686][ T27] reiserfs_writepage+0x5d4/0x2650 [ 346.853076][ T27] ? map_block_for_writepage+0x1900/0x1900 [ 346.859746][ T27] ? percpu_counter_add_batch+0xc1/0x180 [ 346.865482][ T27] __writepage+0x64/0x180 [ 346.870214][ T27] write_cache_pages+0x785/0x19c0 [ 346.875309][ T27] ? dirty_background_bytes_handler+0x80/0x80 [ 346.881781][ T27] ? balance_dirty_pages_ratelimited+0x20/0x20 [ 346.887992][ T27] ? __lock_acquire+0x166e/0x56d0 [ 346.893343][ T27] do_writepages+0x2b8/0x690 [ 346.897950][ T27] ? writeback_set_ratelimit+0x150/0x150 [ 346.904363][ T27] ? find_held_lock+0x2d/0x110 [ 346.909441][ T27] ? wbc_attach_and_unlock_inode+0x4d0/0x8d0 [ 346.915457][ T27] ? lock_downgrade+0x6e0/0x6e0 [ 346.920649][ T27] __writeback_single_inode+0x159/0x1440 [ 346.926313][ T27] ? wbc_attach_and_unlock_inode+0x4d0/0x8d0 [ 346.932643][ T27] writeback_sb_inodes+0x54d/0xf90 [ 346.937901][ T27] ? sync_inode_metadata+0xe0/0xe0 [ 346.943382][ T27] __writeback_inodes_wb+0xc6/0x280 [ 346.948626][ T27] wb_writeback+0x8d6/0xd70 [ 346.953483][ T27] ? __writeback_inodes_wb+0x280/0x280 [ 346.959844][ T27] ? get_nr_dirty_inodes+0x11e/0x1b0 [ 346.965196][ T27] wb_workfn+0xb3e/0x12f0 [ 346.969910][ T27] ? inode_wait_for_writeback+0x40/0x40 [ 346.975489][ T27] ? lock_release+0x810/0x810 [ 346.980553][ T27] process_one_work+0x9bf/0x1710 [ 346.985519][ T27] ? pwq_dec_nr_in_flight+0x2a0/0x2a0 [ 346.991240][ T27] ? rwlock_bug.part.0+0x90/0x90 [ 346.996201][ T27] ? _raw_spin_lock_irq+0x45/0x50 [ 347.001557][ T27] worker_thread+0x669/0x1090 [ 347.006261][ T27] ? __kthread_parkme+0x163/0x220 [ 347.011859][ T27] ? process_one_work+0x1710/0x1710 [ 347.017093][ T27] kthread+0x2e8/0x3a0 [ 347.021720][ T27] ? kthread_complete_and_exit+0x40/0x40 [ 347.027401][ T27] ret_from_fork+0x1f/0x30 [ 347.032200][ T27] [ 347.035244][ T27] INFO: task kworker/1:9:5771 blocked for more than 143 seconds. [ 347.043389][ T27] Not tainted 6.2.0-rc7-syzkaller-00213-g47e9aa14ce5a #0 [ 347.051259][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 347.060806][ T27] task:kworker/1:9 state:D stack:27720 pid:5771 ppid:2 flags:0x00004000 [ 347.070369][ T27] Workqueue: reiserfs/loop3 flush_async_commits [ 347.076658][ T27] Call Trace: [ 347.080292][ T27] [ 347.083251][ T27] __schedule+0xb8a/0x5450 [ 347.087704][ T27] ? wq_worker_sleeping+0x1e9/0x250 [ 347.093380][ T27] ? io_schedule_timeout+0x150/0x150 [ 347.098708][ T27] ? mark_held_locks+0x9f/0xe0 [ 347.103718][ T27] ? rwlock_bug.part.0+0x90/0x90 [ 347.108691][ T27] ? _raw_spin_unlock_irq+0x23/0x50 [ 347.114311][ T27] ? lockdep_hardirqs_on+0x7d/0x100 [ 347.120062][ T27] schedule+0xde/0x1b0 [ 347.124180][ T27] schedule_preempt_disabled+0x13/0x20 [ 347.130298][ T27] __mutex_lock+0xa48/0x1360 [ 347.134914][ T27] ? reiserfs_write_lock+0x79/0x100 [ 347.140476][ T27] ? mutex_lock_io_nested+0x11a0/0x11a0 [ 347.146047][ T27] ? lock_downgrade+0x6e0/0x6e0 [ 347.151299][ T27] ? do_raw_spin_lock+0x124/0x2b0 [ 347.156348][ T27] reiserfs_write_lock+0x79/0x100 [ 347.161744][ T27] flush_async_commits+0x48/0xe0 [ 347.167170][ T27] process_one_work+0x9bf/0x1710 [ 347.172582][ T27] ? pwq_dec_nr_in_flight+0x2a0/0x2a0 [ 347.178017][ T27] ? rwlock_bug.part.0+0x90/0x90 [ 347.183384][ T27] ? _raw_spin_lock_irq+0x45/0x50 [ 347.188447][ T27] worker_thread+0x669/0x1090 [ 347.193499][ T27] ? process_one_work+0x1710/0x1710 [ 347.198741][ T27] kthread+0x2e8/0x3a0 [ 347.203205][ T27] ? kthread_complete_and_exit+0x40/0x40 [ 