0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x88040000, 0x0, 0x0, 0x0, 0x0) 20:18:10 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000480)="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", 0x323}], 0x1) 20:18:10 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200002) ftruncate(r1, 0xf60f) 20:18:10 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x14, 0x1, 0x1, [r4]}}], 0x30}, 0x0) 20:18:10 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000480)="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", 0x323}], 0x1) 20:18:10 executing program 3: mlockall(0x4) socket$nl_netfilter(0x10, 0x3, 0xc) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) mlockall(0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) 20:18:10 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x75b8, &(0x7f0000000180), &(0x7f0000216000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000200)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2c400) 20:18:10 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6641db6e0551832d303744e57e897094b15ba5d9e70400b1f14712d8ebca47f8b25e7717fd68a8378f362fbf30b8a40a525b7be87baeb12d8e440a49eb252ea2f7fc05d7e532e1a906abffff030000000000008bc3b53e32de099dfacfa185d9db0f28c68d7ca23f367c17e5acd738ce9402dd4e9ee9ff9f24c87f26a0eab2127582afac1db1fd4960508c0da3cb7bd821a0c392a71e2cec3bb49c3f7b7d1d2a40677caf1539f7ce61bcee999919c208a34addaf85731e35a5acfec4474eb8debd9ee422804a7c1ef62703b79c250995e4dd858e6eeea2a97e49346bd0b6944f0f931a02d6200055c8", 0xe9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x4a}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 20:18:10 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000480)="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", 0x323}], 0x1) 20:18:11 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x800000000009031, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x100000003) madvise(&(0x7f00005f3000/0x1000)=nil, 0x1000, 0x11) 20:18:11 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x75b8, &(0x7f0000000180), &(0x7f0000216000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000200)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2c400) 20:18:11 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid, 0x30}]}}) 20:18:11 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000480)="7ff3a2b8e1a08310c692da8995e739deda3be1e73a65a156eb605bdd0613abef8a519ac67236417b47ccaa80b8d796c8c79c6096932ec157727a3487fe46b51cb85fdf02e98aff1d0fb63e1b6305683e4bb6ba18138064beced13e6289128edc0178ddd3aca71e2c8ddab719585a78c0d14225002e6a2c252afd316d51957bb5c45d3924450cf4cb623e451581e2c583554da861ed45b77441f71f8dc166bb4646ca5ea6d9c9804edfbd90f3b53fa747cb9cffaeb2c17faae8c26638a9bc0f21f50badfa49055170ee6db2c054359822307ec6938730dc5ae43464d0dfca2cd62f0d65f8fe18ec2942b51bdce5a34cee7ebfd37d9e9a7fdbb350c832e4de8d5b5277e4742d594b8933d5657698ae6ccffdecb8e7c460b480ba3b76b2b61ebb67000189e4261ed392ba870d64dfa4f4fa33a9c21aea7639eb25c32905773d553a20f1f1d564ca0d881e6a7def7aaae6b0bd58d108056b1de055d96fc83a4d9b32186850a1a53ace0918325310280bc86c090fae2524b5e97f4dd63a73cf6b2ed488384baa3aded5e5e5621cfca67b3fb2359f6f7a0b9d16d4e0fddc0b6d813cc2d09fac632f8ead8d42e3dcb669eb4c2d49da27f03462ba2951a0ef0e34f058bed21f8f4f15c153bd1faa552471bca84b340cb335df9b8ede43098e9987261b0a7caff00b493d1bd1a504a9dcded566dcbfc48ef3d26ec683949b920c35c61f7239b1068141cd2d7dc9af8efb2c6a3c908b72a509e88137520936fe896aa40d7ac398cc45ccb67019dbce3ba3040b95d1597091c99bb971142a67e0cf4ba5bb5dd8263f6c3e366de0c4963ea0704c8ce8a26491a3671fba6c20563fb7011d4665a36011b3a9897be472306304af742c766dfa508b064790b96a74105a23d3fa52bda4d6215c6531314cf857f24b6533f570e9cfdfd8fc36475f1ae91a435b98f81114a159050bba258a1f184011d6c087788ab7c0e3934c7c5e814666c9f7c74ea627aed397538e480309ba4768adb12900f81fbdba42e67ebb5118a7b9ed716ca96d31f842d366f11c881f107b4daa70572511de5000b25dc9c5926a42991cada71e6a67bd53bda541258e474bdc0eea0e3860b843c177153f30e737b83b8c329b386d", 0x323}], 0x1) 20:18:11 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201a6ffffff0a000000ff45ac0080ffffff0500e9311900000000000006800000802e0000000800000087771f720030070085ffffff00000000008000ca55aa", 0x40, 0x1c0}]) 20:18:11 executing program 2: r0 = syz_io_uring_setup(0x15b4, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000040)=0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffff9c, 0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, {0x0, r3}}, 0x0) io_uring_enter(r0, 0x77af, 0x0, 0x0, 0x0, 0x0) 20:18:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000020, &(0x7f0000000040)=0xa, 0x1959cc36) 20:18:11 executing program 3: openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) syz_io_uring_setup(0x0, 0xfffffffffffffffc, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) r0 = fork() mmap$usbmon(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) syz_open_procfs$namespace(r0, &(0x7f0000000340)='ns/mnt\x00') syz_mount_image$ext4(&(0x7f0000000500)='ext3\x00', &(0x7f0000000540)='./file0\x00', 0x7f, 0x5, &(0x7f0000001b80)=[{0x0, 0x0, 0x200}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000001cc0)={[{@journal_path={'journal_path', 0x3d, './file0'}}, {@mblk_io_submit}]}) 20:18:11 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x13, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f00000000c0)={[{@shortname_win95}]}) 20:18:11 executing program 5: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f00006d8000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000001040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x3081, 0x0, 0x4) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f000032a000/0x3000)=nil, 0x3000, 0x200000f, 0x11, r0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket(0x10, 0x2, 0x0) syz_io_uring_submit(r3, r2, &(0x7f00000001c0)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r5, 0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0, 0x12001}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_enter(r0, 0x3cf5, 0x0, 0x0, 0x0, 0x0) 20:18:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6(0x10, 0x3, 0x0) read(r4, &(0x7f0000000300)=""/256, 0x100) sendto$inet6(r4, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff3b, 0x0, 0x0, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r5, 0x29, 0x2, 0x0, &(0x7f0000000080)) sendto$inet6(r5, &(0x7f00000000c0)="cbd99cd188741796cc17b635746e550fa90f96caffc21c78b68c51aa6326e0834622ae8b771800d6f163d61cf733106ebe3eb78a0f3d90be656502260bd44293f0ac457fcacde2a594184769339ca7759485d4d2e2c3c828fd7d4fd2ff81317acf", 0x61, 0x420c0, &(0x7f0000000180)={0xa, 0x4e23, 0x5, @remote, 0x800}, 0x1c) creat(&(0x7f0000000040)='./file0\x00', 0x0) recvfrom$inet6(r4, &(0x7f0000000000)=""/45, 0x44, 0x0, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000000)="48050000150019", 0x7}], 0x1) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x200000000622c, 0x0) 20:18:11 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x72, 0x2, 0x0, 0x0, 0x8}, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) read(r0, &(0x7f0000000740)=""/384, 0x200008c0) signalfd(r0, &(0x7f00000000c0), 0x8) [ 727.576990][T29105] loop0: detected capacity change from 0 to 6 [ 727.602323][T29105] FAT-fs (loop0): Directory bread(block 6) failed [ 727.723189][T29121] netlink: 1280 bytes leftover after parsing attributes in process `syz-executor.2'. 20:18:11 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x800000000009031, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x100000003) madvise(&(0x7f00005f3000/0x1000)=nil, 0x1000, 0x11) 20:18:11 executing program 3: openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) syz_io_uring_setup(0x0, 0xfffffffffffffffc, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) r0 = fork() mmap$usbmon(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) syz_open_procfs$namespace(r0, &(0x7f0000000340)='ns/mnt\x00') syz_mount_image$ext4(&(0x7f0000000500)='ext3\x00', &(0x7f0000000540)='./file0\x00', 0x7f, 0x5, &(0x7f0000001b80)=[{0x0, 0x0, 0x200}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000001cc0)={[{@journal_path={'journal_path', 0x3d, './file0'}}, {@mblk_io_submit}]}) 20:18:11 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f00000000c0)={0x0, 0x1, '\x00', [@calipso={0x7, 0x8}]}, 0x18) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) 20:18:11 executing program 0: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/238, 0xee) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0xa9}) r2 = dup(r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r2, 0xc0bc5351, &(0x7f0000001480)={0x0, 0x0, 'client0\x00', 0x0, "b2deca28d0d17ce7", "8064ad66683c4e03ccea12410af3fffe57b244b66d02aacc179a8a2bbc88fc33"}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0105303, &(0x7f0000000200)={{}, 'port1\x00'}) tkill(r0, 0x7) 20:18:11 executing program 3: openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) syz_io_uring_setup(0x0, 0xfffffffffffffffc, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) r0 = fork() mmap$usbmon(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) syz_open_procfs$namespace(r0, &(0x7f0000000340)='ns/mnt\x00') syz_mount_image$ext4(&(0x7f0000000500)='ext3\x00', &(0x7f0000000540)='./file0\x00', 0x7f, 0x5, &(0x7f0000001b80)=[{0x0, 0x0, 0x200}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000001cc0)={[{@journal_path={'journal_path', 0x3d, './file0'}}, {@mblk_io_submit}]}) 20:18:11 executing program 3: openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) syz_io_uring_setup(0x0, 0xfffffffffffffffc, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) r0 = fork() mmap$usbmon(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) syz_open_procfs$namespace(r0, &(0x7f0000000340)='ns/mnt\x00') syz_mount_image$ext4(&(0x7f0000000500)='ext3\x00', &(0x7f0000000540)='./file0\x00', 0x7f, 0x5, &(0x7f0000001b80)=[{0x0, 0x0, 0x200}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000001cc0)={[{@journal_path={'journal_path', 0x3d, './file0'}}, {@mblk_io_submit}]}) 20:18:11 executing program 3: clock_adjtime(0x0, &(0x7f0000000000)={0x3f}) 20:18:11 executing program 3: clock_adjtime(0x0, &(0x7f0000000000)={0x3f}) 20:18:11 executing program 3: clock_adjtime(0x0, &(0x7f0000000000)={0x3f}) 20:18:11 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x800000000009031, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x100000003) madvise(&(0x7f00005f3000/0x1000)=nil, 0x1000, 0x11) 20:18:12 executing program 2: r0 = socket(0xa, 0x3, 0x6) r1 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) sendmmsg$sock(r0, &(0x7f0000005fc0)=[{{&(0x7f0000000040)=@ethernet={0x0, @random="00001000"}, 0x80, 0x0}}, {{&(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @private1}, 0x80, 0x0, 0x0, &(0x7f0000000640)=[@mark={{0x14}}], 0x18}}], 0x2, 0x0) 20:18:12 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)={0x84, 0x3, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x4}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x10, 0x10, 0x0, 0x1, {0x9, 0x1, 'snmp\x00'}}, @CTA_NAT_DST={0x10, 0xd, 0x0, 0x1, [@CTA_NAT_PROTO={0xc, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}]}]}]}, 0x84}}, 0x0) 20:18:12 executing program 3: clock_adjtime(0x0, &(0x7f0000000000)={0x3f}) 20:18:12 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7a}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x2f, &(0x7f0000000340)="c4c691019919da078a0098d1e0a593b040f762910000000000000022addee07bee0d6333b5cacd893169b618322ff6"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) [ 728.514152][T29170] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 20:18:12 executing program 5: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x4e141, 0x0) ftruncate(r1, 0x200004) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) pwritev2(r1, &(0x7f0000000140)=[{&(0x7f0000000440)='x', 0x1}], 0x1, 0x0, 0x0, 0x12) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 20:18:12 executing program 1: lsetxattr$system_posix_acl(&(0x7f0000000400)='.\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f00000000c0), 0x24, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) listxattr(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)=""/12, 0xc) 20:18:12 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000140)=""/24) 20:18:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x20000000005) 20:18:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="390000001100034700bb65e1c3e4ffff06000000010000004500000025000000190013c04800000007fd17e5ffff0606040000000000000000", 0x39}], 0x1) 20:18:12 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$bsg(0xffffffffffffff9c, 0x0, 0x101800, 0x0) r1 = getuid() ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) lstat(0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000a80), &(0x7f0000000ac0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000b80)=[{0x0}, {&(0x7f0000000b40)="7480adc9b4745b507011bc73", 0xc, 0x100000001}], 0x0, &(0x7f0000000bc0)={[{@map_normal}, {@uid={'uid', 0x3d, r1}}, {@block}, {@gid}, {@uid={'uid', 0x3d, r1}}], [{@smackfsroot={'smackfsroot', 0x3d, '}%!:{-\'^,/'}}, {@obj_user={'obj_user', 0x3d, '},]$'}}, {@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, ':!'}}]}) fadvise64(0xffffffffffffffff, 0x0, 0x4, 0x3) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, 0x8, 0x6cf, 0x0, 0x6, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, r0, 0x0) socket$inet6(0xa, 0x0, 0x0) 20:18:12 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7a}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x3e, &(0x7f0000000180)="c4c691019919da078a0098d1e0a593b040f762e16cf51f9f670ed273910000000000000022addee07bee0d6333b5cacd893169b618322ff6602022511253"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 20:18:12 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) setreuid(0x0, 0x0) 20:18:12 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(r0) ioctl$VT_GETMODE(r1, 0x5603, &(0x7f0000000000)) [ 728.760602][T29191] netlink: 'syz-executor.0': attribute type 19 has an invalid length. [ 728.779533][T29193] loop4: detected capacity change from 0 to 264192 [ 728.843868][ T25] kauditd_printk_skb: 20 callbacks suppressed [ 728.843880][ T25] audit: type=1326 audit(1619381892.736:4935): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29198 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 20:18:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$SOCK_DESTROY(r0, &(0x7f00000022c0)={0x0, 0x0, &(0x7f0000002300)={&(0x7f0000000100)={0x14, 0x19, 0x11, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 20:18:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r1, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0x0, 0x2012, r1, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) clone(0x0, 0x0, 0x0, 0x0, 0x0) munlock(&(0x7f0000433000/0x4000)=nil, 0x4000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mremap(&(0x7f000038b000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f00000bd000/0x2000)=nil) mmap(&(0x7f0000000000/0x800000)=nil, 0x80006f, 0x0, 0x12, r2, 0x0) 20:18:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6641db6e0551832d303744e57e897094b15ba5d9e70400b1f14712d8ebca47f8b25e7717fd68a8378f362fbf30b8a40a525b7be87baeb12d8e440a49eb252ea2f7fc05d7e532e1a906", 0x49}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 20:18:12 executing program 1: r0 = socket$inet(0x2, 0x3, 0x1) bind(r0, &(0x7f00000000c0)=@nl=@unspec={0x0, 0x2}, 0x80) [ 728.879263][ T25] audit: type=1326 audit(1619381892.746:4936): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29198 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=113 compat=0 ip=0x4665f9 code=0x7ffc0000 20:18:12 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newae={0x50, 0x1e, 0x9574e06072bb7ab7, 0x0, 0x0, {{@in=@local}, @in6=@local}, [@replay_val={0x10}]}, 0x50}}, 0x0) sendmmsg(r2, &(0x7f0000000180), 0xf1, 0x0) 20:18:12 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) clone(0x5fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x40000000, 0x0) r0 = gettid() pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000000c0)="6d527cd53870164a3a0d4b64fb0d7bebad2dce076e7768215970e33adf15173c9e665cff10727f62077ebc24a796b221a2f39fd294dc01861206b499138d02ebf3cfc3b11f0e18858568476bac483df9c4d0a61da2d2f9b7c4cb601c0141f209fc9e06d9457920a9a749a23ccd52eb91db5b189627774719cf91bd6e63a2b8a3b657c0e438ffc3e275b03ef0f384a0c1f20143b7b87f2e34729b000000805e0ad338423d4200f349c545516c46bb9f104a3816b12950faa20fab5827bc62a8d4cc12c4c8954308a933d63aa66cdb3646a37626de7361b5338c197dd3e6844dafcb4338dce0b79ee41da150eca12fbd36b4873ce8e4747b63e8830ee6c32f254d3779e13b27a15beaf488ea843600"/297, 0xffffffca) ptrace(0x4206, r0) tkill(r0, 0x800000009) [ 728.962946][T29211] loop4: detected capacity change from 0 to 264192 [ 728.978123][ T25] audit: type=1326 audit(1619381892.746:4937): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29198 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 729.080738][ T25] audit: type=1326 audit(1619381892.746:4938): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29198 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 20:18:13 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x189481) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000180)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick=0x5, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @time={0x5}, {}, {}, @time=@time}], 0x38) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000280)={0x30e, @tick, 0x0, {0xfe}}) 20:18:13 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000200)="ff7c1bec00002ae8b0826ebab213d98f3740910e6ae4229717007ac6", 0x1c}, {&(0x7f00000000c0)="6adb3373517cfd24f20d1dda9cbfb15fe3280e1c39b7bd166695678c", 0x1c}], 0x2) 20:18:13 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$getflags(r0, 0x10) 20:18:13 executing program 0: r0 = syz_io_uring_setup(0x3ff, &(0x7f0000000340), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000140)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f00000004c0)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff, 0xffffffffffffffff]}, 0x2) 20:18:13 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setreuid(0x0, 0xee00) ioctl$TCGETS2(r0, 0x4b71, 0x0) 20:18:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x88, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_TUPLE_MASTER={0x24, 0xe, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}]}]}, 0x88}}, 0x0) 20:18:13 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000000500)=@newsa={0x104, 0x10, 0x1, 0x0, 0x0, {{@in=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@mcast2, 0x0, 0x2b}, @in, {}, {}, {}, 0x0, 0x0, 0xa}, [@coaddr={0x14, 0xe, @in=@empty}]}, 0x104}}, 0x0) [ 729.108746][ T25] audit: type=1326 audit(1619381892.746:4939): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29198 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=157 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 729.133073][ T25] audit: type=1326 audit(1619381892.746:4940): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29198 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 