347.208947][ T27] ret_from_fork+0x1f/0x30 [ 347.213396][ T27] [ 347.216428][ T27] INFO: task syz-executor.3:6336 blocked for more than 144 seconds. [ 347.224524][ T27] Not tainted 6.2.0-rc7-syzkaller-00213-g47e9aa14ce5a #0 [ 347.232266][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 347.241000][ T27] task:syz-executor.3 state:D stack:27472 pid:6336 ppid:5090 flags:0x00000004 [ 347.250302][ T27] Call Trace: [ 347.253618][ T27] [ 347.256663][ T27] __schedule+0xb8a/0x5450 [ 347.261200][ T27] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 347.267624][ T27] ? io_schedule_timeout+0x150/0x150 [ 347.273768][ T27] ? __mutex_lock+0xa43/0x1360 [ 347.278579][ T27] schedule+0xde/0x1b0 [ 347.282725][ T27] schedule_preempt_disabled+0x13/0x20 [ 347.288235][ T27] __mutex_lock+0xa48/0x1360 [ 347.292900][ T27] ? reiserfs_write_lock+0x79/0x100 [ 347.298130][ T27] ? mutex_lock_io_nested+0x11a0/0x11a0 [ 347.303743][ T27] ? ima_file_free+0x1b1/0x420 [ 347.308611][ T27] ? lock_downgrade+0x6e0/0x6e0 [ 347.313548][ T27] ? rcu_read_lock_sched_held+0x3e/0x70 [ 347.319361][ T27] ? __mutex_lock+0x231/0x1360 [ 347.324193][ T27] ? find_held_lock+0x2d/0x110 [ 347.329029][ T27] reiserfs_write_lock+0x79/0x100 [ 347.334102][ T27] reiserfs_file_release+0x1ad/0xcb0 [ 347.339693][ T27] ? reiserfs_sync_file+0x320/0x320 [ 347.345101][ T27] ? do_raw_read_unlock+0x3f/0x70 [ 347.350256][ T27] ? ima_file_free+0x1b1/0x420 [ 347.355058][ T27] __fput+0x27c/0xa90 [ 347.359206][ T27] ? reiserfs_sync_file+0x320/0x320 [ 347.364444][ T27] task_work_run+0x16f/0x270 [ 347.369895][ T27] ? task_work_cancel+0x30/0x30 [ 347.374790][ T27] exit_to_user_mode_prepare+0x23c/0x250 [ 347.380574][ T27] syscall_exit_to_user_mode+0x1d/0x50 [ 347.386072][ T27] do_syscall_64+0x46/0xb0 [ 347.390591][ T27] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 347.396586][ T27] RIP: 0033:0x7f0d9f83dfab [ 347.401058][ T27] RSP: 002b:00007ffd97e82cc0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 347.409576][ T27] RAX: 0000000000000000 RBX: 0000000000000007 RCX: 00007f0d9f83dfab [ 347.417593][ T27] RDX: 0000001b30f20000 RSI: 00007f0d9f031560 RDI: 0000000000000006 [ 347.425630][ T27] RBP: 00007f0d9f9ad980 R08: 0000000000000000 R09: 00000000c164a76d [ 347.433692][ T27] R10: 00007ffd97f31090 R11: 0000000000000293 R12: 000000000002f8a3 [ 347.441722][ T27] R13: 00007ffd97e82dc0 R14: 00007ffd97e82de0 R15: 0000000000000032 [ 347.450034][ T27] [ 347.453095][ T27] INFO: task syz-executor.3:6340 blocked for more than 144 seconds. [ 347.461146][ T27] Not tainted 6.2.0-rc7-syzkaller-00213-g47e9aa14ce5a #0 [ 347.468691][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 347.477899][ T27] task:syz-executor.3 state:D stack:24600 pid:6340 ppid:5090 flags:0x00004004 [ 347.487213][ T27] Call Trace: [ 347.490557][ T27] [ 347.493508][ T27] __schedule+0xb8a/0x5450 [ 347.497971][ T27] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 347.504129][ T27] ? cleanup_bitmap_list.part.0+0x26c/0x5f0 [ 347.518931][ T27] ? io_schedule_timeout+0x150/0x150 [ 347.524281][ T27] ? __mutex_lock+0xa43/0x1360 [ 347.529431][ T27] schedule+0xde/0x1b0 [ 347.533555][ T27] schedule_preempt_disabled+0x13/0x20 [ 347.539455][ T27] __mutex_lock+0xa48/0x1360 [ 347.544068][ T27] ? reiserfs_write_lock+0x79/0x100 [ 347.549692][ T27] ? mutex_lock_io_nested+0x11a0/0x11a0 [ 347.555272][ T27] ? dquot_writeback_dquots+0x25d/0xa30 [ 347.561477][ T27] ? dquot_scan_active+0x2d0/0x2d0 [ 