20:18:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) listen(r0, 0x0) close(r0) 20:18:13 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='tmpfs\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000180)='./file0/bus\x00', 0x6210, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000140)='./file0/bus\x00', r0, 0x0) open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x40, 0x0) 20:18:13 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x189481) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000180)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick=0x5, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @time={0x5}, {}, {}, @time=@time}], 0x38) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000280)={0x30e, @tick, 0x0, {0xfe}}) 20:18:13 executing program 1: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x57, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x200000, 0x43) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000200)='./bus\x00', 0x0) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r1 = open(&(0x7f0000000480)='./bus\x00', 0x24000, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, 0x0) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x40d09) 20:18:13 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) poll(0x0, 0x0, 0x204) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 20:18:13 executing program 0: r0 = syz_io_uring_setup(0x3ff, &(0x7f0000000340), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000140)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f00000004c0)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff, 0xffffffffffffffff]}, 0x2) 20:18:13 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x189481) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000180)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick=0x5, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @time={0x5}, {}, {}, @time=@time}], 0x38) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000280)={0x30e, @tick, 0x0, {0xfe}}) 20:18:13 executing program 4: r0 = memfd_create(&(0x7f00000000c0)='\aE\x93#\x06nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_buf(r1, 0x6, 0x21, &(0x7f0000000280)="73f3c3713fabff955abe276a0af073e0", 0x10) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f0000000140)) 20:18:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000400), &(0x7f0000000440)=0x4) 20:18:13 executing program 4: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) chroot(&(0x7f00000003c0)='./file0/../file0\x00') mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f0000000040)='./file0\x00') mount$9p_fd(0x0, &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x12080a0, &(0x7f0000000180)=ANY=[@ANYBLOB=',ro']) 20:18:13 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x189481) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000180)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick=0x5, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @time={0x5}, {}, {}, @time=@time}], 0x38) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000280)={0x30e, @tick, 0x0, {0xfe}}) 20:18:13 executing program 0: r0 = syz_io_uring_setup(0x3ff, &(0x7f0000000340), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000140)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f00000004c0)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff, 0xffffffffffffffff]}, 0x2) 20:18:13 executing program 3: clock_adjtime(0x0, &(0x7f0000002040)={0x8001}) 20:18:13 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TCSETSW(r0, 0x5413, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "888ac9ecf7dbb6ebd2d7c87f6ab0cb79637628"}) 20:18:13 executing program 0: r0 = syz_io_uring_setup(0x3ff, &(0x7f0000000340), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000140)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f00000004c0)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff, 0xffffffffffffffff]}, 0x2) 20:18:13 executing program 1: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x57, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x200000, 0x43) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000200)='./bus\x00', 0x0) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r1 = open(&(0x7f0000000480)='./bus\x00', 0x24000, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, 0x0) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x40d09) 20:18:13 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) poll(0x0, 0x0, 0x204) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 20:18:13 executing program 4: request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)='logon\x00', 0xfffffffffffffffe) 20:18:13 executing program 3: clock_adjtime(0x0, &(0x7f0000002040)={0x8001}) 20:18:13 executing program 2: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x42441) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000004c0)={0x0, 0x0, 0x0, 'queue0\x00'}) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a35704000000b6215dd33459"}}], 0xffffff01) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0x397, @tick, 0x0, {0x0, 0x2}}) 20:18:13 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r3 = socket(0x400000000000010, 0x3, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r2, 0x0, 0x10, 0x0, 0x8800) 20:18:13 executing program 1: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x57, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x200000, 0x43) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000200)='./bus\x00', 0x0) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r1 = open(&(0x7f0000000480)='./bus\x00', 0x24000, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, 0x0) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x40d09) 20:18:13 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0xf0, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@rand_addr=' \x01\x00', 0x0, 0x0, 0x0, 0x0, 0x2}, {@in6=@mcast2, 0x0, 0x33}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) 20:18:13 executing program 3: clock_adjtime(0x0, &(0x7f0000002040)={0x8001}) 20:18:13 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0xfffffffffffffff8, &(0x7f0000000100)={&(0x7f0000000200)={0x1c, 0x10, 0x701, 0x0, 0x0, {0xa}, [@typed={0x6, 0x1, 0x0, 0x0, @str}]}, 0x1c}}, 0x0) 20:18:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'lo\x00', &(0x7f0000000100)=@ethtool_cmd={0x28}}) 20:18:13 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000b40)=ANY=[], 0xa) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="2000000012005f0214f9f407000000000a", 0x11) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="00000031920bb2", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 20:18:13 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fgetxattr(r0, &(0x7f00000000c0)=@random={'user.', 'syztnl0\x00'}, 0x0, 0x0) 20:18:14 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) poll(0x0, 0x0, 0x204) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 20:18:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'lo\x00', &(0x7f0000000100)=@ethtool_cmd={0x28}}) 20:18:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xaf, &(0x7f0000000640)="f47970da7c2fd541e0656c5762306aa606a0c2a76e59b65fa78fb184da006cabbd58564cf09dcac5456d212e05d23391ff083d78ff122a776e08af2025580c72249ad2f5366f60b87a982a8066b10f8b85b47e770f548fd2e3c6a8323152fbeebdec6058daee7c23390ee132bd154c99fd3d69623481e1af603fc9d42b2f7173f23f843eb6669d9de930445756424b355d08c8786bf6e250deae7a6d8332607f93938fabe2e77eb4ff46d2b6acf330"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 20:18:14 executing program 3: clock_adjtime(0x0, &(0x7f0000002040)={0x8001}) 20:18:14 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x1, &(0x7f00000000c0)=0x0) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) io_submit(r2, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r0, 0x0, 0xff31}]) 20:18:14 executing program 1: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x57, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x200000, 0x43) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000200)='./bus\x00', 0x0) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r1 = open(&(0x7f0000000480)='./bus\x00', 0x24000, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, 0x0) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x40d09) 20:18:14 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) read$char_usb(r0, 0x0, 0x0) 20:18:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'lo\x00', &(0x7f0000000100)=@ethtool_cmd={0x28}}) 20:18:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'lo\x00', &(0x7f0000000100)=@ethtool_cmd={0x28}}) 20:18:14 executing program 2: mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) 20:18:14 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r4, 0x0) preadv(r3, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002", 0x1f) write$binfmt_misc(r1, &(0x7f00000000c0)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x84ffe0, 0x0) 20:18:14 executing program 0: r0 = openat$ptmx(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSIG(r0, 0x40045436, 0x3) 20:18:14 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) poll(0x0, 0x0, 0x204) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 20:18:14 executing program 2: r0 = socket(0x2, 0x803, 0xff) connect$unix(r0, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0xa) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(r0) 20:18:17 executing program 4: set_mempolicy(0x6003, &(0x7f0000000100)=0x2, 0x5) 20:18:17 executing program 0: unshare(0x20000400) r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x20000000, 0x0) ioctl$EVIOCGREP(r0, 0x40084504, &(0x7f0000000180)=""/4096) 20:18:17 executing program 1: futex(&(0x7f0000000000)=0x1, 0x88, 0x0, 0x0, 0x0, 0x0) 20:18:17 executing program 2: r0 = socket(0x2, 0x803, 0xff) connect$unix(r0, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0xa) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(r0) 20:18:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x1e28, &(0x7f0000000080), &(0x7f0000ff3000/0x3000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) r4 = open(&(0x7f0000000280)='./bus\x00', 0x4042, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x6000, @fd=r4, 0x0, 0x0}, 0x0) io_uring_enter(r1, 0x450c, 0x0, 0x0, 0x0, 0x34) 20:18:17 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x1b1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 20:18:17 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000d63000/0x3000)=nil, 0x4) 20:18:17 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/consoles\x00', 0x0, 0x0) read$eventfd(r0, &(0x7f00000001c0), 0x8) 20:18:17 executing program 2: r0 = socket(0x2, 0x803, 0xff) connect$unix(r0, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0xa) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(r0) 20:18:17 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001700), 0x0, &(0x7f0000001800)={[{@session={'session', 0x3d, 0x900}}]}) 20:18:17 executing program 3: r0 = socket(0x2, 0x3, 0x10) sendmmsg$unix(r0, &(0x7f0000003d40)=[{&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000340)=[{&(0x7f0000000080)='h', 0x1}], 0x1, &(0x7f0000000600)=[@rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}], 0x30}], 0x1, 0x200000d4) 20:18:17 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x1b1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 20:18:17 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040003000020001002002000000000000040000000000000000000", 0xffffffe5}], 0x2) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000680)="b8966b2224000000a588e1af1d800407103fc0d41a8565474cdb4b2769ce34faa33955e4e84cc5736422ddade344", 0x2e}], 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_io_uring_setup(0x6364, &(0x7f0000000900)={0x0, 0x8b49}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000800000/0x800000)=nil, 0x0, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000480)="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", 0x139}], 0x2) writev(r0, &(0x7f0000000400)=[{&(0x7f00000001c0)="87fb2ab5d0d5c733fff8c9ce5fc04ac367ceac5136a5866600db8d7175dae8100ef346263b9ff96f368fc45e9fa3ec9fe16dc96d604269b704090d826d926f469ea16b0660a0a2927c5c893c8057697ab3", 0x51}, {0x0}, {&(0x7f0000000140)="11d9595c5fbf66e8f917266c41f68e708f307dcaca2174953a9eec7389bf8b3c7b46639492bd4fa436113c3b485da3ba06e345", 0x33}, {&(0x7f00000026c0)}], 0x4) 20:18:17 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300), 0x41, 0x0) write$vga_arbiter(r0, &(0x7f0000000080)=@target={'target ', {'PCI:', '0', ':', '0', ':', '1', '.', '10'}}, 0x14) 20:18:17 executing program 2: r0 = socket(0x2, 0x803, 0xff) connect$unix(r0, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0xa) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(r0) 20:18:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x72, &(0x7f0000000440)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689c9c6a47312334c2a97ac2b7f0fb4aabebae8dc5dffbcd48a70502173d6efa56b60f48cf0c9d0989ecbbfc220bd2b39df9ad8d6b14910f4a869863009780dd6e673a0"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 20:18:17 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6641db6e0551832d303744e57e897094b15ba5d9e70400b1f1", 0x19}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x4a}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 20:18:17 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800009, 0x12, r0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000500), 0x90) 20:18:17 executing program 2: set_mempolicy(0x3, &(0x7f0000000440)=0x9, 0x1000) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x61}, {0x6}]}) 20:18:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x72, &(0x7f0000000440)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689c9c6a47312334c2a97ac2b7f0fb4aabebae8dc5dffbcd48a70502173d6efa56b60f48cf0c9d0989ecbbfc220bd2b39df9ad8d6b14910f4a869863009780dd6e673a0"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 20:18:17 executing program 0: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'ip6_vti0\x00'}) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) readahead(r2, 0x7cc0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000080)={@loopback={0xfec0ffff00000000, 0x300}, 0x0, r3}) r4 = socket$inet6(0xa, 0x2, 0x0) futex(&(0x7f0000000100)=0x1, 0x80, 0x1, &(0x7f0000000180), &(0x7f00000001c0), 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000080)={@loopback={0xfec0ffff00000000, 0x300}, 0x0, r5}) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r6, 0x407, 0x0) bind$inet(r7, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r6, 0x0, r7, 0x0, 0x2ffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f00000000c0)={@ipv4={'\x00', '\xff\xff', @private}, 0x6f, r5}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x45, r5}) 20:18:17 executing program 4: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast1={0xff, 0x5}, 0x80000000}, 0x1c) 20:18:17 executing program 1: set_mempolicy(0x2, &(0x7f0000000000)=0x1f, 0x6) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x3d}, {0x6}]}) [ 733.687491][ T25] audit: type=1326 audit(1619381897.586:4941): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29511 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 20:18:20 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x1b1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 20:18:20 executing program 2: unshare(0x8000400) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) futimesat(r0, 0x0, 0x0) 20:18:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x72, &(0x7f0000000440)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689c9c6a47312334c2a97ac2b7f0fb4aabebae8dc5dffbcd48a70502173d6efa56b60f48cf0c9d0989ecbbfc220bd2b39df9ad8d6b14910f4a869863009780dd6e673a0"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 20:18:20 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(r2) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@local, @in6=@loopback}, {@in6=@ipv4={'\x00', '\xff\xff', @broadcast}, 0x0, 0x32}, @in6=@dev, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'xts-aes-ce\x00'}}}]}, 0x138}, 0x1, 0x1400000000000000}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 20:18:20 executing program 1: r0 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f610500020c010a1f00ff050c10080008000b000a000000", 0x24}], 0x1}, 0x0) 20:18:20 executing program 0: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'ip6_vti0\x00'}) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) readahead(r2, 0x7cc0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000080)={@loopback={0xfec0ffff00000000, 0x300}, 0x0, r3}) r4 = socket$inet6(0xa, 0x2, 0x0) futex(&(0x7f0000000100)=0x1, 0x80, 0x1, &(0x7f0000000180), &(0x7f00000001c0), 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000080)={@loopback={0xfec0ffff00000000, 0x300}, 0x0, r5}) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r6, 0x407, 0x0) bind$inet(r7, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r6, 0x0, r7, 0x0, 0x2ffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f00000000c0)={@ipv4={'\x00', '\xff\xff', @private}, 0x6f, r5}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x45, r5}) 20:18:20 executing program 2: unshare(0x8000400) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) futimesat(r0, 0x0, 0x0) 20:18:20 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x317d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8090, 0xf}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) ptrace$cont(0x7, 0x0, 0x0, 0x0) r4 = perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x1, 0x3f, 0x0, 0x40, 0x0, 0x649, 0x40, 0x7, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, 0x0, 0x3481, 0x3f, 0x1, 0x2, 0x8f4, 0xfffffff8}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x6, 0xb2, 0x3, 0x0, 0x8000, 0x40, 0x4, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x6, 0x0, 0x40010, 0x4, 0x2, 0x6, 0x66, 0x0, 0xfff}, 0x0, 0xc, r4, 0x1) sendto$inet(r3, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0x9) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) exit_group(0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x4, 0x1010, 0xffffffffffffffff, 0xf9eae000) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r5, &(0x7f0000000180)=[{&(0x7f0000001400)=""/4100, 0x1004}], 0x1) 20:18:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x72, &(0x7f0000000440)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689c9c6a47312334c2a97ac2b7f0fb4aabebae8dc5dffbcd48a70502173d6efa56b60f48cf0c9d0989ecbbfc220bd2b39df9ad8d6b14910f4a869863009780dd6e673a0"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 20:18:20 executing program 2: unshare(0x8000400) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) futimesat(r0, 0x0, 0x0) 20:18:20 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0xea4, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f0000041000/0x2000)=nil, &(0x7f0000042000/0x7000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_STATX={0x15, 0x58ff346b9ab41012, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) 20:18:20 executing program 2: unshare(0x8000400) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) futimesat(r0, 0x0, 0x0) 20:18:23 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x1b1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 20:18:23 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') pselect6(0x40, &(0x7f00000000c0)={0x9}, 0x0, 0x0, 0x0, 0x0) 20:18:23 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0xea4, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f0000041000/0x2000)=nil, &(0x7f0000042000/0x7000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_STATX={0x15, 0x58ff346b9ab41012, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) 20:18:23 executing program 0: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'ip6_vti0\x00'}) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) readahead(r2, 0x7cc0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000080)={@loopback={0xfec0ffff00000000, 0x300}, 0x0, r3}) r4 = socket$inet6(0xa, 0x2, 0x0) futex(&(0x7f0000000100)=0x1, 0x80, 0x1, &(0x7f0000000180), &(0x7f00000001c0), 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000080)={@loopback={0xfec0ffff00000000, 0x300}, 0x0, r5}) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r6, 0x407, 0x0) bind$inet(r7, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r6, 0x0, r7, 0x0, 0x2ffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f00000000c0)={@ipv4={'\x00', '\xff\xff', @private}, 0x6f, r5}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x45, r5}) 20:18:23 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0xea4, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f0000041000/0x2000)=nil, &(0x7f0000042000/0x7000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_STATX={0x15, 0x58ff346b9ab41012, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) 20:18:23 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000)=0x1, 0x4) close_range(r0, 0xffffffffffffffff, 0x0) 20:18:23 executing program 2: semtimedop(0x0, &(0x7f00000003c0)=[{}, {}], 0x53, &(0x7f0000000400)={0x77359400}) 20:18:23 executing program 1: mq_open(&(0x7f0000000140)='@!\x00', 0x0, 0x0, &(0x7f00000001c0)) 20:18:23 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0xea4, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f0000041000/0x2000)=nil, &(0x7f0000042000/0x7000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_STATX={0x15, 0x58ff346b9ab41012, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) 20:18:23 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) recvmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0xa80c, 0x0}}], 0x58, 0x1200a, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000080)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="03070006000800fdff000b00000004000180"], 0x18}}, 0x0) 20:18:23 executing program 2: semtimedop(0x0, &(0x7f00000003c0)=[{}, {}], 0x53, &(0x7f0000000400)={0x77359400}) 20:18:23 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0xea4, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f0000041000/0x2000)=nil, &(0x7f0000042000/0x7000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_STATX={0x15, 0x58ff346b9ab41012, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) 20:18:26 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0xea4, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f0000041000/0x2000)=nil, &(0x7f0000042000/0x7000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_STATX={0x15, 0x58ff346b9ab41012, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) 20:18:26 executing program 0: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'ip6_vti0\x00'}) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) readahead(r2, 0x7cc0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000080)={@loopback={0xfec0ffff00000000, 0x300}, 0x0, r3}) r4 = socket$inet6(0xa, 0x2, 0x0) futex(&(0x7f0000000100)=0x1, 0x80, 0x1, &(0x7f0000000180), &(0x7f00000001c0), 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000080)={@loopback={0xfec0ffff00000000, 0x300}, 0x0, r5}) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r6, 0x407, 0x0) bind$inet(r7, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r6, 0x0, r7, 0x0, 0x2ffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f00000000c0)={@ipv4={'\x00', '\xff\xff', @private}, 0x6f, r5}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x45, r5}) 20:18:26 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0xea4, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f0000041000/0x2000)=nil, &(0x7f0000042000/0x7000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_STATX={0x15, 0x58ff346b9ab41012, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) 20:18:26 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) recvmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0xa80c, 0x0}}], 0x58, 0x1200a, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000080)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="03070006000800fdff000b00000004000180"], 0x18}}, 0x0) 20:18:26 executing program 2: semtimedop(0x0, &(0x7f00000003c0)=[{}, {}], 0x53, &(0x7f0000000400)={0x77359400}) 20:18:26 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000240)) 20:18:26 executing program 2: semtimedop(0x0, &(0x7f00000003c0)=[{}, {}], 0x53, &(0x7f0000000400)={0x77359400}) 20:18:26 executing program 5: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) ftruncate(r1, 0x200004) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) pwritev2(r1, &(0x7f0000000680)=[{0x0, 0x2}, {&(0x7f0000000200)="cc", 0x200004}], 0x2, 0x0, 0x0, 0x0) 20:18:26 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) recvmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0xa80c, 0x0}}], 0x58, 0x1200a, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000080)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="03070006000800fdff000b00000004000180"], 0x18}}, 0x0) 20:18:26 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8907, 0x0) 20:18:26 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @mcast1, 0x1}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000f59ffc)=0x4, 0x4) bind$inet6(r1, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x1c) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000f59ffc)=0x2e, 0x4) bind$inet6(r2, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x1c) r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000f59ffc)=0x4, 0x4) bind$inet6(r3, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r4, 0x1, 0xf, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r4, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x1c) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r5, 0x1, 0xf, &(0x7f0000f59ffc)=0x87, 0x4) bind$inet6(r5, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x1c) r6 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r6, &(0x7f0000000000)={0xa, 0xe20, 0x0, @empty}, 0x1c) r7 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r7, 0x1, 0xf, &(0x7f0000f59ffc)=0x4, 0x4) bind$inet6(r7, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x1c) r8 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r8, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r9 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r9, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @mcast2, 0x2}, 0x1c) r10 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r10, 0x1, 0xf, &(0x7f0000f59ffc)=0x4, 0x4) bind$inet6(r10, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x1c) r11 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r11, 0x1, 0xf, &(0x7f0000f59ffc)=0x4, 0x4) bind$inet6(r11, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x1c) 20:18:26 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0xe, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0x4240a543) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$addseals(r3, 0x409, 0xc) recvfrom(r4, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012584, 0x0, 0xfffffe53) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000900)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf!\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c!\x0f/\xb8o8\xb9\x8d\x19\xe2\xca\x01y\x83\xe7\ng\x87\xd930xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x3f, &(0x7f0000000600)=0x5, 0x4) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg(r0, &(0x7f0000000540)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=ANY=[@ANYBLOB="78010000000000000c0100000600000086e1da8c6c6996dae7bc2a28a0465cce43fca18b85a302e0a531234de8861ceb2450b349bcadf5cbab8ee2d444893341d361c3be02dd0d15726602a9db1de695788fb6e18ba0cc55364e32fdaa8372e2eb11efd734529a1eb24e043b337830988bbdc7c8842b371b3c5929cc7acd015b5df5670f4c736198bbfd598ad514193e4ac63d498acd5c4a84578de631b163ca910888e372bc2c1f2015215277504e296f8d41c82320916f2cbada3bb6f6aff5ee4e03bd6601b795a4bcfea53506e889e60ba5b14192b14e2828e3eab0414de1353ead884479b723769259c4631fb25121f65244899f5478c5fbaa46ab094a7f4caf6598ee5cdde340a306bb8877892087e41e95594914be9bcda433722ad20d6019e6c3a43a8ec635fcbf4d1b97b8f2267ce13030ddbd35acf5521d3fc305ff980dafdea8152ed83e4f02910f6b468000b0a3322e2adf3f22e9ac7bc1ffdeda5399afef60e247c9b248ce75771c1b63804af101aba33c214000000000000000130000000000ffff9d0f326d621da2a012563a853f960645b9592199bc79856e5bb6c9bb20b9d7bab2b9be6728986639c396e4e32155f500a0000000000000001901000004000000912bef5adac93ae673b02f793532dee55abc9edb0243aa05d77fe204b8ebfff7eb23708974b87157f7c8bf39eb9fe7ac9648f89e83dea82d1f26e7b5c504e1226d17cac80fcb1339b4b41e4ec6bc1d7397e15679c0964edd0029f8fc6083983eebf2acae23b87c94f683699d8831cd89002ab66ac75ea0ba40a7884b1fc516ec172b3fc39c778c6a766774142c000000e800000000000000"], 0x340}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000002a40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 20:18:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)={0x18, r2, 0xb15, 0x0, 0x0, {0x2}, [@HEADER={0x4}]}, 0x18}}, 0x0) 20:18:27 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000002780)={0x4af000, 0xfffffffd, 0x2, @thr={0x0, 0x0}}) 20:18:27 executing program 5: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) dup3(r1, r0, 0x0) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000400)="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", 0x1000}, {&(0x7f0000001400)="c1", 0x1}], 0x2) 20:18:27 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$SNAPSHOT_ATOMIC_RESTORE(r0, 0x541b) 20:18:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) dup(r0) recvmmsg(0xffffffffffffffff, &(0x7f0000003c40)=[{{0x0, 0x0, &(0x7f0000000740)=[{0x0}, {&(0x7f0000000200)=""/42, 0x2a}], 0x2}}], 0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000400)=ANY=[]) chdir(&(0x7f0000000340)='./file0\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x2000f200) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000240)={'bridge0\x00', &(0x7f00000001c0)=@ethtool_link_settings={0x4d, 0x3, 0x6, 0x4, 0x93, 0x0, 0x0, 0xb4, 0x0, 0x0, [0xfffffff7, 0x14a, 0x0, 0x2, 0x401, 0xfffffffd, 0x0, 0x6], [0x4, 0x4, 0x3]}}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x118) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, r3, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x15) 20:18:27 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @mcast1, 0x1}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000f59ffc)=0x4, 0x4) bind$inet6(r1, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x1c) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000f59ffc)=0x2e, 0x4) bind$inet6(r2, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x1c) r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000f59ffc)=0x4, 0x4) bind$inet6(r3, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r4, 0x1, 0xf, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r4, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x1c) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r5, 0x1, 0xf, &(0x7f0000f59ffc)=0x87, 0x4) bind$inet6(r5, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x1c) r6 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r6, &(0x7f0000000000)={0xa, 0xe20, 0x0, @empty}, 0x1c) r7 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r7, 0x1, 0xf, &(0x7f0000f59ffc)=0x4, 0x4) bind$inet6(r7, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x1c) r8 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r8, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r9 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r9, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @mcast2, 0x2}, 0x1c) r10 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r10, 0x1, 0xf, &(0x7f0000f59ffc)=0x4, 0x4) bind$inet6(r10, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x1c) r11 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r11, 0x1, 0xf, &(0x7f0000f59ffc)=0x4, 0x4) bind$inet6(r11, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x1c) 20:18:27 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x0, 0x11, r0, 0x0) setresuid(0xee01, 0xee01, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 20:18:27 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r3, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) [ 743.745308][T29733] ------------[ cut here ]------------ [ 743.750869][T29733] trying to isolate tail page [ 743.750958][T29733] WARNING: CPU: 1 PID: 29733 at mm/vmscan.c:1763 isolate_lru_page+0x360/0x370 [ 743.764646][T29733] Modules linked in: [ 743.768599][T29733] CPU: 1 PID: 29733 Comm: syz-executor.4 Not tainted 5.12.0-rc8-syzkaller #0 [ 743.777556][T29733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 743.787758][T29733] RIP: 0010:isolate_lru_page+0x360/0x370 [ 743.793596][T29733] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 4e 52 f2 ff 48 c7 c7 7b c3 3a 83 31 c0 e8 50 8e da ff <0f> 0b e9 01 fd ff ff e8 34 52 f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 743.813435][T29733] RSP: 0018:ffffc900011ffb28 EFLAGS: 00010246 [ 743.819601][T29733] RAX: 8c9a81ef75b4d700 RBX: 0000000000000001 RCX: 0000000000040000 [ 743.827605][T29733] RDX: ffffc90004be1000 RSI: 0000000000000a5e RDI: 0000000000000a5f [ 743.831769][T29732] new mount options do not match the existing superblock, will be ignored 20:18:27 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$SNAPSHOT_ATOMIC_RESTORE(r0, 0x541b) 20:18:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x21, 0xd9f, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0}) [ 743.835733][T29733] RBP: ffffea0004af0000 R08: ffffffff81293c7c R09: 0001ffff83a30cff [ 743.851077][T29732] new mount options do not match the existing superblock, will be ignored [ 743.852260][T29733] R10: 0000000000000002 R11: ffff8881346e3040 R12: ffffea0004af0040 [ 743.868755][T29733] R13: ffff88811ff16008 R14: ffffea0004af0048 R15: 0000000020001000 [ 743.876816][T29733] FS: 00007f7bc5d6d700(0000) GS:ffff888237d00000(0000) knlGS:0000000000000000 [ 743.885789][T29733] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 743.892392][T29733] CR2: 0000000000522030 CR3: 00000001326a5000 CR4: 00000000001506e0 [ 743.900448][T29733] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 743.908461][T29733] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 743.916487][T29733] Call Trace: [ 743.919776][T29733] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 743.926318][T29733] ? swapin_walk_pmd_entry+0x320/0x320 [ 743.931809][T29733] __walk_page_range+0x93f/0x10e0 [ 743.936900][T29733] walk_page_range+0x111/0x2e0 [ 743.941686][T29733] do_madvise+0x84e/0x1050 [ 743.946218][T29733] ? __schedule+0x427/0x5b0 [ 743.950746][T29733] ? __fpregs_load_activate+0x103/0x1b0 [ 743.956336][T29733] __x64_sys_madvise+0x5d/0x70 [ 743.961157][T29733] do_syscall_64+0x34/0x50 [ 743.965592][T29733] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 743.971621][T29733] RIP: 0033:0x4665f9 [ 743.975526][T29733] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 743.995378][T29733] RSP: 002b:00007f7bc5d6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 744.003807][T29733] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 744.011833][T29733] RDX: 0000000000000015 RSI: 0000000000600003 RDI: 0000000020000000 [ 744.019850][T29733] RBP: 00000000004bfbb9 R08: 0000000000000000 R09: 0000000000000000 [ 744.027880][T29733] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60 [ 744.035951][T29733] R13: 00007fff66d598af R14: 00007f7bc5d6d300 R15: 0000000000022000 [ 744.043959][T29733] ---[ end trace 635d2d37ea168445 ]--- [ 744.049474][T29733] ------------[ cut here ]------------ [ 744.054972][T29733] trying to isolate tail page [ 744.055086][T29733] WARNING: CPU: 1 PID: 29733 at mm/vmscan.c:1763 isolate_lru_page+0x360/0x370 [ 744.068624][T29733] Modules linked in: [ 744.072518][T29733] CPU: 1 PID: 29733 Comm: syz-executor.4 Tainted: G W 5.12.0-rc8-syzkaller #0 [ 744.082703][T29733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 744.092805][T29733] RIP: 0010:isolate_lru_page+0x360/0x370 [ 744.098525][T29733] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 4e 52 f2 ff 48 c7 c7 7b c3 3a 83 31 c0 e8 50 8e da ff <0f> 0b e9 01 fd ff ff e8 34 52 f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 744.118273][T29733] RSP: 0018:ffffc900011ffb28 EFLAGS: 00010246 [ 744.124414][T29733] RAX: 8c9a81ef75b4d700 RBX: 0000000000000001 RCX: 0000000000040000 [ 744.132603][T29733] RDX: ffffc90004be1000 RSI: 000000000003ffff RDI: 0000000000040000 [ 744.140606][T29733] RBP: ffffea0004af0000 R08: ffffffff81293c7c R09: 0001ffff83a30cff [ 744.148625][T29733] R10: 0000000000000002 R11: ffff8881346e3040 R12: ffffea0004af0080 [ 744.156638][T29733] R13: ffff88811ff16010 R14: ffffea0004af0088 R15: 0000000020002000 [ 744.164640][T29733] FS: 00007f7bc5d6d700(0000) GS:ffff888237d00000(0000) knlGS:0000000000000000 [ 744.173649][T29733] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 744.180335][T29733] CR2: 0000000000522030 CR3: 00000001326a5000 CR4: 00000000001506e0 [ 744.188428][T29733] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 744.196449][T29733] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 744.204514][T29733] Call Trace: [ 744.207820][T29733] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 744.214200][T29733] ? swapin_walk_pmd_entry+0x320/0x320 [ 744.219732][T29733] __walk_page_range+0x93f/0x10e0 [ 744.224805][T29733] walk_page_range+0x111/0x2e0 [ 744.229603][T29733] do_madvise+0x84e/0x1050 [ 744.234236][T29733] ? __schedule+0x427/0x5b0 [ 744.238794][T29733] ? __fpregs_load_activate+0x103/0x1b0 [ 744.244416][T29733] __x64_sys_madvise+0x5d/0x70 [ 744.249232][T29733] do_syscall_64+0x34/0x50 [ 744.253776][T29733] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 744.259716][T29733] RIP: 0033:0x4665f9 [ 744.263750][T29733] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 744.283419][T29733] RSP: 002b:00007f7bc5d6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 744.291869][T29733] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 744.299979][T29733] RDX: 0000000000000015 RSI: 0000000000600003 RDI: 0000000020000000 [ 744.308013][T29733] RBP: 00000000004bfbb9 R08: 0000000000000000 R09: 0000000000000000 [ 744.316040][T29733] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60 [ 744.324268][T29733] R13: 00007fff66d598af R14: 00007f7bc5d6d300 R15: 0000000000022000 [ 744.332299][T29733] ---[ end trace 635d2d37ea168446 ]--- [ 744.337781][T29733] ------------[ cut here ]------------ [ 744.343236][T29733] trying to isolate tail page [ 744.343352][T29733] WARNING: CPU: 1 PID: 29733 at mm/vmscan.c:1763 isolate_lru_page+0x360/0x370 [ 744.356918][T29733] Modules linked in: [ 744.360805][T29733] CPU: 1 PID: 29733 Comm: syz-executor.4 Tainted: G W 5.12.0-rc8-syzkaller #0 [ 744.370989][T29733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 744.381086][T29733] RIP: 0010:isolate_lru_page+0x360/0x370 [ 744.386764][T29733] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 4e 52 f2 ff 48 c7 c7 7b c3 3a 83 31 c0 e8 50 8e da ff <0f> 0b e9 01 fd ff ff e8 34 52 f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 744.406791][T29733] RSP: 0018:ffffc900011ffb28 EFLAGS: 00010246 [ 744.412872][T29733] RAX: 8c9a81ef75b4d700 RBX: 0000000000000001 RCX: 0000000000040000 [ 744.420900][T29733] RDX: ffffc90004be1000 RSI: 000000000003ffff RDI: 0000000000040000 [ 744.428938][T29733] RBP: ffffea0004af0000 R08: ffffffff81293c7c R09: 0001ffff83a30cff [ 744.437691][T29733] R10: 0000000000000002 R11: ffff8881346e3040 R12: ffffea0004af00c0 [ 744.445822][T29733] R13: ffff88811ff16018 R14: ffffea0004af00c8 R15: 0000000020003000 [ 744.453825][T29733] FS: 00007f7bc5d6d700(0000) GS:ffff888237d00000(0000) knlGS:0000000000000000 [ 744.462934][T29733] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 744.469711][T29733] CR2: 0000000000522030 CR3: 00000001326a5000 CR4: 00000000001506e0 [ 744.477733][T29733] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 744.485748][T29733] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 744.493752][T29733] Call Trace: [ 744.497070][T29733] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 744.503410][T29733] ? swapin_walk_pmd_entry+0x320/0x320 [ 744.508930][T29733] __walk_page_range+0x93f/0x10e0 [ 744.513967][T29733] walk_page_range+0x111/0x2e0 [ 744.518790][T29733] do_madvise+0x84e/0x1050 [ 744.523219][T29733] ? __schedule+0x427/0x5b0 [ 744.527768][T29733] ? __fpregs_load_activate+0x103/0x1b0 [ 744.533398][T29733] __x64_sys_madvise+0x5d/0x70 [ 744.538193][T29733] do_syscall_64+0x34/0x50 [ 744.542712][T29733] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 744.548634][T29733] RIP: 0033:0x4665f9 [ 744.552546][T29733] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 744.572203][T29733] RSP: 002b:00007f7bc5d6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 744.580745][T29733] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 744.588747][T29733] RDX: 0000000000000015 RSI: 0000000000600003 RDI: 0000000020000000 [ 744.596750][T29733] RBP: 00000000004bfbb9 R08: 0000000000000000 R09: 0000000000000000 [ 744.604759][T29733] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60 [ 744.612753][T29733] R13: 00007fff66d598af R14: 00007f7bc5d6d300 R15: 0000000000022000 [ 744.620765][T29733] ---[ end trace 635d2d37ea168447 ]--- [ 744.626437][T29733] ------------[ cut here ]------------ [ 744.631899][T29733] trying to isolate tail page [ 744.632034][T29733] WARNING: CPU: 1 PID: 29733 at mm/vmscan.c:1763 isolate_lru_page+0x360/0x370 [ 744.645713][T29733] Modules linked in: [ 744.649604][T29733] CPU: 1 PID: 29733 Comm: syz-executor.4 Tainted: G W 5.12.0-rc8-syzkaller #0 [ 744.659800][T29733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 744.669970][T29733] RIP: 0010:isolate_lru_page+0x360/0x370 [ 744.675703][T29733] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 4e 52 f2 ff 48 c7 c7 7b c3 3a 83 31 c0 e8 50 8e da ff <0f> 0b e9 01 fd ff ff e8 34 52 f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 744.695444][T29733] RSP: 0018:ffffc900011ffb28 EFLAGS: 00010246 [ 744.701600][T29733] RAX: 8c9a81ef75b4d700 RBX: 0000000000000001 RCX: 0000000000040000 [ 744.709725][T29733] RDX: ffffc90004be1000 RSI: 000000000003ffff RDI: 0000000000040000 [ 744.717744][T29733] RBP: ffffea0004af0000 R08: ffffffff81293c7c R09: 0001ffff83a30cff [ 744.725766][T29733] R10: 0000000000000002 R11: ffff8881346e3040 R12: ffffea0004af0100 [ 744.733759][T29733] R13: ffff88811ff16020 R14: ffffea0004af0108 R15: 0000000020004000 [ 744.741787][T29733] FS: 00007f7bc5d6d700(0000) GS:ffff888237d00000(0000) knlGS:0000000000000000 [ 744.750800][T29733] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 744.757422][T29733] CR2: 0000000000522030 CR3: 00000001326a5000 CR4: 00000000001506e0 [ 744.765469][T29733] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 744.773446][T29733] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 744.781517][T29733] Call Trace: [ 744.784831][T29733] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 744.791171][T29733] ? swapin_walk_pmd_entry+0x320/0x320 [ 744.796725][T29733] __walk_page_range+0x93f/0x10e0 [ 744.801848][T29733] walk_page_range+0x111/0x2e0 [ 744.806757][T29733] do_madvise+0x84e/0x1050 [ 744.811195][T29733] ? __schedule+0x427/0x5b0 [ 744.815762][T29733] ? __fpregs_load_activate+0x103/0x1b0 [ 744.821418][T29733] __x64_sys_madvise+0x5d/0x70 [ 744.826248][T29733] do_syscall_64+0x34/0x50 [ 744.830679][T29733] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 744.836587][T29733] RIP: 0033:0x4665f9 [ 744.840567][T29733] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 744.860304][T29733] RSP: 002b:00007f7bc5d6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 744.868762][T29733] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 744.876880][T29733] RDX: 0000000000000015 RSI: 0000000000600003 RDI: 0000000020000000 [ 744.884971][T29733] RBP: 00000000004bfbb9 R08: 0000000000000000 R09: 0000000000000000 [ 744.892971][T29733] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60 [ 744.901016][T29733] R13: 00007fff66d598af R14: 00007f7bc5d6d300 R15: 0000000000022000 [ 744.909044][T29733] ---[ end trace 635d2d37ea168448 ]--- [ 744.914506][T29733] ------------[ cut here ]------------ [ 744.919985][T29733] trying to isolate tail page [ 744.920142][T29733] WARNING: CPU: 1 PID: 29733 at mm/vmscan.c:1763 isolate_lru_page+0x360/0x370 [ 744.933767][T29733] Modules linked in: [ 744.937709][T29733] CPU: 1 PID: 29733 Comm: syz-executor.4 Tainted: G W 5.12.0-rc8-syzkaller #0 [ 744.948060][T29733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 744.958499][T29733] RIP: 0010:isolate_lru_page+0x360/0x370 [ 744.964196][T29733] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 4e 52 f2 ff 48 c7 c7 7b c3 3a 83 31 c0 e8 50 8e da ff <0f> 0b e9 01 fd ff ff e8 34 52 f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 744.983853][T29733] RSP: 0018:ffffc900011ffb28 EFLAGS: 00010246 [ 744.990022][T29733] RAX: 8c9a81ef75b4d700 RBX: 0000000000000001 RCX: 0000000000040000 [ 744.998108][T29733] RDX: ffffc90004be1000 RSI: 000000000003ffff RDI: 0000000000040000 [ 745.006121][T29733] RBP: ffffea0004af0000 R08: ffffffff81293c7c R09: 0001ffff83a30cff [ 745.016731][T29733] R10: 0000000000000002 R11: ffff8881346e3040 R12: ffffea0004af0140 [ 745.024824][T29733] R13: ffff88811ff16028 R14: ffffea0004af0148 R15: 0000000020005000 [ 745.032916][T29733] FS: 00007f7bc5d6d700(0000) GS:ffff888237d00000(0000) knlGS:0000000000000000 [ 745.041888][T29733] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 745.048526][T29733] CR2: 0000000000522030 CR3: 00000001326a5000 CR4: 00000000001506e0 [ 745.056548][T29733] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 745.064542][T29733] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 745.072565][T29733] Call Trace: [ 745.075917][T29733] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 745.082366][T29733] ? swapin_walk_pmd_entry+0x320/0x320 [ 745.087866][T29733] __walk_page_range+0x93f/0x10e0 [ 745.092906][T29733] walk_page_range+0x111/0x2e0 [ 745.097702][T29733] do_madvise+0x84e/0x1050 [ 745.102174][T29733] ? __schedule+0x427/0x5b0 [ 745.106722][T29733] ? __fpregs_load_activate+0x103/0x1b0 [ 745.112324][T29733] __x64_sys_madvise+0x5d/0x70 [ 745.117138][T29733] do_syscall_64+0x34/0x50 [ 745.121601][T29733] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 745.127539][T29733] RIP: 0033:0x4665f9 [ 745.131439][T29733] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 745.151095][T29733] RSP: 002b:00007f7bc5d6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 745.159721][T29733] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 745.167725][T29733] RDX: 0000000000000015 RSI: 0000000000600003 RDI: 0000000020000000 [ 745.175813][T29733] RBP: 00000000004bfbb9 R08: 0000000000000000 R09: 0000000000000000 [ 745.183922][T29733] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60 [ 745.191937][T29733] R13: 00007fff66d598af R14: 00007f7bc5d6d300 R15: 0000000000022000 [ 745.199976][T29733] ---[ end trace 635d2d37ea168449 ]--- [ 745.205468][T29733] ------------[ cut here ]------------ [ 745.210926][T29733] trying to isolate tail page [ 745.211041][T29733] WARNING: CPU: 1 PID: 29733 at mm/vmscan.c:1763 isolate_lru_page+0x360/0x370 [ 745.224714][T29733] Modules linked in: [ 745.228635][T29733] CPU: 1 PID: 29733 Comm: syz-executor.4 Tainted: G W 5.12.0-rc8-syzkaller #0 [ 745.238839][T29733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 745.248949][T29733] RIP: 0010:isolate_lru_page+0x360/0x370 [ 745.254696][T29733] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 4e 52 f2 ff 48 c7 c7 7b c3 3a 83 31 c0 e8 50 8e da ff <0f> 0b e9 01 fd ff ff e8 34 52 f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 745.274360][T29733] RSP: 0018:ffffc900011ffb28 EFLAGS: 00010246 [ 745.280644][T29733] RAX: 8c9a81ef75b4d700 RBX: 0000000000000001 RCX: 0000000000040000 [ 745.288740][T29733] RDX: ffffc90004be1000 RSI: 000000000003ffff RDI: 0000000000040000 [ 745.296764][T29733] RBP: ffffea0004af0000 R08: ffffffff81293c7c R09: 0001ffff83a30cff [ 745.304777][T29733] R10: 0000000000000002 R11: ffff8881346e3040 R12: ffffea0004af0180 [ 745.312761][T29733] R13: ffff88811ff16030 R14: ffffea0004af0188 R15: 0000000020006000 [ 745.320801][T29733] FS: 00007f7bc5d6d700(0000) GS:ffff888237d00000(0000) knlGS:0000000000000000 [ 745.329783][T29733] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 745.336395][T29733] CR2: 0000000000522030 CR3: 00000001326a5000 CR4: 00000000001506e0 [ 745.344386][T29733] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 745.352433][T29733] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 745.360563][T29733] Call Trace: [ 745.363856][T29733] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 745.370381][T29733] ? swapin_walk_pmd_entry+0x320/0x320 [ 745.375878][T29733] __walk_page_range+0x93f/0x10e0 [ 745.380965][T29733] walk_page_range+0x111/0x2e0 [ 745.385770][T29733] do_madvise+0x84e/0x1050 [ 745.390222][T29733] ? __schedule+0x427/0x5b0 [ 745.394733][T29733] ? __fpregs_load_activate+0x103/0x1b0 [ 745.400377][T29733] __x64_sys_madvise+0x5d/0x70 [ 745.405282][T29733] do_syscall_64+0x34/0x50 [ 745.409752][T29733] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 745.415685][T29733] RIP: 0033:0x4665f9 [ 745.419615][T29733] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 745.439331][T29733] RSP: 002b:00007f7bc5d6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 745.447913][T29733] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 745.455914][T29733] RDX: 0000000000000015 RSI: 0000000000600003 RDI: 0000000020000000 [ 745.463953][T29733] RBP: 00000000004bfbb9 R08: 0000000000000000 R09: 0000000000000000 [ 745.472577][T29733] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60 [ 745.480798][T29733] R13: 00007fff66d598af R14: 00007f7bc5d6d300 R15: 0000000000022000 [ 745.488878][T29733] ---[ end trace 635d2d37ea16844a ]--- [ 745.494339][T29733] ------------[ cut here ]------------ [ 745.499811][T29733] trying to isolate tail page [ 745.500045][T29733] WARNING: CPU: 1 PID: 29733 at mm/vmscan.c:1763 isolate_lru_page+0x360/0x370 [ 745.513710][T29733] Modules linked in: [ 745.517634][T29733] CPU: 1 PID: 29733 Comm: syz-executor.4 Tainted: G W 5.12.0-rc8-syzkaller #0 [ 745.527851][T29733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 745.537964][T29733] RIP: 0010:isolate_lru_page+0x360/0x370 [ 745.543627][T29733] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 4e 52 f2 ff 48 c7 c7 7b c3 3a 83 31 c0 e8 50 8e da ff <0f> 0b e9 01 fd ff ff e8 34 52 f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 745.563539][T29733] RSP: 0018:ffffc900011ffb28 EFLAGS: 00010246 [ 745.570050][T29733] RAX: 8c9a81ef75b4d700 RBX: 0000000000000001 RCX: 0000000000040000 [ 745.578056][T29733] RDX: ffffc90004be1000 RSI: 000000000003ffff RDI: 0000000000040000 [ 745.586079][T29733] RBP: ffffea0004af0000 R08: ffffffff81293c7c R09: 0001ffff83a30cff [ 745.594132][T29733] R10: 0000000000000002 R11: ffff8881346e3040 R12: ffffea0004af01c0 [ 745.602123][T29733] R13: ffff88811ff16038 R14: ffffea0004af01c8 R15: 0000000020007000 [ 745.610137][T29733] FS: 00007f7bc5d6d700(0000) GS:ffff888237d00000(0000) knlGS:0000000000000000 [ 745.619162][T29733] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 745.626230][T29733] CR2: 0000000000522030 CR3: 00000001326a5000 CR4: 00000000001506e0 [ 745.634212][T29733] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 745.642207][T29733] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 745.650213][T29733] Call Trace: [ 745.653606][T29733] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 745.660158][T29733] ? swapin_walk_pmd_entry+0x320/0x320 [ 745.665646][T29733] __walk_page_range+0x93f/0x10e0 [ 745.670903][T29733] walk_page_range+0x111/0x2e0 [ 745.675676][T29733] do_madvise+0x84e/0x1050 [ 745.680125][T29733] ? __schedule+0x427/0x5b0 [ 745.684641][T29733] ? __fpregs_load_activate+0x103/0x1b0 [ 745.690253][T29733] __x64_sys_madvise+0x5d/0x70 [ 745.695117][T29733] do_syscall_64+0x34/0x50 [ 745.699548][T29733] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 745.705488][T29733] RIP: 0033:0x4665f9 [ 745.709532][T29733] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 745.729205][T29733] RSP: 002b:00007f7bc5d6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 745.737895][T29733] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 745.745930][T29733] RDX: 0000000000000015 RSI: 0000000000600003 RDI: 0000000020000000 [ 745.754021][T29733] RBP: 00000000004bfbb9 R08: 0000000000000000 R09: 0000000000000000 [ 745.762031][T29733] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60 [ 745.770094][T29733] R13: 00007fff66d598af R14: 00007f7bc5d6d300 R15: 0000000000022000 [ 745.778155][T29733] ---[ end trace 635d2d37ea16844b ]--- [ 745.783621][T29733] ------------[ cut here ]------------ [ 745.789091][T29733] trying to isolate tail page [ 745.789398][T29733] WARNING: CPU: 1 PID: 29733 at mm/vmscan.c:1763 isolate_lru_page+0x360/0x370 [ 745.803106][T29733] Modules linked in: [ 745.807023][T29733] CPU: 1 PID: 29733 Comm: syz-executor.4 Tainted: G W 5.12.0-rc8-syzkaller #0 [ 745.817246][T29733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 745.827460][T29733] RIP: 0010:isolate_lru_page+0x360/0x370 [ 745.833112][T29733] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 4e 52 f2 ff 48 c7 c7 7b c3 3a 83 31 c0 e8 50 8e da ff <0f> 0b e9 01 fd ff ff e8 34 52 f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 745.852883][T29733] RSP: 0018:ffffc900011ffb28 EFLAGS: 00010246 [ 745.858989][T29733] RAX: 8c9a81ef75b4d700 RBX: 0000000000000001 RCX: 0000000000040000 [ 745.867098][T29733] RDX: ffffc90004be1000 RSI: 000000000003ffff RDI: 0000000000040000 [ 745.875169][T29733] RBP: ffffea0004b46600 R08: ffffffff81293c7c R09: 0001ffff83a30cff [ 745.883163][T29733] R10: 0000000000000002 R11: ffff8881346e3040 R12: ffffea0004b46640 [ 745.891588][T29733] R13: ffff88811ff16048 R14: ffffea0004b46648 R15: 0000000020009000 [ 745.899717][T29733] FS: 00007f7bc5d6d700(0000) GS:ffff888237d00000(0000) knlGS:0000000000000000 [ 745.908723][T29733] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 745.915374][T29733] CR2: 0000000000522030 CR3: 00000001326a5000 CR4: 00000000001506e0 [ 745.923561][T29733] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 745.931657][T29733] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 745.939734][T29733] Call Trace: [ 745.943026][T29733] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 745.949413][T29733] ? swapin_walk_pmd_entry+0x320/0x320 [ 745.955607][T29733] __walk_page_range+0x93f/0x10e0 [ 745.960652][T29733] walk_page_range+0x111/0x2e0 [ 745.965440][T29733] do_madvise+0x84e/0x1050 [ 745.969858][T29733] ? __schedule+0x427/0x5b0 [ 745.974365][T29733] ? __fpregs_load_activate+0x103/0x1b0 [ 745.979949][T29733] __x64_sys_madvise+0x5d/0x70 [ 745.984817][T29733] do_syscall_64+0x34/0x50 [ 745.989251][T29733] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 745.995196][T29733] RIP: 0033:0x4665f9 [ 745.999083][T29733] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 746.018768][T29733] RSP: 002b:00007f7bc5d6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 746.027271][T29733] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 746.035304][T29733] RDX: 0000000000000015 RSI: 0000000000600003 RDI: 0000000020000000 [ 746.043306][T29733] RBP: 00000000004bfbb9 R08: 0000000000000000 R09: 0000000000000000 [ 746.051373][T29733] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60 [ 746.059372][T29733] R13: 00007fff66d598af R14: 00007f7bc5d6d300 R15: 0000000000022000 [ 746.067374][T29733] ---[ end trace 635d2d37ea16844c ]--- [ 746.072844][T29733] ------------[ cut here ]------------ [ 746.078322][T29733] trying to isolate tail page [ 746.078502][T29733] WARNING: CPU: 1 PID: 29733 at mm/vmscan.c:1763 isolate_lru_page+0x360/0x370 [ 746.092330][T29733] Modules linked in: [ 746.096261][T29733] CPU: 1 PID: 29733 Comm: syz-executor.4 Tainted: G W 5.12.0-rc8-syzkaller #0 [ 746.106552][T29733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 746.116727][T29733] RIP: 0010:isolate_lru_page+0x360/0x370 [ 746.122594][T29733] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 4e 52 f2 ff 48 c7 c7 7b c3 3a 83 31 c0 e8 50 8e da ff <0f> 0b e9 01 fd ff ff e8 34 52 f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 746.142335][T29733] RSP: 0018:ffffc900011ffb28 EFLAGS: 00010246 [ 746.148459][T29733] RAX: 8c9a81ef75b4d700 RBX: 0000000000000001 RCX: 0000000000040000 [ 746.156508][T29733] RDX: ffffc90004be1000 RSI: 000000000003ffff RDI: 0000000000040000 [ 746.164530][T29733] RBP: ffffea0004b46600 R08: ffffffff81293c7c R09: 0001ffff83a30cff [ 746.172564][T29733] R10: 0000000000000002 R11: ffff8881346e3040 R12: ffffea0004b46680 [ 746.180661][T29733] R13: ffff88811ff16050 R14: ffffea0004b46688 R15: 000000002000a000 [ 746.188737][T29733] FS: 00007f7bc5d6d700(0000) GS:ffff888237d00000(0000) knlGS:0000000000000000 [ 746.198555][T29733] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 746.205189][T29733] CR2: 0000000000522030 CR3: 00000001326a5000 CR4: 00000000001506e0 [ 746.213263][T29733] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 746.221289][T29733] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 746.229401][T29733] Call Trace: [ 