347.566632][ T27] reiserfs_write_lock+0x79/0x100 [ 347.572643][ T27] reiserfs_sync_fs+0x81/0x130 [ 347.577456][ T27] ? handle_quota_files+0x3b0/0x3b0 [ 347.582905][ T27] ? down_read+0x19c/0x450 [ 347.587322][ T27] ? do_raw_spin_lock+0x124/0x2b0 [ 347.592731][ T27] ? rwsem_down_read_slowpath+0xb20/0xb20 [ 347.598491][ T27] ? rwlock_bug.part.0+0x90/0x90 [ 347.603788][ T27] ? lock_downgrade+0x6e0/0x6e0 [ 347.608681][ T27] ? handle_quota_files+0x3b0/0x3b0 [ 347.614466][ T27] sync_fs_one_sb+0x10b/0x150 [ 347.619448][ T27] iterate_supers+0x140/0x2a0 [ 347.624158][ T27] ? vfs_fsync_range+0x230/0x230 [ 347.629489][ T27] ksys_sync+0x9b/0x150 [ 347.633767][ T27] ? vfs_fsync+0x1f0/0x1f0 [ 347.638183][ T27] ? lockdep_hardirqs_on+0x7d/0x100 [ 347.643810][ T27] __do_sys_sync+0xe/0x20 [ 347.648180][ T27] do_syscall_64+0x39/0xb0 [ 347.652975][ T27] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 347.659015][ T27] RIP: 0033:0x7f0d9f88c0f9 [ 347.663594][ T27] RSP: 002b:00007f0da060c168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a2 [ 347.672397][ T27] RAX: ffffffffffffffda RBX: 00007f0d9f9abf80 RCX: 00007f0d9f88c0f9 [ 347.681168][ T27] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 347.689327][ T27] RBP: 00007f0d9f8e7ae9 R08: 0000000000000000 R09: 0000000000000000 [ 347.697321][ T27] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 347.705354][ T27] R13: 00007ffd97e82c5f R14: 00007f0da060c300 R15: 0000000000022000 [ 347.713380][ T27] [ 347.716398][ T27] INFO: task syz-executor.3:6354 blocked for more than 144 seconds. [ 347.724424][ T27] Not tainted 6.2.0-rc7-syzkaller-00213-g47e9aa14ce5a #0 [ 347.732037][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 347.740792][ T27] task:syz-executor.3 state:D stack:26200 pid:6354 ppid:5090 flags:0x00004004 [ 347.752052][ T27] Call Trace: [ 347.756132][ T27] [ 347.759364][ T27] __schedule+0xb8a/0x5450 [ 347.763840][ T27] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 347.769940][ T27] ? is_module_text_address+0x4b/0x70 [ 347.775366][ T27] ? io_schedule_timeout+0x150/0x150 [ 347.781582][ T27] ? mark_held_locks+0x9f/0xe0 [ 347.786411][ T27] schedule+0xde/0x1b0 [ 347.790581][ T27] io_schedule+0xbe/0x130 [ 347.794954][ T27] folio_wait_bit_common+0x394/0x9b0 [ 347.800411][ T27] ? filemap_range_has_writeback+0x650/0x650 [ 347.806522][ T27] ? __filemap_get_folio+0x254/0xd80 [ 347.811991][ T27] ? folio_unlock+0xd0/0xd0 [ 347.816533][ T27] __filemap_get_folio+0xb71/0xd80 [ 347.821785][ T27] ? filemap_add_folio+0x1e0/0x1e0 [ 347.826929][ T27] ? reiserfs_end_persistent_transaction+0x156/0x1b0 [ 347.833670][ T27] ? lockdep_hardirqs_on+0x7d/0x100 [ 347.838988][ T27] pagecache_get_page+0x2e/0x280 [ 347.843974][ T27] reiserfs_get_block+0xf6b/0x4150 [ 347.849158][ T27] ? reiserfs_commit_write+0x6f0/0x6f0 [ 347.854655][ T27] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 347.860789][ T27] ? find_held_lock+0x2d/0x110 [ 347.865785][ T27] ? create_page_buffers+0x440/0x640 [ 347.871224][ T27] ? do_raw_spin_unlock+0x175/0x230 [ 347.876460][ T27] __block_write_begin_int+0x3bd/0x14b0 [ 347.882815][ T27] ? reiserfs_commit_write+0x6f0/0x6f0 [ 347.888331][ T27] ? mark_held_locks+0x9f/0xe0 [ 347.893403][ T27] ? invalidate_bh_lrus_cpu+0x140/0x140 [ 347.899137][ T27] ? ktime_get_coarse_real_ts64+0x1bb/0x200 [ 347.905150][ T27] ? PageHeadHuge+0x1a2/0x200 [ 347.909965][ T27] reiserfs_write_begin+0x36e/0xa60 [ 347.915198][ T27] ? current_time+0x1fe/0x2c0 [ 347.919991][ T27] generic_perform_write+0x256/0x570 [ 347.925347][ T27] ? folio_add_wait_queue+0x1c0/0x1c0 [ 347.930800][ T27] ? new_inode+0x280/0x280 [ 347.935241][ T27] ? generic_write_checks+0x2c0/0x400 [ 347.940898][ T27] __generic_file_write_iter+0x2ae/0x500 [ 347.946571][ T27] ? vfs_copy_file_range+0x4c2/0x1320 [ 347.952034][ T27] ? __do_sys_copy_file_range+0x193/0x420 [ 347.957802][ T27] generic_file_write_iter+0xe3/0x350 [ 347.963959][ T27] do_iter_readv_writev+0x20b/0x3b0 [ 347.969837][ T27] ? generic_copy_file_range+0x1d0/0x1d0 [ 347.975524][ T27] ? avc_policy_seqno+0xd/0x70 [ 347.980611][ T27] ? security_file_permission+0xaf/0xd0 [ 347.986786][ T27] do_iter_write+0x182/0x700 [ 347.991471][ T27] vfs_iter_write+0x74/0xa0 [ 347.996010][ T27] iter_file_splice_write+0x745/0xc90 [ 348.001726][ T27] ? page_cache_pipe_buf_confirm+0x5b0/0x5b0 [ 348.007744][ T27] ? add_to_pipe+0x3b0/0x3b0 [ 348.012400][ T27] ? inode_security+0x105/0x130 [ 348.017288][ T27] ? security_file_permission+0xaf/0xd0 [ 348.022948][ T27] ? page_cache_pipe_buf_confirm+0x5b0/0x5b0 [ 348.029002][ T27] direct_splice_actor+0x114/0x180 [ 348.034151][ T27] splice_direct_to_actor+0x335/0x8a0 [ 348.039663][ T27] ? do_splice_direct+0x280/0x280 [ 348.044722][ T27] ? folio_flags.constprop.0+0x150/0x150 [ 348.050418][ T27] ? security_file_permission+0xaf/0xd0 [ 348.055996][ T27] do_splice_direct+0x1ab/0x280 [ 348.060980][ T27] ? splice_direct_to_actor+0x8a0/0x8a0 [ 348.066637][ T27] generic_copy_file_range+0xeb/0x1d0 [ 348.072127][ T27] ? rw_verify_area+0x1b0/0x1b0 [ 348.077032][ T27] vfs_copy_file_range+0x4c2/0x1320 [ 348.082415][ T27] ? generic_file_rw_checks+0x230/0x230 [ 348.088417][ T27] __do_sys_copy_file_range+0x193/0x420 [ 348.094110][ T27] ? vfs_copy_file_range+0x1320/0x1320 [ 348.099731][ T27] ? syscall_enter_from_user_mode+0x26/0xb0 [ 348.105673][ T27] do_syscall_64+0x39/0xb0 [ 348.110402][ T27] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 348.116358][ T27] RIP: 0033:0x7f0d9f88c0f9 [ 348.120913][ T27] RSP: 002b:00007f0da05eb168 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 348.129420][ T27] RAX: ffffffffffffffda RBX: 00007f0d9f9ac050 RCX: 00007f0d9f88c0f9 [ 348.137412][ T27] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000007 [ 348.145492][ T27] RBP: 00007f0d9f8e7ae9 R08: 532e000000000000 R09: 0000000000000000 [ 348.153536][ T27] R10: 00000000200000c0 R11: 0000000000000246 R12: 0000000000000000 [ 348.161632][ T27] R13: 00007ffd97e82c5f R14: 00007f0da05eb300 R15: 0000000000022000 [ 348.169735][ T27] [ 348.172837][ T27] INFO: task syz-executor.5:6338 blocked for more than 145 seconds. [ 348.181034][ T27] Not tainted 6.2.0-rc7-syzkaller-00213-g47e9aa14ce5a #0 [ 348.189083][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 348.198464][ T27] task:syz-executor.5 state:D stack:24600 pid:6338 ppid:5086 flags:0x00004004 [ 348.207731][ T27] Call Trace: [ 348.211089][ T27] [ 348.214030][ T27] __schedule+0xb8a/0x5450 [ 348.218450][ T27] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 348.224742][ T27] ? io_schedule_timeout+0x150/0x150 [ 348.230114][ T27] ? __mutex_lock+0xa43/0x1360 [ 348.234910][ T27] schedule+0xde/0x1b0 [ 348.239062][ T27] schedule_preempt_disabled+0x13/0x20 [ 348.244560][ T27] __mutex_lock+0xa48/0x1360 [ 348.249253][ T27] ? wake_up_q+0x8f/0xf0 [ 348.253591][ T27] ? reiserfs_write_lock_nested+0x69/0xe0 [ 348.259414][ T27] ? mutex_lock_io_nested+0x11a0/0x11a0 [ 