746.232702][T29733] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 746.239091][T29733] ? swapin_walk_pmd_entry+0x320/0x320 [ 746.244611][T29733] __walk_page_range+0x93f/0x10e0 [ 746.249641][T29733] walk_page_range+0x111/0x2e0 [ 746.254494][T29733] do_madvise+0x84e/0x1050 [ 746.258954][T29733] ? __schedule+0x427/0x5b0 [ 746.263494][T29733] ? __fpregs_load_activate+0x103/0x1b0 [ 746.269086][T29733] __x64_sys_madvise+0x5d/0x70 [ 746.273997][T29733] do_syscall_64+0x34/0x50 [ 746.278654][T29733] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 746.284973][T29733] RIP: 0033:0x4665f9 [ 746.288875][T29733] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 746.308529][T29733] RSP: 002b:00007f7bc5d6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 746.317003][T29733] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 746.325043][T29733] RDX: 0000000000000015 RSI: 0000000000600003 RDI: 0000000020000000 [ 746.333045][T29733] RBP: 00000000004bfbb9 R08: 0000000000000000 R09: 0000000000000000 [ 746.341042][T29733] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60 [ 746.349182][T29733] R13: 00007fff66d598af R14: 00007f7bc5d6d300 R15: 0000000000022000 [ 746.357199][T29733] ---[ end trace 635d2d37ea16844d ]--- [ 746.362714][T29733] ------------[ cut here ]------------ [ 746.368181][T29733] trying to isolate tail page [ 746.368264][T29733] WARNING: CPU: 1 PID: 29733 at mm/vmscan.c:1763 isolate_lru_page+0x360/0x370 [ 746.381873][T29733] Modules linked in: [ 746.385820][T29733] CPU: 1 PID: 29733 Comm: syz-executor.4 Tainted: G W 5.12.0-rc8-syzkaller #0 [ 746.396015][T29733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 746.406151][T29733] RIP: 0010:isolate_lru_page+0x360/0x370 [ 746.411821][T29733] Code: ff 48 ff cd 49 89 ed e9 a3 fe ff ff 49 ff cd 4d 89 ee e9 d3 fe ff ff e8 4e 52 f2 ff 48 c7 c7 7b c3 3a 83 31 c0 e8 50 8e da ff <0f> 0b e9 01 fd ff ff e8 34 52 f2 ff 0f 0b 66 90 55 41 57 41 56 41 [ 746.431907][T29733] RSP: 0018:ffffc900011ffb28 EFLAGS: 00010246 [ 746.438090][T29733] RAX: 8c9a81ef75b4d700 RBX: 0000000000000001 RCX: 0000000000040000 [ 746.446125][T29733] RDX: ffffc90004be1000 RSI: 000000000003ffff RDI: 0000000000040000 [ 746.454258][T29733] RBP: ffffea0004b46600 R08: ffffffff81293c7c R09: 0001ffff83a30cff [ 746.462284][T29733] R10: 0000000000000002 R11: ffff8881346e3040 R12: ffffea0004b466c0 [ 746.470399][T29733] R13: ffff88811ff16058 R14: ffffea0004b466c8 R15: 000000002000b000 [ 746.478526][T29733] FS: 00007f7bc5d6d700(0000) GS:ffff888237d00000(0000) knlGS:0000000000000000 [ 746.487597][T29733] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 746.494193][T29733] CR2: 0000000000522030 CR3: 00000001326a5000 CR4: 00000000001506e0 [ 746.502217][T29733] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 746.510510][T29733] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 746.518518][T29733] Call Trace: [ 746.521809][T29733] madvise_cold_or_pageout_pte_range+0x4b1/0x690 [ 746.528208][T29733] ? swapin_walk_pmd_entry+0x320/0x320 [ 746.533745][T29733] __walk_page_range+0x93f/0x10e0 [ 746.538869][T29733] walk_page_range+0x111/0x2e0 [ 746.543667][T29733] do_madvise+0x84e/0x1050 [ 746.548124][T29733] ? __schedule+0x427/0x5b0 [ 746.552701][T29733] ? __fpregs_load_activate+0x103/0x1b0 [ 746.558268][T29733] __x64_sys_madvise+0x5d/0x70 [ 746.563141][T29733] do_syscall_64+0x34/0x50 [ 746.567588][T29733] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 746.573541][T29733] RIP: 0033:0x4665f9 [ 746.577481][T29733] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 746.597174][T29733] RSP: 002b:00007f7bc5d6d188 EFLAGS: 00000246 ORIG_RAX: 000000000000001c 20:18:28 executing program 1: r0 = syz_io_uring_setup(0x2de5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_TIMEOUT_REMOVE, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_POLL_REMOVE, 0x7fff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) 20:18:28 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/vmallocinfo\x00', 0x0, 0x0) r1 = epoll_create(0x7) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 20:18:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_misc(r2, &(0x7f0000000100)=ANY=[], 0x4240a2a0) r4 = socket$packet(0x11, 0x2, 0x300) r5 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r5, 0x0, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB='{'], 0x1) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000140)=0xc) bind$packet(r4, &(0x7f0000000100)={0x11, 0x4, r6, 0x1, 0x0, 0x6, @dev}, 0x14) splice(r1, 0x0, r3, 0x0, 0x193ff, 0x0) 20:18:30 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in=@multicast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in, 0x0, 0x6c}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, 0x1, 0x1}}, 0xf8}}, 0x0) 20:18:30 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7a}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x78, &(0x7f0000000180)="c4c691019919da078a0098d1e0a593b040f710e7d5b925c099710cb6422ec536070ff7ae78886cb6508e094cf05f7512668917458e9f9694c0585fe8411e858d5f2eb3b53dd3d8f71b1cdfcc5b2af289981079bb6fc3ec9499e3c7d0720446f2e2bebaf9e44e717d90ebadaa689a7a2535e4b983142740cb"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 20:18:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_misc(r2, &(0x7f0000000100)=ANY=[], 0x4240a2a0) r4 = socket$packet(0x11, 0x2, 0x300) r5 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r5, 0x0, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB='{'], 0x1) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000140)=0xc) bind$packet(r4, &(0x7f0000000100)={0x11, 0x4, r6, 0x1, 0x0, 0x6, @dev}, 0x14) splice(r1, 0x0, r3, 0x0, 0x193ff, 0x0) [ 746.605660][T29733] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 746.613739][T29733] RDX: 0000000000000015 RSI: 0000000000600003 RDI: 0000000020000000 [ 746.621773][T29733] RBP: 00000000004bfbb9 R08: 0000000000000000 R09: 0000000000000000 [ 746.629820][T29733] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60 [ 746.637959][T29733] R13: 00007fff66d598af R14: 00007f7bc5d6d300 R15: 0000000000022000 [ 746.645985][T29733] ---[ end trace 635d2d37ea16844e ]--- 20:18:30 executing program 2: set_mempolicy(0x1, &(0x7f00000000c0)=0x5, 0x3) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x15}, {0x6}]}) 20:18:30 executing program 0: perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r0, &(0x7f0000000cc0)=""/4092, 0xffc) getdents(r0, 0x0, 0x0) 20:18:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0xee00) r2 = semget$private(0x0, 0x7, 0x0) semctl$IPC_RMID(r2, 0x0, 0x10) 20:18:30 executing program 3: process_vm_writev(0x0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/249, 0xf9}, {&(0x7f0000000200)=""/203, 0xcb}, {0x0, 0x10000000000000}, {&(0x7f0000000340)=""/62, 0x3e}], 0x4, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/137, 0x89}, {&(0x7f0000000580)=""/54, 0x36}, {&(0x7f00000005c0)=""/161, 0xa1}, {&(0x7f00000006c0)=""/173, 0xad}], 0x4, 0x0) 20:18:30 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="82bb217e00e3a45c000000000000006f57bc49e397ad702deca4322fbe811046c19041c316de41fb1f7531c53abb4f2a8ce9003ee3e0b1b0b5133b07e999aa1cc669f0ca8afcbbfc5b6ad84462ae37c9962387110a79d824054c029e7049257931cef4bd8d46711caa86fb122887b70ccbf7b7caebeb896b04000000c85fcb3961f1d12791c364bcee9f80a5b2e228b11bebbf997c8e6a6723bdd1b6005f4fa82689da02daaef3d7e2ccaa7d37919d000000c76427c554dad01aac9eef731226ffc8e2d059849f76a560d675f3888cf77976", 0xd2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:18:30 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x13, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x1b, &(0x7f0000000000)={@dev}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r3, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/115, 0x73}], 0x1, 0x2, 0x0) [ 746.723426][ T25] audit: type=1326 audit(1619381910.616:4942): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29768 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 20:18:30 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x13, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x1b, &(0x7f0000000000)={@dev}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r3, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/115, 0x73}], 0x1, 0x2, 0x0) 20:18:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000000), 0x4) 20:18:30 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0xfff, 0x81) syz_io_uring_setup(0x39a9, &(0x7f00000002c0)={0x0, 0x0, 0x20}, &(0x7f0000fdc000/0x3000)=nil, &(0x7f0000a57000/0x3000)=nil, &(0x7f00000000c0), &(0x7f0000000200)) 20:18:30 executing program 2: set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x4) set_mempolicy(0xa002, &(0x7f0000000140)=0x100000001, 0x3f) 20:18:30 executing program 3: set_mempolicy(0x1, 0x0, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) 20:18:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_misc(r2, &(0x7f0000000100)=ANY=[], 0x4240a2a0) r4 = socket$packet(0x11, 0x2, 0x300) r5 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r5, 0x0, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB='{'], 0x1) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000140)=0xc) bind$packet(r4, &(0x7f0000000100)={0x11, 0x4, r6, 0x1, 0x0, 0x6, @dev}, 0x14) splice(r1, 0x0, r3, 0x0, 0x193ff, 0x0) 20:18:31 executing program 4: r0 = fork() ptrace(0x10, r0) r1 = fork() ptrace(0x10, r1) r2 = fork() ptrace(0x10, r2) wait4(r2, 0x0, 0x8, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 20:18:31 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x13, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x1b, &(0x7f0000000000)={@dev}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r3, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/115, 0x73}], 0x1, 0x2, 0x0) 20:18:31 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="82bb217e00e3a45c000000000000006f57bc49e397ad702deca4322fbe811046c19041c316de41fb1f7531c53abb4f2a8ce9003ee3e0b1b0b5133b07e999aa1cc669f0ca8afcbbfc5b6ad84462ae37c9962387110a79d824054c029e7049257931cef4bd8d46711caa86fb122887b70ccbf7b7caebeb896b04000000c85fcb3961f1d12791c364bcee9f80a5b2e228b11bebbf997c8e6a6723bdd1b6005f4fa82689da02daaef3d7e2ccaa7d37919d000000c76427c554dad01aac9eef731226ffc8e2d059849f76a560d675f3888cf77976", 0xd2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:18:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) poll(&(0x7f0000000000)=[{r0}, {}], 0x2, 0x1) 20:18:31 executing program 3: set_mempolicy(0x1, 0x0, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) 20:18:31 executing program 3: set_mempolicy(0x1, 0x0, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) 20:18:31 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x13, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x1b, &(0x7f0000000000)={@dev}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r3, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/115, 0x73}], 0x1, 0x2, 0x0) 20:18:31 executing program 2: unshare(0x400) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = timerfd_create(0x0, 0x0) timerfd_settime(r1, 0x0, &(0x7f0000000300)={{}, {0x0, 0x3938700}}, &(0x7f00000002c0)) 20:18:31 executing program 3: set_mempolicy(0x1, 0x0, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) 20:18:31 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) bind$inet(r0, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) 20:18:31 executing program 3: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000340)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') open(&(0x7f0000000180)='./file0\x00', 0x66440, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0x82) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0x82) unlink(&(0x7f0000001540)='./file0\x00') sendfile(r3, r2, 0x0, 0xa198) sendfile(r1, r0, 0x0, 0xa198) 20:18:32 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_misc(r2, &(0x7f0000000100)=ANY=[], 0x4240a2a0) r4 = socket$packet(0x11, 0x2, 0x300) r5 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r5, 0x0, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB='{'], 0x1) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000140)=0xc) bind$packet(r4, &(0x7f0000000100)={0x11, 0x4, r6, 0x1, 0x0, 0x6, @dev}, 0x14) splice(r1, 0x0, r3, 0x0, 0x193ff, 0x0) 20:18:32 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000400)={&(0x7f00000000c0)={0x2, 0x4e21, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000180)=[@hopopts={{0x18}}, @flowinfo={{0x14, 0x29, 0x32}}], 0x30}, 0x0) 20:18:32 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x40008, 0x4c000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7a00}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 20:18:34 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="82bb217e00e3a45c000000000000006f57bc49e397ad702deca4322fbe811046c19041c316de41fb1f7531c53abb4f2a8ce9003ee3e0b1b0b5133b07e999aa1cc669f0ca8afcbbfc5b6ad84462ae37c9962387110a79d824054c029e7049257931cef4bd8d46711caa86fb122887b70ccbf7b7caebeb896b04000000c85fcb3961f1d12791c364bcee9f80a5b2e228b11bebbf997c8e6a6723bdd1b6005f4fa82689da02daaef3d7e2ccaa7d37919d000000c76427c554dad01aac9eef731226ffc8e2d059849f76a560d675f3888cf77976", 0xd2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:18:34 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) bind$inet(r0, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) 20:18:34 executing program 3: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000340)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') open(&(0x7f0000000180)='./file0\x00', 0x66440, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0x82) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0x82) unlink(&(0x7f0000001540)='./file0\x00') sendfile(r3, r2, 0x0, 0xa198) sendfile(r1, r0, 0x0, 0xa198) 20:18:34 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2fc903c2b", 0x3f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 20:18:34 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x40008, 0x4c000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7a00}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 20:18:34 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001400), 0x0, 0x0) ioctl$TIOCEXCL(r0, 0x540c) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001400), 0x0, 0x0) 20:18:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x38, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 20:18:34 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) bind$inet(r0, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) [ 750.615219][ T25] audit: type=1326 audit(1619381914.516:4943): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29878 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 20:18:34 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) bind$inet(r0, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) 20:18:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() poll(0x0, 0x0, 0xffdffff8) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000600)="66530700ae897094e7b126b097eaa769be6d05c41bd36ab95156e9962f38ee9611b9774e677d114b65c44f7b7d9ce423c2", 0x31}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2a) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 20:18:34 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2fc903c2b", 0x3f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 750.673663][ T25] audit: type=1326 audit(1619381914.516:4944): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29878 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=56 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 750.716527][ T25] audit: type=1326 audit(1619381914.516:4945): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29878 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 750.741715][ T25] audit: type=1326 audit(1619381914.516:4946): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29878 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=186 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 750.766997][ T25] audit: type=1326 audit(1619381914.516:4947): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29878 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 750.792384][ T25] audit: type=1326 audit(1619381914.516:4948): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29878 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=61 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 750.820841][ T25] audit: type=1326 audit(1619381914.566:4949): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29890 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 750.846848][ T25] audit: type=1326 audit(1619381914.566:4950): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29890 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 20:18:34 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x40008, 0x4c000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7a00}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 750.873524][ T25] audit: type=1326 audit(1619381914.566:4951): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29890 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=278 compat=0 ip=0x4665f9 code=0x7ffc0000 20:18:37 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="82bb217e00e3a45c000000000000006f57bc49e397ad702deca4322fbe811046c19041c316de41fb1f7531c53abb4f2a8ce9003ee3e0b1b0b5133b07e999aa1cc669f0ca8afcbbfc5b6ad84462ae37c9962387110a79d824054c029e7049257931cef4bd8d46711caa86fb122887b70ccbf7b7caebeb896b04000000c85fcb3961f1d12791c364bcee9f80a5b2e228b11bebbf997c8e6a6723bdd1b6005f4fa82689da02daaef3d7e2ccaa7d37919d000000c76427c554dad01aac9eef731226ffc8e2d059849f76a560d675f3888cf77976", 0xd2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:18:37 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2fc903c2b", 0x3f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 20:18:37 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7a}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x32, &(0x7f0000000180)="c4c691019919da078a0098d1e0a593b040f762e16cf51f9f670ed273910000000000000022addee07bee0d6333b5cacd8931"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 20:18:37 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x40008, 0x4c000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7a00}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 20:18:37 executing program 3: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000340)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') open(&(0x7f0000000180)='./file0\x00', 0x66440, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0x82) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0x82) unlink(&(0x7f0000001540)='./file0\x00') sendfile(r3, r2, 0x0, 0xa198) sendfile(r1, r0, 0x0, 0xa198) 20:18:37 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7a}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x32, &(0x7f0000000180)="c4c691019919da078a0098d1e0a593b040f762e16cf51f9f670ed273910000000000000022addee07bee0d6333b5cacd8931"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) [ 753.637808][ T25] kauditd_printk_skb: 55 callbacks suppressed [ 753.637863][ T25] audit: type=1326 audit(1619381917.536:5007): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29922 