348.264987][ T27] ? wait_for_completion_io_timeout+0x20/0x20 [ 348.271166][ T27] reiserfs_write_lock_nested+0x69/0xe0 [ 348.276832][ T27] flush_commit_list.isra.0+0xde1/0x1e70 [ 348.282535][ T27] do_journal_end+0x364e/0x4af0 [ 348.287418][ T27] ? reiserfs_prepare_for_journal+0x2b0/0x2b0 [ 348.294036][ T27] ? dquot_scan_active+0x2d0/0x2d0 [ 348.299262][ T27] reiserfs_sync_fs+0xfc/0x130 [ 348.304068][ T27] ? handle_quota_files+0x3b0/0x3b0 [ 348.310318][ T27] ? do_raw_spin_lock+0x124/0x2b0 [ 348.315374][ T27] ? rwsem_down_read_slowpath+0xb20/0xb20 [ 348.321172][ T27] ? rwlock_bug.part.0+0x90/0x90 [ 348.326135][ T27] ? lock_downgrade+0x6e0/0x6e0 [ 348.331301][ T27] ? handle_quota_files+0x3b0/0x3b0 [ 348.336542][ T27] sync_fs_one_sb+0x10b/0x150 [ 348.341291][ T27] iterate_supers+0x140/0x2a0 [ 348.345998][ T27] ? vfs_fsync_range+0x230/0x230 [ 348.351044][ T27] ksys_sync+0x9b/0x150 [ 348.355224][ T27] ? vfs_fsync+0x1f0/0x1f0 [ 348.359729][ T27] ? lockdep_hardirqs_on+0x7d/0x100 [ 348.364966][ T27] __do_sys_sync+0xe/0x20 [ 348.369378][ T27] do_syscall_64+0x39/0xb0 [ 348.373834][ T27] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 348.379810][ T27] RIP: 0033:0x7f350ba8c0f9 [ 348.384239][ T27] RSP: 002b:00007f350c83a168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a2 [ 348.393394][ T27] RAX: ffffffffffffffda RBX: 00007f350bbabf80 RCX: 00007f350ba8c0f9 [ 348.401468][ T27] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 348.409529][ T27] RBP: 00007f350bae7ae9 R08: 0000000000000000 R09: 0000000000000000 [ 348.417515][ T27] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 348.425568][ T27] R13: 00007ffc055b3d9f R14: 00007f350c83a300 R15: 0000000000022000 [ 348.433615][ T27] [ 348.436662][ T27] INFO: task syz-executor.2:6342 blocked for more than 145 seconds. [ 348.444899][ T27] Not tainted 6.2.0-rc7-syzkaller-00213-g47e9aa14ce5a #0 [ 348.452510][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 348.461234][ T27] task:syz-executor.2 state:D stack:24600 pid:6342 ppid:5083 flags:0x00004004 [ 348.470527][ T27] Call Trace: [ 348.473829][ T27] [ 348.476771][ T27] __schedule+0xb8a/0x5450 [ 348.481265][ T27] ? find_held_lock+0x2d/0x110 [ 348.486068][ T27] ? prepare_to_wait_event+0xd0/0x6a0 [ 348.491579][ T27] ? io_schedule_timeout+0x150/0x150 [ 348.497291][ T27] ? mark_held_locks+0x9f/0xe0 [ 348.502159][ T27] ? _raw_spin_unlock_irqrestore+0x54/0x70 [ 348.508002][ T27] ? lockdep_hardirqs_on+0x7d/0x100 [ 348.513283][ T27] ? _raw_spin_unlock_irqrestore+0x41/0x70 [ 348.519161][ T27] schedule+0xde/0x1b0 [ 348.523283][ T27] wb_wait_for_completion+0x182/0x240 [ 348.528679][ T27] ? wb_writeback+0xd70/0xd70 [ 348.533439][ T27] ? prepare_to_wait_exclusive+0x2c0/0x2c0 [ 348.539337][ T27] ? down_write_killable+0x250/0x250 [ 348.544659][ T27] sync_inodes_sb+0x1aa/0x9e0 [ 348.549626][ T27] ? try_to_writeback_inodes_sb+0xc0/0xc0 [ 348.555388][ T27] ? rwsem_down_read_slowpath+0xb20/0xb20 [ 348.561200][ T27] ? rwlock_bug.part.0+0x90/0x90 [ 348.566165][ T27] ? lock_downgrade+0x6e0/0x6e0 [ 348.571093][ T27] sync_inodes_one_sb+0x51/0x60 [ 348.575970][ T27] iterate_supers+0x140/0x2a0 [ 348.580705][ T27] ? __ia32_sys_tee+0x1f0/0x1f0 [ 348.585603][ T27] ksys_sync+0x8a/0x150 [ 348.589846][ T27] ? vfs_fsync+0x1f0/0x1f0 [ 348.594298][ T27] ? lockdep_hardirqs_on+0x7d/0x100 [ 348.600196][ T27] __do_sys_sync+0xe/0x20 [ 348.604566][ T27] do_syscall_64+0x39/0xb0 [ 348.609037][ T27] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 348.614969][ T27] RIP: 0033:0x7f5b00e8c0f9 [ 348.619473][ T27] RSP: 002b:00007f5b01b1d168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a2 [ 348.627910][ T27] RAX: ffffffffffffffda RBX: 00007f5b00fabf80 RCX: 00007f5b00e8c0f9 [ 348.635953][ T27] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 348.644004][ T27] RBP: 00007f5b00ee7ae9 R08: 0000000000000000 R09: 0000000000000000 [ 348.652068][ T27] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 348.660448][ T27] R13: 00007ffdee84328f R14: 00007f5b01b1d300 R15: 0000000000022000 [ 348.668440][ T27] [ 348.671552][ T27] [ 348.671552][ T27] Showing all locks held in the system: [ 348.679380][ T27] 1 lock held by rcu_tasks_kthre/11: [ 348.684682][ T27] #0: ffffffff8c78c7f0 (rcu_tasks.tasks_gp_mutex){+.+.}-{3:3}, at: rcu_tasks_one_gp+0x26/0xc70 [ 348.695268][ T27] 1 lock held by rcu_tasks_trace/12: [ 348.701185][ T27] #0: ffffffff8c78c4f0 (rcu_tasks_trace.tasks_gp_mutex){+.+.}-{3:3}, at: rcu_tasks_one_gp+0x26/0xc70 [ 348.713185][ T27] 1 lock held by khungtaskd/27: [ 348.718068][ T27] #0: ffffffff8c78d340 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x57/0x264 [ 348.728084][ T27] 2 locks held by getty/4737: [ 348.732789][ T27] #0: ffff88814b539098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x26/0x80 [ 348.742668][ T27] #1: ffffc900020382f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0xef4/0x13e0 [ 348.752857][ T27] 4 locks held by kworker/0:5/5136: [ 348.758044][ T27] #0: ffff888012476538 ((wq_completion)events_long){+.+.}-{0:0}, at: process_one_work+0x86d/0x1710 [ 348.768886][ T27] #1: ffffc9000426fda8 ((work_completion)(&(&sbi->old_work)->work)){+.+.}-{0:0}, at: process_one_work+0x8a1/0x1710 [ 348.781416][ T27] #2: ffff88804dfba0e0 (&type->s_umount_key#66){++++}-{3:3}, at: flush_old_commits+0x7c/0x200 [ 348.791950][ T27] #3: ffff88807ddfa090 (&sbi->lock){+.+.}-{3:3}, at: reiserfs_write_lock+0x79/0x100 [ 348.802191][ T27] 4 locks held by kworker/u4:9/5231: [ 348.807501][ T27] #0: ffff888140f96938 ((wq_completion)writeback){+.+.}-{0:0}, at: process_one_work+0x86d/0x1710 [ 348.818251][ T27] #1: ffffc90004a4fda8 ((work_completion)(&(&wb->dwork)->work)){+.+.}-{0:0}, at: process_one_work+0x8a1/0x1710 [ 348.830244][ T27] #2: ffff88804dfba0e0 (&type->s_umount_key#66){++++}-{3:3}, at: trylock_super+0x21/0x110 [ 348.840411][ T27] #3: ffff88807ddfa090 (&sbi->lock){+.+.}-{3:3}, at: reiserfs_write_lock+0x79/0x100 [ 348.850075][ T27] 3 locks held by kworker/1:9/5771: [ 348.855278][ T27] #0: ffff88807c848138 ((wq_completion)reiserfs/loop3){+.+.}-{0:0}, at: process_one_work+0x86d/0x1710 [ 348.866392][ T27] #1: ffffc90013e8fda8 ((work_completion)(&(&journal->j_work)->work)){+.+.}-{0:0}, at: process_one_work+0x8a1/0x1710 [ 348.878875][ T27] #2: ffff88807ddfa090 (&sbi->lock){+.+.}-{3:3}, at: reiserfs_write_lock+0x79/0x100 [ 348.888441][ T27] 2 locks held by syz-executor.3/6336: [ 348.894150][ T27] #0: ffff888058ce4898 (&ei->tailpack){+.+.}-{3:3}, at: reiserfs_file_release+0xcd/0xcb0 [ 348.904812][ T27] #1: ffff88807ddfa090 (&sbi->lock){+.+.}-{3:3}, at: reiserfs_write_lock+0x79/0x100 [ 348.914423][ T27] 2 locks held by syz-executor.3/6340: [ 348.919944][ T27] #0: ffff88804dfba0e0 (&type->s_umount_key#66){++++}-{3:3}, at: iterate_supers+0xdf/0x2a0 [ 348.930257][ T27] #1: ffff88807ddfa090 (&sbi->lock){+.+.}-{3:3}, at: reiserfs_write_lock+0x79/0x100 [ 348.939986][ T27] 3 locks held by syz-executor.3/6354: [ 348.945466][ T27] #0: ffff88804dfba460 (sb_writers#16){.