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 20:18:37 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2fc903c2b", 0x3f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 753.672256][ T25] audit: type=1326 audit(1619381917.536:5008): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29922 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=56 compat=0 ip=0x4665f9 code=0x7ffc0000 20:18:37 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x100000000008d}, 0x0) r0 = getpid() getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x3, 0x10000010, 0x800, 0xd5f, 0x9, 0x0, 0x2, 0x7}, 0x0) sched_setattr(r0, &(0x7f0000000100)={0x38, 0x3, 0x6, 0x1, 0xaf, 0x2, 0x6, 0xb049, 0x6}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket(0x10, 0x3, 0x0) write(r4, &(0x7f0000000380)="1c0000001a009bae5700af0f550000adf86e28000000008d00000000", 0x1c) ioprio_set$pid(0x3, 0x0, 0x2004) 20:18:37 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7a}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x32, &(0x7f0000000180)="c4c691019919da078a0098d1e0a593b040f762e16cf51f9f670ed273910000000000000022addee07bee0d6333b5cacd8931"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) [ 753.721920][ T25] audit: type=1326 audit(1619381917.536:5009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29922 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 753.755735][ T25] audit: type=1326 audit(1619381917.536:5010): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29922 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=186 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 753.787860][ T25] audit: type=1326 audit(1619381917.536:5011): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29922 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 753.812852][ T25] audit: type=1326 audit(1619381917.536:5012): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29922 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=61 compat=0 ip=0x4665f9 code=0x7ffc0000 20:18:37 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp6\x00') preadv(r0, &(0x7f00000006c0)=[{&(0x7f0000000040)=""/107, 0x6b}], 0x1, 0x8e, 0x0) [ 753.838938][ T25] audit: type=1326 audit(1619381917.536:5013): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29938 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 20:18:37 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7a}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x32, &(0x7f0000000180)="c4c691019919da078a0098d1e0a593b040f762e16cf51f9f670ed273910000000000000022addee07bee0d6333b5cacd8931"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 20:18:37 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x0) [ 753.901125][ T25] audit: type=1326 audit(1619381917.536:5014): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29938 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=278 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 753.959296][ T25] audit: type=1326 audit(1619381917.536:5015): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29938 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 753.987535][ T25] audit: type=1326 audit(1619381917.536:5016): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=29938 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=101 compat=0 ip=0x4665f9 code=0x7ffc0000 20:18:40 executing program 3: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000340)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') open(&(0x7f0000000180)='./file0\x00', 0x66440, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0x82) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0x82) unlink(&(0x7f0000001540)='./file0\x00') sendfile(r3, r2, 0x0, 0xa198) sendfile(r1, r0, 0x0, 0xa198) 20:18:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'lo\x00', &(0x7f0000000080)=@ethtool_rxfh_indir={0x38}}) 20:18:40 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x0) 20:18:40 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000340)="5500000018007f5f14fe01b2a49b9093020604020010fe01041614050a00050035000c07010000001900074000600055060022dc131a014883139b84134ef75adb83de4411000b00", 0x48}, {&(0x7f0000000000)="00120608000000000000130000", 0xd}], 0x2, 0x0, 0x0, 0xf000000}, 0x0) 20:18:40 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x100000000008d}, 0x0) r0 = getpid() getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x3, 0x10000010, 0x800, 0xd5f, 0x9, 0x0, 0x2, 0x7}, 0x0) sched_setattr(r0, &(0x7f0000000100)={0x38, 0x3, 0x6, 0x1, 0xaf, 0x2, 0x6, 0xb049, 0x6}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket(0x10, 0x3, 0x0) write(r4, &(0x7f0000000380)="1c0000001a009bae5700af0f550000adf86e28000000008d00000000", 0x1c) ioprio_set$pid(0x3, 0x0, 0x2004) 20:18:40 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x100000000008d}, 0x0) r0 = getpid() getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x3, 0x10000010, 0x800, 0xd5f, 0x9, 0x0, 0x2, 0x7}, 0x0) sched_setattr(r0, &(0x7f0000000100)={0x38, 0x3, 0x6, 0x1, 0xaf, 0x2, 0x6, 0xb049, 0x6}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket(0x10, 0x3, 0x0) write(r4, &(0x7f0000000380)="1c0000001a009bae5700af0f550000adf86e28000000008d00000000", 0x1c) ioprio_set$pid(0x3, 0x0, 0x2004) 20:18:40 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x0) 20:18:40 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x40000000, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) exit_group(0x0) setresgid(0x0, 0x0, 0x0) 20:18:40 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'security.', '{^\x00'}) [ 756.667365][T29982] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 756.675509][T29982] netlink: 'syz-executor.0': attribute type 7 has an invalid length. [ 756.683657][T29982] netlink: 'syz-executor.0': attribute type 11 has an invalid length. 20:18:40 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x0) 20:18:40 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x100000000008d}, 0x0) r0 = getpid() getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x3, 0x10000010, 0x800, 0xd5f, 0x9, 0x0, 0x2, 0x7}, 0x0) sched_setattr(r0, &(0x7f0000000100)={0x38, 0x3, 0x6, 0x1, 0xaf, 0x2, 0x6, 0xb049, 0x6}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket(0x10, 0x3, 0x0) write(r4, &(0x7f0000000380)="1c0000001a009bae5700af0f550000adf86e28000000008d00000000", 0x1c) ioprio_set$pid(0x3, 0x0, 0x2004) [ 756.757525][T29997] new mount options do not match the existing superblock, will be ignored [ 756.766658][T29997] new mount options do not match the existing superblock, will be ignored 20:18:40 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x100000000008d}, 0x0) r0 = getpid() getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x3, 0x10000010, 0x800, 0xd5f, 0x9, 0x0, 0x2, 0x7}, 0x0) sched_setattr(r0, &(0x7f0000000100)={0x38, 0x3, 0x6, 0x1, 0xaf, 0x2, 0x6, 0xb049, 0x6}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket(0x10, 0x3, 0x0) write(r4, &(0x7f0000000380)="1c0000001a009bae5700af0f550000adf86e28000000008d00000000", 0x1c) ioprio_set$pid(0x3, 0x0, 0x2004) 20:18:41 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000004b00)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c, 0x0}}, {{&(0x7f00000010c0)={0xa, 0x4e22, 0x0, @private0, 0x6fa}, 0x1c, 0x0, 0x0, &(0x7f0000003140)=[@hoplimit={{0x10, 0x29, 0x3}}], 0x10}}], 0x2, 0x0) 20:18:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000400)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000000080)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000def4655fdef4655fdef4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000300)="8081000000180000def4655fdef4655fdef4655f00000000000001000c00000010000800000000000af3010004e69663bf06fc20711f00000000f5000000000000030000000d2a2c469b289c7d1d9e0bf9afce8dd531983ab872767c3a488b5d047a576df675c1776bb4d6c268c3efa9", 0x70, 0x11100}], 0x0, &(0x7f0000013c00)) 20:18:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000001400)="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"/3584, 0xe00) fallocate(r1, 0x11, 0x0, 0xfffc) sendfile(r1, r2, 0x0, 0x11f08) 20:18:41 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x100000000008d}, 0x0) r0 = getpid() getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x3, 0x10000010, 0x800, 0xd5f, 0x9, 0x0, 0x2, 0x7}, 0x0) sched_setattr(r0, &(0x7f0000000100)={0x38, 0x3, 0x6, 0x1, 0xaf, 0x2, 0x6, 0xb049, 0x6}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket(0x10, 0x3, 0x0) write(r4, &(0x7f0000000380)="1c0000001a009bae5700af0f550000adf86e28000000008d00000000", 0x1c) ioprio_set$pid(0x3, 0x0, 0x2004) 20:18:41 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x100000000008d}, 0x0) r0 = getpid() getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x3, 0x10000010, 0x800, 0xd5f, 0x9, 0x0, 0x2, 0x7}, 0x0) sched_setattr(r0, &(0x7f0000000100)={0x38, 0x3, 0x6, 0x1, 0xaf, 0x2, 0x6, 0xb049, 0x6}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket(0x10, 0x3, 0x0) write(r4, &(0x7f0000000380)="1c0000001a009bae5700af0f550000adf86e28000000008d00000000", 0x1c) ioprio_set$pid(0x3, 0x0, 0x2004) 20:18:41 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0) setxattr$security_evm(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100), 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000840)='./file1\x00', &(0x7f0000000880), 0x0, 0x0, 0x0) 20:18:41 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) shutdown(r0, 0x0) 20:18:41 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) r1 = open(&(0x7f0000000100)='./bus\x00', 0x1c1042, 0x0) fallocate(r1, 0x20, 0x0, 0xfffffeff000) fallocate(r1, 0x0, 0x0, 0x10000101) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) writev(r1, &(0x7f0000000140)=[{&(0x7f0000000080)="c0", 0x1}], 0x1) fallocate(r1, 0x3, 0x0, 0xffff) [ 757.187461][T30039] loop0: detected capacity change from 0 to 512 [ 757.211348][T30039] EXT4-fs error (device loop0): ext4_quota_enable:6403: inode #3: comm syz-executor.0: iget: bad i_size value: -6201523310421862400 [ 757.225022][T30039] EXT4-fs error (device loop0): ext4_quota_enable:6405: comm syz-executor.0: Bad quota inode # 3 20:18:41 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32={[0xf2, 0x0, 0x3]}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x17) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x40) 20:18:41 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETSHIFTSTATE(r0, 0x541c, &(0x7f0000000000)) [ 757.235685][T30039] EXT4-fs warning (device loop0): ext4_enable_quotas:6445: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 757.251307][T30039] EXT4-fs (loop0): mount failed 20:18:41 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x3f, 0x0, &(0x7f00000000c0)) 20:18:41 executing program 4: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, 0x0, 0x0) writev(r0, &(0x7f0000001680)=[{&(0x7f00000001c0)='\n', 0x1}], 0x1) [ 757.302151][T30039] loop0: detected capacity change from 0 to 512 20:18:41 executing program 5: getpid() timer_create(0x0, &(0x7f0000000200)={0x0, 0x12}, &(0x7f0000000040)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv(r0, &(0x7f00000004c0)=[{0x0}, {&(0x7f0000000280)=""/121, 0x200002f9}], 0x2, 0x0, 0x0) r1 = getpid() timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x800000015) [ 757.428655][T30039] EXT4-fs warning (device loop0): ext4_multi_mount_protect:386: Unable to create kmmpd thread for loop0. 20:18:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000400)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000000080)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000def4655fdef4655fdef4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000300)="8081000000180000def4655fdef4655fdef4655f00000000000001000c00000010000800000000000af3010004e69663bf06fc20711f00000000f5000000000000030000000d2a2c469b289c7d1d9e0bf9afce8dd531983ab872767c3a488b5d047a576df675c1776bb4d6c268c3efa9", 0x70, 0x11100}], 0x0, &(0x7f0000013c00)) 20:18:41 executing program 2: r0 = add_key$keyring(&(0x7f0000000b00), &(0x7f0000000b40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000b00), &(0x7f0000000b40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$invalidate(0x15, r0) 20:18:41 executing program 1: keyctl$reject(0x2, 0x0, 0x0, 0x200, 0x0) 20:18:41 executing program 4: r0 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="24000000210007041dfffd946f610500020000e8fe0208010001080008000d000400ff7e", 0x24}], 0x1}, 0x0) 20:18:41 executing program 5: getpid() timer_create(0x0, &(0x7f0000000200)={0x0, 0x12}, &(0x7f0000000040)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv(r0, &(0x7f00000004c0)=[{0x0}, {&(0x7f0000000280)=""/121, 0x200002f9}], 0x2, 0x0, 0x0) r1 = getpid() timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x800000015) 20:18:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) r0 = syz_io_uring_setup(0x2de1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) 20:18:41 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0xa6000002) utimes(&(0x7f0000000040)='./file0\x00', 0x0) 20:18:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) pipe(&(0x7f00000001c0)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 20:18:41 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e71b0fb1f147a8378f3646", 0x13}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x7) 20:18:41 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000200)) 20:18:41 executing program 1: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = syz_io_uring_setup(0x15b4, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x0) io_uring_enter(r0, 0x77af, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETSF2(r3, 0x5437, 0x0) 20:18:41 executing program 5: getpid() timer_create(0x0, &(0x7f0000000200)={0x0, 0x12}, &(0x7f0000000040)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv(r0, &(0x7f00000004c0)=[{0x0}, {&(0x7f0000000280)=""/121, 0x200002f9}], 0x2, 0x0, 0x0) r1 = getpid() timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x800000015) [ 757.755652][T30116] loop0: detected capacity change from 0 to 512 [ 757.823358][T30116] EXT4-fs error (device loop0): ext4_quota_enable:6403: inode #3: comm syz-executor.0: iget: bad i_size value: -6201523310421862400 [ 757.837053][T30116] EXT4-fs error (device loop0): ext4_quota_enable:6405: comm syz-executor.0: Bad quota inode # 3 [ 757.847660][T30116] EXT4-fs warning (device loop0): ext4_enable_quotas:6445: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 757.863282][T30116] EXT4-fs (loop0): mount failed 20:18:41 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(r2) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=@newsa={0xf0, 0x10, 0x713, 0x0, 0x0, {{@in6=@empty, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {@in6=@ipv4={'\x00', '\xff\xff', @broadcast}, 0x0, 0x33}, @in6=@dev, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}, 0x1, 0x1400000000000000}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 20:18:41 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f00000001c0)=0x40, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4621, @empty}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f00000001c0)=0x40, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4621, @dev}, 0x10) 20:18:41 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000002, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f8", 0x16}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000380)) 20:18:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000400)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000000080)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000def4655fdef4655fdef4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000300)="8081000000180000def4655fdef4655fdef4655f00000000000001000c00000010000800000000000af3010004e69663bf06fc20711f00000000f5000000000000030000000d2a2c469b289c7d1d9e0bf9afce8dd531983ab872767c3a488b5d047a576df675c1776bb4d6c268c3efa9", 0x70, 0x11100}], 0x0, &(0x7f0000013c00)) 20:18:41 executing program 5: getpid() timer_create(0x0, &(0x7f0000000200)={0x0, 0x12}, &(0x7f0000000040)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv(r0, &(0x7f00000004c0)=[{0x0}, {&(0x7f0000000280)=""/121, 0x200002f9}], 0x2, 0x0, 0x0) r1 = getpid() timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x800000015) 20:18:41 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) getpid() r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000100)='./bus\x00', 0x0) [ 757.971999][T30160] loop0: detected capacity change from 0 to 512 [ 757.986221][T30162] loop4: detected capacity change from 0 to 6 [ 758.004925][T30162] FAT-fs (loop4): bogus number of FAT sectors [ 758.011129][T30162] FAT-fs (loop4): Can't find a valid FAT filesystem [ 758.023664][T30160] EXT4-fs error (device loop0): ext4_quota_enable:6403: inode #3: comm syz-executor.0: iget: bad i_size value: -6201523310421862400 [ 758.037309][T30160] EXT4-fs error (device loop0): ext4_quota_enable:6405: comm syz-executor.0: Bad quota inode # 3 [ 758.047868][T30160] EXT4-fs warning (device loop0): ext4_enable_quotas:6445: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 758.064007][T30160] EXT4-fs (loop0): mount failed 20:18:42 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="66530700ae897094e71b0fa1f147a8378f364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb298802d8f6c1f3b18d6d352507f7018b31a53bad1ec3533c791a753a1fef2c560001000000000000fb8005128e7e4d939955f8ac396203784000400f573fbf000000000000000761f35e959f130dec95128ce7", 0x98}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x1e) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 758.082556][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:18:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000400)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000000080)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000def4655fdef4655fdef4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000300)="8081000000180000def4655fdef4655fdef4655f00000000000001000c00000010000800000000000af3010004e69663bf06fc20711f00000000f5000000000000030000000d2a2c469b289c7d1d9e0bf9afce8dd531983ab872767c3a488b5d047a576df675c1776bb4d6c268c3efa9", 0x70, 0x11100}], 0x0, &(0x7f0000013c00)) 20:18:42 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="66530700ae897094e71b0fa1f147a8378f364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb298802d8f6c1f3b18d6d352507f7018b31a53bad1ec3533c791a753a1fef2c560001000000000000fb8005128e7e4d939955f8ac396203784000400f573fbf000000000000000761f35e959f130dec95128ce7", 0x98}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x1e) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 20:18:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) [ 758.198639][T30197] loop0: detected capacity change from 0 to 512 [ 758.244704][T30197] EXT4-fs error (device loop0): ext4_quota_enable:6403: inode #3: comm syz-executor.0: iget: bad i_size value: -6201523310421862400 [ 758.258362][T30197] EXT4-fs error (device loop0): ext4_quota_enable:6405: comm syz-executor.0: Bad quota inode # 3 [ 758.268970][T30197] EXT4-fs warning (device loop0): ext4_enable_quotas:6445: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 758.283783][T30197] EXT4-fs (loop0): mount failed 20:18:42 executing program 1: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a080200000100000101002200160100000000011600080000000008007809140b2a3a080200000100000101013400180100000000011864000000000000647809140b2a3a08000000010000011200660069006c0065002e0063006f006c0064002c00170100000000011700080000000008007809140b2a3a08020000010000010a00660069006c00650030", 0xa3, 0x8b000}], 0x0, &(0x7f0000000340)=ANY=[]) r1 = fcntl$dupfd(r0, 0x0, r0) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 20:18:42 executing program 4: unshare(0x8020600) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout_data(r0, 0x107, 0x13, 0x0, 0x4) 20:18:42 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x80000000000000a, 0x1, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r2) 20:18:42 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="66530700ae897094e71b0fa1f147a8378f364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb298802d8f6c1f3b18d6d352507f7018b31a53bad1ec3533c791a753a1fef2c560001000000000000fb8005128e7e4d939955f8ac396203784000400f573fbf000000000000000761f35e959f130dec95128ce7", 0x98}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x1e) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 20:18:42 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) getpid() r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000100)='./bus\x00', 0x0) 20:18:42 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) getpid() r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000100)='./bus\x00', 0x0) 20:18:42 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000140), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000180)={{0x80}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) 20:18:42 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r2, 0x0) r3 = dup3(r1, r0, 0x0) ioctl$sock_SIOCINQ(r3, 0x5411, &(0x7f0000000040)) 20:18:42 executing program 4: r0 = inotify_init() r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f00000024c0)=@file={0x1, './file0\x00'}, 0x6e) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000840)='./file0\x00', 0x4000289) inotify_add_watch(r0, &(0x7f0000000140)='./file0\x00', 0x20) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x20000280) 20:18:42 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 20:18:42 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x80000000000000a, 0x1, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r2) 20:18:42 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="66530700ae897094e71b0fa1f147a8378f364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb298802d8f6c1f3b18d6d352507f7018b31a53bad1ec3533c791a753a1fef2c560001000000000000fb8005128e7e4d939955f8ac396203784000400f573fbf000000000000000761f35e959f130dec95128ce7", 0x98}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x1e) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 20:18:42 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x80000000000000a, 0x1, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r2) 20:18:42 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000280)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x91\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2y', 0x0) write$binfmt_elf64(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3e, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x2}, [{0x3, 0x0, 0x0, 0x0, 0x0, 0x9}], "", ['\x00']}, 0x178) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 20:18:42 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket(0x80000000000000a, 0x1, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r2) 20:18:42 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000040)={0x0, 0x200}) [ 758.956921][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 758.972265][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:18:43 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) getpid() r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000100)='./bus\x00', 0x0) 20:18:43 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) getpid() r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000100)='./bus\x00', 0x0) 20:18:43 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x2, &(0x7f0000000180)) 20:18:43 executing program 2: r0 = socket$unix(0x1, 0x5, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:18:43 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x3a, 0x1, &(0x7f0000000040), 0x4) 20:18:43 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000040)={0x0, 0x200}) 20:18:43 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000040), 0x4) 20:18:43 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x20002) write$evdev(r1, &(0x7f000004d000)=[{{0x0, 0x2710}, 0x0, 0x2}], 0x79) [ 759.570871][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:18:43 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000040)={0x0, 0x200}) 20:18:43 executing program 1: syz_mount_image$msdos(&(0x7f0000000440), &(0x7f0000002580)='./file0\x00', 0x8001, 0x1, &(0x7f0000002780)=[{&(0x7f00000025c0)="68d28b2b8d11414b7ecf", 0xa, 0x5}], 0x0, &(0x7f00000027c0)) 20:18:43 executing program 5: unshare(0x6000600) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000400)="240000001300b7b7db405ab93198653a5d17b6cbc0177883b8af9bd57ea08fd8c4f14be0", 0x24) mmap(&(0x7f0000f95000/0x1000)=nil, 0x1000, 0x1, 0x31, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000f95fd7)={0x0, 0x0, 0x0}, 0x0) 20:18:43 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000180), 0x0, 0x0) ioctl$BLKFLSBUF(r0, 0x541b, 0x0) [ 759.705682][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 759.720012][T30313] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 20:18:44 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) getpid() r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000100)='./bus\x00', 0x0) 20:18:44 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000040)={0x0, 0x200}) 20:18:44 executing program 2: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) r0 = socket$netlink(0x10, 0x3, 0x9) bind$netlink(r0, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc) 20:18:44 executing program 1: r0 = memfd_create(&(0x7f0000000200)='\x06\n\x00\xfd\xbe\x00t\xc6m4Hx\n\xed\x19yS\xac\xbcN\xa5L\xf5\x01\xbe\x14\xb5\n>\xdd\a\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\xff\xfd*}\x81\xfac\n\xbf\x16\x82\xa3\x99LO%\x9cC\x9f\x1b\xcb\'\xa0\xeb\xc04\x97d\xf2\x93\xf5J\x95\x8a\x15\x02\xf4\xd3\x03\xa6\xe9\xbf\xe4H\x10\xb3JT\xf2]\xa1y\xa3\x9c\xdd\xbaVI6/\xa8G%\x88\xc2\xad\xebY\xef\xdf\xdcu{\x05EN\xd77$\xc1\x00\xc3\xdf<\x82\"\xeb\xa8l9\xabK\xa9\xf9\xc0>(\x9cjR\x0e*\xed\x9fVH\x1f\x8dr\xbe\r0\xff\xa5yA\x03\x02\xb8\xba8\xb0\x8a\x98(\xb2+4\x85\xfb\xc5fu\xb7\xae\x01n\xa5\xc4\xe4\xd8*ZY\xf9Bg\x97\'\xd8-yB\x1d79Yu\xb2\xd1\xb5s+\x14\xbd\x05\x8a\x0f\xf4\x18A\xb3P\x9f\x88\x17\xa6\x86M\xf6b\x93\xd9\xf6\x19\x8fr\x89\x93a\x992\x9d\x99\xe1\xb7\av\x88\x02\"\a\n\xbb\xc4L\x17*\xa7\xb0J\xfc\xaf\xc7\x8c\xadg\x94q\x10\x8aMx/P2\xc2{\xae\x05\xcb!k\xc7%\xd7!\xeev\xaf\x00\x18k\x9e\xb4\xc7\xfc\xe7\v\x9e\xe7\xe3\x15\x94\xe7\xc5\xcd\x92\xd9L|d\xedG^\xa8\x18\xd3\x9d\f\xe5\xa6]N\x94\xc3\x97h6\xf4\xe1\x97\xa5\xb5F\x9f[\x10\x03\\b\x90u \xc2,\xec}\'\x84\xdan\xf3\xe0kU\x8a\xe8\xd1\xf2\xa1\xa6s\xd4\xc7\\b\x8c\xeb\xc5\b\x8a\x9b\xd7\x01\xa2\xa4z\xcf\xe3\xcb\xabL\v\xb0\xc1=\xcc', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) copy_file_range(r1, 0x0, r0, &(0x7f0000000080), 0x0, 0x0) 20:18:44 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0x2, 0x0, 0x0, @empty}, 0x1c) 20:18:44 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) getpid() r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000100)='./bus\x00', 0x0) 20:18:44 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@rand_addr=' \x01\x00'}, {@in6=@mcast2, 0x0, 0x32}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa, 0x4}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in=@multicast1}}]}, 0x154}}, 0x0) 20:18:44 executing program 1: r0 = openat$thread_pidfd(0xffffff9c, &(0x7f0000001240), 0x0, 0x0) r1 = openat$thread_pidfd(0xffffff9c, &(0x7f0000001240), 0x0, 0x0) fcntl$notify(r1, 0x402, 0x80000022) fcntl$notify(r0, 0x402, 0x80000022) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = openat$thread_pidfd(0xffffff9c, &(0x7f0000001240), 0x0, 0x0) close(r3) 20:18:44 executing program 5: perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20087104ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') exit_group(0x0) preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000280)=""/95, 0x5f}], 0x1, 0x0, 0x0) 20:18:44 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) capget(&(0x7f0000feaff9)={0x20071026}, &(0x7f0000000080)) 20:18:44 executing program 2: r0 = clone3(&(0x7f0000007bc0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = pidfd_open(r0, 0x0) pidfd_send_signal(r1, 0x25, &(0x7f0000000000)={0x25, 0x0, 0x4}, 0x0) 20:18:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000002840)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)={0x24, 0x2d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @uid=0xee01}, @generic="38382267197d18a0bbe344"]}, 0x24}], 0x1}, 0x0) [ 760.327032][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 760.327693][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:18:44 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x12081ff) pwritev2(r0, &(0x7f0000000180)=[{&(0x7f00000002c0)='Y', 0x1}], 0x1, 0x0, 0x0, 0x12) fcntl$setstatus(r0, 0x4, 0x6100) write$cgroup_type(r0, &(0x7f0000000200), 0xf642e7e) r2 = open(&(0x7f0000000040)='./file0\x00', 0x14b042, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24004080}, 0x24018844) fallocate(r3, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000140)={0x0, r0}) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0xb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) sendmmsg(r4, &(0x7f0000008600)=[{{0x0, 0x7f}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0/../file0/file0\x00'}, 0x32, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x803e}}], 0x2, 0x0) 20:18:44 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) capget(&(0x7f0000feaff9)={0x20071026}, &(0x7f0000000080)) 20:18:44 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff4000}]}) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sync_file_range(r0, 0x0, 0x0, 0x0) 20:18:44 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x1267, &(0x7f0000000080)) 20:18:44 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x3, &(0x7f0000000040)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000002900)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)="aeba5391", 0xbaae}], 0x1}}], 0x1, 0x0) 20:18:44 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x61) link(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./bus\x00') 20:18:44 executing program 3: set_mempolicy(0x8002, &(0x7f0000000400)=0x9, 0x6) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @multicast2}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @local}, 'lo\x00'}) 20:18:44 executing program 2: r0 = syz_io_uring_setup(0x15b4, &(0x7f0000000340), &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_VENDOR(r3, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={&(0x7f00000009c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="01"], 0x24}}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000000780)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x6deb, 0x0, 0x0, 0x0, 0x0) 20:18:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='configfs\x00', 0x0, 0x0) utime(&(0x7f0000000080)='./file0\x00', 0x0) 20:18:44 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) capget(&(0x7f0000feaff9)={0x20071026}, &(0x7f0000000080)) 20:18:44 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = memfd_create(&(0x7f00000003c0)='\xff\x00l\x1e\xa00x0) getpriority(0x0, r0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x80000012, 0x0, @thr={&(0x7f0000000380)="2b112747234e9fa629a7fdefd8a33ab7893182f83ee284c9ec3adc7968c72b15091613e35f3dd54f24bd87e81a7f250c5c2c38010c4bd36b73c97202aff11d3215842ae28db54d353953087c7f73efa1362bd163e0a7cc21943421a9e9c432fa45c18f742744988e9b74ea8ba52bbfb8afcb7566f85414809934f721d1bda8fa16bd9e7e18a329907ad6215c5d612a00c525b306226a3fe1252f0562c11900eb7ae9a1", &(0x7f0000000280)="e17f50315dc1666bab052295c8ecb98e6f"}}, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) getpgid(0x0) timer_create(0x3, &(0x7f0000000140)={0x0, 0x14, 0x4}, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000080)={'ipvs\x00'}, &(0x7f00000000c0)=0x1e) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000000)) ptrace(0x10, r2) ptrace$getregset(0x4204, r2, 0x202, &(0x7f0000000100)={0x0}) readv(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') 20:18:45 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x12081ff) pwritev2(r0, &(0x7f0000000180)=[{&(0x7f00000002c0)='Y', 0x1}], 0x1, 0x0, 0x0, 0x12) fcntl$setstatus(r0, 0x4, 0x6100) write$cgroup_type(r0, &(0x7f0000000200), 0xf642e7e) r2 = open(&(0x7f0000000040)='./file0\x00', 0x14b042, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24004080}, 0x24018844) fallocate(r3, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000140)={0x0, r0}) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0xb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) sendmmsg(r4, &(0x7f0000008600)=[{{0x0, 0x7f}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0/../file0/file0\x00'}, 0x32, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x803e}}], 0x2, 0x0) 20:18:45 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1003e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f00000003c0)) 20:18:45 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) capget(&(0x7f0000feaff9)={0x20071026}, &(0x7f0000000080)) 20:18:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='configfs\x00', 0x0, 0x0) utime(&(0x7f0000000080)='./file0\x00', 0x0) 20:18:45 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x40) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x14812, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg(r0, &(0x7f0000006c80)=[{{&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, 0x0}}], 0x1, 0x0) 20:18:45 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = memfd_create(&(0x7f00000003c0)='\xff\x00l\x1e\xa00x0}) sendmmsg(r4, &(0x7f0000008600)=[{{0x0, 0x7f}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0/../file0/file0\x00'}, 0x32, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x803e}}], 0x2, 0x0) 20:18:45 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = memfd_create(&(0x7f00000003c0)='\xff\x00l\x1e\xa00x0}) sendmmsg(r4, &(0x7f0000008600)=[{{0x0, 0x7f}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0/../file0/file0\x00'}, 0x32, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x803e}}], 0x2, 0x0) 20:18:45 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x4052, r0, 0x0) mlock2(&(0x7f0000005000/0x2000)=nil, 0x2000, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1) r1 = open(&(0x7f0000000000)='./bus\x00', 0x800000141042, 0x0) ftruncate(r1, 0x200006) mlock2(&(0x7f0000000000/0x4000)=nil, 0x104000, 0x0) 20:18:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='configfs\x00', 0x0, 0x0) utime(&(0x7f0000000080)='./file0\x00', 0x0) 20:18:45 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = memfd_create(&(0x7f00000003c0)='\xff\x00l\x1e\xa00x0}) sendmmsg(r4, &(0x7f0000008600)=[{{0x0, 0x7f}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0/../file0/file0\x00'}, 0x32, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x803e}}], 0x2, 0x0) 20:18:45 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x2, 0x3, 0xff) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x1) lseek(r2, 0x1200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x8400fffffffa) connect$inet(r1, &(0x7f0000001680)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10) r5 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f00000000c0)=0x46a6, 0x4) sendfile(r0, r5, 0x0, 0x200fff) 20:18:45 executing program 5: setreuid(0xee01, 0x0) setreuid(0xffffffffffffffff, 0xee01) setresuid(0x0, 0xee01, 0x0) 20:18:45 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040), r0) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x38, r1, 0x1, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'virt_wifi0\x00'}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast1}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @private}]}, 0x38}}, 0x0) 20:18:45 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x1}, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) pselect6(0x8, 0x0, 0x0, &(0x7f00000000c0)={0xa23}, &(0x7f0000000100)={0x0, 0x3938700}, &(0x7f0000000200)={&(0x7f00000001c0), 0x8}) 20:18:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000001940)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x2de1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r2, r3, &(0x7f00000001c0)=@IORING_OP_READV=@pass_iovec={0x1, 0x2, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) io_uring_enter(r1, 0x302, 0x0, 0x0, 0x0, 0x0) 20:18:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast2, @remote}, 0xc) getsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f0000000000)=""/145, &(0x7f0000695ffc)=0x91) 20:18:46 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x12081ff) pwritev2(r0, &(0x7f0000000180)=[{&(0x7f00000002c0)='Y', 0x1}], 0x1, 0x0, 0x0, 0x12) fcntl$setstatus(r0, 0x4, 0x6100) write$cgroup_type(r0, &(0x7f0000000200), 0xf642e7e) r2 = open(&(0x7f0000000040)='./file0\x00', 0x14b042, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24004080}, 0x24018844) fallocate(r3, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000140)={0x0, r0}) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0xb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) sendmmsg(r4, &(0x7f0000008600)=[{{0x0, 0x7f}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0/../file0/file0\x00'}, 0x32, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x803e}}], 0x2, 0x0) 20:18:46 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xd0, 0x0, 0x0) 20:18:46 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) setreuid(0x0, 0xee01) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x6, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000180)="ac6d3fcfb43f", 0x0, 0x0, 0x0, 0x0, 0x0}) 20:18:46 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x12081ff) pwritev2(r0, &(0x7f0000000180)=[{&(0x7f00000002c0)='Y', 0x1}], 0x1, 0x0, 0x0, 0x12) fcntl$setstatus(r0, 0x4, 0x6100) write$cgroup_type(r0, &(0x7f0000000200), 0xf642e7e) r2 = open(&(0x7f0000000040)='./file0\x00', 0x14b042, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24004080}, 0x24018844) fallocate(r3, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000140)={0x0, r0}) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0xb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) sendmmsg(r4, &(0x7f0000008600)=[{{0x0, 0x7f}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0/../file0/file0\x00'}, 0x32, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x803e}}], 