+.+}-{0:0}, at: __do_sys_copy_file_range+0x193/0x420 [ 348.955866][ T27] #1: ffff888073745a80 (&sb->s_type->i_mutex_key#22){+.+.}-{3:3}, at: generic_file_write_iter+0x92/0x350 [ 348.967614][ T27] #2: ffff88807ddfa090 (&sbi->lock){+.+.}-{3:3}, at: reiserfs_write_lock_nested+0x69/0xe0 [ 348.978074][ T27] 3 locks held by syz-executor.5/6338: [ 348.983768][ T27] #0: ffff88804dfba0e0 (&type->s_umount_key#66){++++}-{3:3}, at: iterate_supers+0xdf/0x2a0 [ 348.994339][ T27] #1: ffff88804ca47c90 (&jl->j_commit_mutex){+.+.}-{3:3}, at: flush_commit_list.isra.0+0x226/0x1e70 [ 349.005562][ T27] #2: ffff88807ddfa090 (&sbi->lock){+.+.}-{3:3}, at: reiserfs_write_lock_nested+0x69/0xe0 [ 349.015702][ T27] 2 locks held by syz-executor.2/6342: [ 349.021410][ T27] #0: ffff88804dfba0e0 (&type->s_umount_key#66){++++}-{3:3}, at: iterate_supers+0xdf/0x2a0 [ 349.031741][ T27] #1: ffff888146c327d0 (&bdi->wb_switch_rwsem){+.+.}-{3:3}, at: sync_inodes_sb+0x190/0x9e0 [ 349.042012][ T27] 2 locks held by syz-executor.4/6814: [ 349.047471][ T27] #0: ffff88804dfba0e0 (&type->s_umount_key#66){++++}-{3:3}, at: iterate_supers+0xdf/0x2a0 [ 349.057666][ T27] #1: ffff888146c327d0 (&bdi->wb_switch_rwsem){+.+.}-{3:3}, at: sync_inodes_sb+0x190/0x9e0 [ 349.067898][ T27] 2 locks held by syz-executor.2/6820: [ 349.073519][ T27] #0: ffff88804dfba0e0 (&type->s_umount_key#66){++++}-{3:3}, at: iterate_supers+0xdf/0x2a0 [ 349.083979][ T27] #1: ffff888146c327d0 (&bdi->wb_switch_rwsem){+.+.}-{3:3}, at: sync_inodes_sb+0x190/0x9e0 [ 349.094240][ T27] 2 locks held by syz-executor.3/6825: [ 349.100149][ T27] #0: ffff88804dfba0e0 (&type->s_umount_key#66){++++}-{3:3}, at: iterate_supers+0xdf/0x2a0 [ 349.110572][ T27] #1: ffff888146c327d0 (&bdi->wb_switch_rwsem){+.+.}-{3:3}, at: sync_inodes_sb+0x190/0x9e0 [ 349.120871][ T27] 2 locks held by syz-executor.5/6831: [ 349.126338][ T27] #0: ffff88804dfba0e0 (&type->s_umount_key#66){++++}-{3:3}, at: iterate_supers+0xdf/0x2a0 [ 349.136527][ T27] #1: ffff888146c327d0 (&bdi->wb_switch_rwsem){+.+.}-{3:3}, at: sync_inodes_sb+0x190/0x9e0 [ 349.146757][ T27] 2 locks held by syz-executor.0/6843: [ 349.152298][ T27] #0: ffff88804dfba0e0 (&type->s_umount_key#66){++++}-{3:3}, at: iterate_supers+0xdf/0x2a0 [ 349.162620][ T27] #1: ffff888146c327d0 (&bdi->wb_switch_rwsem){+.+.}-{3:3}, at: sync_inodes_sb+0x190/0x9e0 [ 349.172879][ T27] 2 locks held by syz-executor.1/6846: [ 349.178344][ T27] #0: ffff88804dfba0e0 (&type->s_umount_key#66){++++}-{3:3}, at: iterate_supers+0xdf/0x2a0 [ 349.188616][ T27] #1: ffff888146c327d0 (&bdi->wb_switch_rwsem){+.+.}-{3:3}, at: sync_inodes_sb+0x190/0x9e0 [ 349.199036][ T27] [ 349.201387][ T27] ============================================= [ 349.201387][ T27] [ 349.210244][ T27] NMI backtrace for cpu 0 [ 349.214589][ T27] CPU: 0 PID: 27 Comm: khungtaskd Not tainted 6.2.0-rc7-syzkaller-00213-g47e9aa14ce5a #0 [ 349.224394][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023 [ 349.234460][ T27] Call Trace: [ 349.237745][ T27] [ 349.240686][ T27] dump_stack_lvl+0xd1/0x138 [ 349.245302][ T27] nmi_cpu_backtrace.cold+0x24/0x18a [ 349.250615][ T27] nmi_trigger_cpumask_backtrace+0x333/0x3c0 [ 349.256656][ T27] ? lapic_can_unplug_cpu+0x80/0x80 [ 349.261885][ T27] watchdog+0xc75/0xfc0 [ 349.266120][ T27] ? proc_dohung_task_timeout_secs+0x80/0x80 [ 349.272127][ T27] kthread+0x2e8/0x3a0 [ 349.276243][ T27] ? kthread_complete_and_exit+0x40/0x40 [ 349.281913][ T27] ret_from_fork+0x1f/0x30 [ 349.286356][ T27] [ 349.289650][ T27] Sending NMI from CPU 0 to CPUs 1: [ 349.294885][ C1] NMI backtrace for cpu 1 [ 349.294894][ C1] CPU: 1 PID: 5256 Comm: kworker/u4:13 Not tainted 6.2.0-rc7-syzkaller-00213-g47e9aa14ce5a #0 [ 349.294915][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023 [ 349.294927][ C1] Workqueue: bat_events batadv_nc_worker [ 349.295032][ C1] RIP: 0010:__lock_acquire+0x6f8/0x56d0 [ 349.295063][ C1] Code: 20 66 81 e2 ff 1f 0f b7 da be 08 00 00 00 48 89 d8 48 c1 e8 06 48 8d 3c c5 c0 9a 33 91 e8 10 0d 6b 00 48 0f a3 1d e8 47 d1 0f <0f> 82 3f ff ff ff 48 c7 c0 00 9a c0 91 48 c1 e8 03 42 0f b6 14 38 [ 349.295082][ C1] RSP: 0018:ffffc90004b8fa28 EFLAGS: 00000047 [ 349.295096][ C1] RAX: 0000000000000001 RBX: 00000000000006d8 RCX: ffffffff816252d0 [ 349.295109][ C1] RDX: fffffbfff2267374 RSI: 0000000000000008 RDI: ffffffff91339b98 [ 349.295121][ C1] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffff91339b9f [ 349.295132][ C1] R10: fffffbfff2267373 R11: 0000000000000000 R12: 0000000000000001 [ 349.295144][ C1] R13: ffff8880567881c0 R14: ffff888056788bf8 R15: dffffc0000000000 [ 349.295157][ C1] FS: 0000000000000000(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 [ 349.295176][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 349.295190][ C1] CR2: 000000c0018fb000 CR3: 000000000c48e000 CR4: 00000000003506e0 [ 349.295202][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 349.295214][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 349.295225][ C1] Call Trace: [ 349.295230][ C1] [ 349.295237][ C1] ? __lock_acquire+0x166e/0x56d0 [ 349.295264][ C1] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 349.295295][ C1] lock_acquire+0x1e3/0x630 [ 349.295322][ C1] ? batadv_nc_worker+0xf7/0xfa0 [ 349.295353][ C1] ? lock_release+0x810/0x810 [ 349.295380][ C1] ? batadv_nc_worker+0x84d/0xfa0 [ 349.295406][ C1] ? lock_downgrade+0x6e0/0x6e0 [ 349.295434][ C1] batadv_nc_worker+0x131/0xfa0 [ 349.295460][ C1] ? batadv_nc_worker+0xf7/0xfa0 [ 349.295488][ C1] process_one_work+0x9bf/0x1710 [ 349.295509][ C1] ? pwq_dec_nr_in_flight+0x2a0/0x2a0 [ 349.295529][ C1] ? rwlock_bug.part.0+0x90/0x90 [ 349.295546][ C1] ? _raw_spin_lock_irq+0x45/0x50 [ 349.295569][ C1] worker_thread+0x669/0x1090 [ 349.295590][ C1] ? process_one_work+0x1710/0x1710 [ 349.295609][ C1] kthread+0x2e8/0x3a0 [ 349.295637][ C1] ? kthread_complete_and_exit+0x40/0x40 [ 349.295666][ C1] ret_from_fork+0x1f/0x30 [ 349.295692][ C1] [ 349.299690][ T27] Kernel panic - not syncing: hung_task: blocked tasks [ 349.299704][ T27] CPU: 0 PID: 27 Comm: khungtaskd Not tainted 6.2.0-rc7-syzkaller-00213-g47e9aa14ce5a #0 [ 349.299732][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023 [ 349.299746][ T27] Call Trace: [ 349.299753][ T27] [ 349.299761][ T27] dump_stack_lvl+0xd1/0x138 [ 349.299796][ T27] panic+0x2cc/0x626 [ 349.299841][ T27] ? panic_print_sys_info.part.0+0x110/0x110 [ 349.299880][ T27] ? preempt_schedule_thunk+0x1a/0x20 [ 349.299920][ T27] ? watchdog.cold+0x130/0x158 [ 349.299951][ T27] watchdog.cold+0x141/0x158 [ 349.299978][ T27] ? proc_dohung_task_timeout_secs+0x80/0x80 [ 349.300016][ T27] kthread+0x2e8/0x3a0 [ 349.300056][ T27] ? kthread_complete_and_exit+0x40/0x40 [ 349.300097][ T27] ret_from_fork+0x1f/0x30 [ 349.300133][ T27] [ 349.303325][ T27] Kernel Offset: disabled [ 349.626571][ T27] Rebooting in 86400 seconds..