0x2, 0x0) 20:18:46 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x3ff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x43, &(0x7f0000000380)=0x1f, 0x4) bind$inet6(r0, &(0x7f0000f65000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffbbfbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) 20:18:46 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000240)='cpuset.mems\x00', 0x2, 0x0) writev(r1, &(0x7f00000003c0)=[{&(0x7f0000000180)="d7", 0x1}], 0x1) [ 762.632246][T30556] new mount options do not match the existing superblock, will be ignored [ 762.657044][T30556] new mount options do not match the existing superblock, will be ignored 20:18:46 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x2, 0x3, 0xff) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x1) lseek(r2, 0x1200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x8400fffffffa) connect$inet(r1, &(0x7f0000001680)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10) r5 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f00000000c0)=0x46a6, 0x4) sendfile(r0, r5, 0x0, 0x200fff) 20:18:46 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe3, &(0x7f0000000400)="c4c691019919da078a0098d1e0a593b040f762910000000000000022addee07bee0d6333b5cacd893169b618322ff6602022511253508b5a4496728c2a46e1bc340e29b9ab9b7136283e350808ffdb2dbea7410b363de4fb357baa17dacdcfac32957dc8bb44e203c4b1bc83d8c0b29f75bcf2e3482945fef116371f8c8c0c4db583a208718e3cccd9dd3bf7a0b9daf36c29d2010000004a91a4a884fffffffffffffff830843900bb4ff9a7df5ee0fdbb6e3a288594f90399ef71d1fa7b32513f49d5135aea235f80005999dd604f5f3bd40ec03ea54e2eabc315065430d8ce742e53"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x17) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x40) 20:18:46 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000240)='cpuset.mems\x00', 0x2, 0x0) writev(r1, &(0x7f00000003c0)=[{&(0x7f0000000180)="d7", 0x1}], 0x1) 20:18:46 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000240)='cpuset.mems\x00', 0x2, 0x0) writev(r1, &(0x7f00000003c0)=[{&(0x7f0000000180)="d7", 0x1}], 0x1) 20:18:46 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe3, &(0x7f0000000400)="c4c691019919da078a0098d1e0a593b040f762910000000000000022addee07bee0d6333b5cacd893169b618322ff6602022511253508b5a4496728c2a46e1bc340e29b9ab9b7136283e350808ffdb2dbea7410b363de4fb357baa17dacdcfac32957dc8bb44e203c4b1bc83d8c0b29f75bcf2e3482945fef116371f8c8c0c4db583a208718e3cccd9dd3bf7a0b9daf36c29d2010000004a91a4a884fffffffffffffff830843900bb4ff9a7df5ee0fdbb6e3a288594f90399ef71d1fa7b32513f49d5135aea235f80005999dd604f5f3bd40ec03ea54e2eabc315065430d8ce742e53"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x17) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x40) [ 762.828949][T30577] new mount options do not match the existing superblock, will be ignored [ 762.844002][T30580] new mount options do not match the existing superblock, will be ignored 20:18:46 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000240)='cpuset.mems\x00', 0x2, 0x0) writev(r1, &(0x7f00000003c0)=[{&(0x7f0000000180)="d7", 0x1}], 0x1) [ 762.939721][T30591] new mount options do not match the existing superblock, will be ignored 20:18:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe3, &(0x7f0000000400)="c4c691019919da078a0098d1e0a593b040f762910000000000000022addee07bee0d6333b5cacd893169b618322ff6602022511253508b5a4496728c2a46e1bc340e29b9ab9b7136283e350808ffdb2dbea7410b363de4fb357baa17dacdcfac32957dc8bb44e203c4b1bc83d8c0b29f75bcf2e3482945fef116371f8c8c0c4db583a208718e3cccd9dd3bf7a0b9daf36c29d2010000004a91a4a884fffffffffffffff830843900bb4ff9a7df5ee0fdbb6e3a288594f90399ef71d1fa7b32513f49d5135aea235f80005999dd604f5f3bd40ec03ea54e2eabc315065430d8ce742e53"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x17) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x40) 20:18:47 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000240)='cpuset.mems\x00', 0x2, 0x0) writev(r1, &(0x7f00000003c0)=[{&(0x7f0000000180)="d7", 0x1}], 0x1) 20:18:47 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000240)='cpuset.mems\x00', 0x2, 0x0) writev(r1, &(0x7f00000003c0)=[{&(0x7f0000000180)="d7", 0x1}], 0x1) 20:18:47 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x1c30c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) r2 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_int(r1, 0x0, 0x6, &(0x7f0000000000)=0x8, 0x4) ioctl$sock_SIOCADDRT(r2, 0x890b, &(0x7f0000000340)={0x0, @in={0x2, 0x0, @loopback}, @l2tp={0x2, 0x0, @loopback=0x7f000008}, @can, 0x7}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000780)={{0x0, 0x1, 0x80000000, 0xffffffffffffffc0, 0x3, 0x5, 0x6, 0x7, 0x1, 0x5, 0x3, 0x3f, 0x39cd, 0x1, 0x50000}}) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) bind(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) 20:18:47 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000200), &(0x7f0000000240)=0x4) 20:18:47 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\xafa\xac', 0x0) sendfile(r0, r1, 0x0, 0x0) [ 763.331304][T30600] new mount options do not match the existing superblock, will be ignored [ 763.339945][T30602] new mount options do not match the existing superblock, will be ignored [ 763.410327][ T25] kauditd_printk_skb: 62 callbacks suppressed [ 763.410340][ T25] audit: type=1326 audit(1619381927.306:5079): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30610 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 763.465042][ T25] audit: type=1326 audit(1619381927.336:5080): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30610 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=53 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 763.492488][ T25] audit: type=1326 audit(1619381927.336:5081): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30610 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 763.532246][ T25] audit: type=1326 audit(1619381927.336:5082): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30610 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=319 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 763.558003][ T25] audit: type=1326 audit(1619381927.336:5083): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30610 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 763.582477][ T25] audit: type=1326 audit(1619381927.346:5084): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30610 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=40 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 763.621557][ T25] audit: type=1326 audit(1619381927.346:5085): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30610 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 763.646251][ T25] audit: type=1326 audit(1619381927.346:5086): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30610 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=157 compat=0 ip=0x4665f9 code=0x7ffc0000 20:18:47 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x2, 0x3, 0xff) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x1) lseek(r2, 0x1200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x8400fffffffa) connect$inet(r1, &(0x7f0000001680)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10) r5 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f00000000c0)=0x46a6, 0x4) sendfile(r0, r5, 0x0, 0x200fff) 20:18:47 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000240)='cpuset.mems\x00', 0x2, 0x0) writev(r1, &(0x7f00000003c0)=[{&(0x7f0000000180)="d7", 0x1}], 0x1) 20:18:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe3, &(0x7f0000000400)="c4c691019919da078a0098d1e0a593b040f762910000000000000022addee07bee0d6333b5cacd893169b618322ff6602022511253508b5a4496728c2a46e1bc340e29b9ab9b7136283e350808ffdb2dbea7410b363de4fb357baa17dacdcfac32957dc8bb44e203c4b1bc83d8c0b29f75bcf2e3482945fef116371f8c8c0c4db583a208718e3cccd9dd3bf7a0b9daf36c29d2010000004a91a4a884fffffffffffffff830843900bb4ff9a7df5ee0fdbb6e3a288594f90399ef71d1fa7b32513f49d5135aea235f80005999dd604f5f3bd40ec03ea54e2eabc315065430d8ce742e53"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x17) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x40) 20:18:47 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x60, 0x0, 0x0) 20:18:47 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000080)=ANY=[], 0x58) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000340)={0x53, 0x0, 0x6, 0x0, @buffer={0x0, 0x79, &(0x7f0000000780)=""/121}, &(0x7f0000000600)="7071cde789db", 0x0, 0x0, 0x0, 0x0, 0x0}) [ 763.671331][ T25] audit: type=1326 audit(1619381927.346:5087): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30610 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 20:18:47 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x1f, 0x6) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x2}}) 20:18:47 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000040)="900000001c001f4d154a817393278bff0a80a578020000000300740014000100ac1414bb0542d6401051a2d708f37ac8da1a297e0099c5ac0000c5b068d0bf46d323456536016466fc621c9ce921202ab78dcaaf6c3efed495a46215be0000760700c0c80cefd285810258ba86c9d2896c6d3bca2d0000000b0015009e49a6560641263da4de1df32c1739d7fbee9aa2", 0x90, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto$inet6(r0, &(0x7f0000000180)="900000001d001f4d154a817393278bff0a0ba578020000000404840014000100ac1414bb0542d6401051a2d708f37ac8da1a297e0099c5ac0000c5b068d0bf46d323456536016466fcb78dcaaf6c3efed495a46215be0000766436c0c80cefd28581d158ba86c9d2896c6d3bca2d0000000b0015009e49a6560689000000de1df32c1739d7fbee9aa241731ae9e0b390", 0x90, 0x0, 0x0, 0x0) 20:18:47 executing program 1: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000140)=ANY=[@ANYBLOB="e0000001ac1414aa0000000003"], 0x1c) setsockopt$inet_mreqn(r0, 0x0, 0x25, &(0x7f0000000080)={@multicast1, @local}, 0xc) r1 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) [ 763.706920][ T25] audit: type=1326 audit(1619381927.346:5088): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=30610 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=53 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 763.752683][T30621] new mount options do not match the existing superblock, will be ignored 20:18:47 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x109842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, r0, 0xc03000) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) ftruncate(r1, 0x2008000) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x9) [ 763.842453][T30638] netlink: 96 bytes leftover after parsing attributes in process `syz-executor.5'. [ 763.892695][T30638] netlink: 96 bytes leftover after parsing attributes in process `syz-executor.5'. 20:18:47 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x1c30c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) r2 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_int(r1, 0x0, 0x6, &(0x7f0000000000)=0x8, 0x4) ioctl$sock_SIOCADDRT(r2, 0x890b, &(0x7f0000000340)={0x0, @in={0x2, 0x0, @loopback}, @l2tp={0x2, 0x0, @loopback=0x7f000008}, @can, 0x7}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000780)={{0x0, 0x1, 0x80000000, 0xffffffffffffffc0, 0x3, 0x5, 0x6, 0x7, 0x1, 0x5, 0x3, 0x3f, 0x39cd, 0x1, 0x50000}}) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) bind(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) 20:18:47 executing program 1: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmat(r0, &(0x7f0000ffa000/0x3000)=nil, 0x4000) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000000)=0x1ff, 0xb77, 0x0) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) 20:18:47 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x1f, 0x6) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x2}}) 20:18:48 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x2, 0x3, 0xff) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x1) lseek(r2, 0x1200, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x8400fffffffa) connect$inet(r1, &(0x7f0000001680)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10) r5 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f00000000c0)=0x46a6, 0x4) sendfile(r0, r5, 0x0, 0x200fff) 20:18:48 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x2000c000, &(0x7f00000001c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3", 0x1}], 0x1, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4007da3) 20:18:48 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x40000000, 0x0) exit_group(0x0) eventfd(0x0) 20:18:48 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x1f, 0x6) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x2}}) 20:18:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in=@private, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@private2, 0x0, 0x3c}, 0x0, @in6=@mcast1}}, 0x13d) 20:18:48 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x1c30c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) r2 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_int(r1, 0x0, 0x6, &(0x7f0000000000)=0x8, 0x4) ioctl$sock_SIOCADDRT(r2, 0x890b, &(0x7f0000000340)={0x0, @in={0x2, 0x0, @loopback}, @l2tp={0x2, 0x0, @loopback=0x7f000008}, @can, 0x7}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000780)={{0x0, 0x1, 0x80000000, 0xffffffffffffffc0, 0x3, 0x5, 0x6, 0x7, 0x1, 0x5, 0x3, 0x3f, 0x39cd, 0x1, 0x50000}}) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) bind(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) 20:18:48 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x1f, 0x6) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x2}}) 20:18:48 executing program 5: r0 = fork() r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getpgid(r0) 20:18:48 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f00000000c0)={0x0, 0x0, r0}) 20:18:48 executing program 1: rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)) 20:18:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f00000000c0)=[{0x3d}, {0x6, 0x0, 0x0, 0x7ffffff8}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 20:18:48 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000017c0), 0x0, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000000)=""/142) 20:18:49 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x1c30c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) r2 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_int(r1, 0x0, 0x6, &(0x7f0000000000)=0x8, 0x4) ioctl$sock_SIOCADDRT(r2, 0x890b, &(0x7f0000000340)={0x0, @in={0x2, 0x0, @loopback}, @l2tp={0x2, 0x0, @loopback=0x7f000008}, @can, 0x7}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000780)={{0x0, 0x1, 0x80000000, 0xffffffffffffffc0, 0x3, 0x5, 0x6, 0x7, 0x1, 0x5, 0x3, 0x3f, 0x39cd, 0x1, 0x50000}}) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) bind(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) 20:18:49 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@rand_addr=' \x01\x00'}, {@in6=@mcast2, 0x0, 0x32}, @in6=@rand_addr=' \x01\x00', {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in=@multicast1}}]}, 0x154}}, 0x0) 20:18:49 executing program 3: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = syz_io_uring_setup(0x15b4, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r0, 0x90e, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee5000/0x2000)=nil, &(0x7f00006d7000/0x2000)=nil, 0x0, 0x0) dup2(r3, r0) 20:18:49 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000180)='.', 0x0, 0x33088, 0x0) open_tree(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x81001) mount(&(0x7f0000000140)=@filename='./file0\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5110, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 20:18:49 executing program 4: r0 = syz_io_uring_setup(0x1ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x5}, 0x0) io_uring_enter(r0, 0x2ff, 0x0, 0x0, 0x0, 0x0) write$nbd(r4, &(0x7f0000000080)=ANY=[], 0xffffffd5) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000180), 0x0) shutdown(r3, 0x0) shutdown(r3, 0x1) 20:18:49 executing program 0: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) 20:18:49 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x11f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 20:18:49 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f00000000c0)="240000005e005f0214f9f407000904001f00000001000002000200000800040001000000", 0x24) 20:18:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) 20:18:49 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x1f) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='pagemap\x00') pread64(r0, &(0x7f0000000040)=""/50, 0xffffff3c, 0x200000000000) 20:18:49 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() poll(0x0, 0x0, 0xfffffffffffffff8) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000600)="66530700ae897094e7b126b097eaa769be6d05c41bd36ab95156e9962f38ee9611b9774e677d114b65c44f7b7d9ce423c22f45958dc387a323aa893a8cf41753ba5dcf4c2e1fea4b7a3dfc", 0x4b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2a) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 20:18:49 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000280)={0x0, 0x2710}, 0x10) r3 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r3, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x204}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) 20:18:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x1, 0x2, &(0x7f0000000180)="6315d8ef", 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r1, 0x1, 0x2, &(0x7f00000006c0)="80149cd1", 0x4) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x24048040, &(0x7f0000000240)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8}, 0x1c) listen(r0, 0x0) listen(r1, 0x0) 20:18:50 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x40) 20:18:50 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000001200)='net/netlink\x00') preadv(r1, &(0x7f00000006c0)=[{&(0x7f0000000040)=""/123, 0x7b}, {&(0x7f00000000c0)=""/22, 0x16}, {&(0x7f0000000140)=""/127, 0x7f}], 0x3, 0x8, 0x0) 20:18:50 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)={0x2, 0x0, @private}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000000)="3afe", 0x2}], 0x1}}, {{&(0x7f0000000080)={0x2, 0x0, @broadcast}, 0x10, 0x0, 0x0, &(0x7f00000001c0)=[@ip_retopts={{0x38, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x14, 0x0, 0x3, 0x0, [{@loopback}, {@private}]}, @generic={0x0, 0x2}]}}}], 0x28}}], 0x2, 0x0) 20:18:50 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000080), r0) sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x1, 0x0, 0x0, {0x2}, [@NLBL_CALIPSO_A_DOI={0x8}]}, 0x1c}}, 0x0) 20:18:50 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x121002, 0x0) write$vga_arbiter(r0, &(0x7f0000000040)=@other={'decodes', ' ', 'none'}, 0x3f) 20:18:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x2de5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x1000) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x8, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x6000, @fd_index, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) 20:18:50 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000002, 0x200000005c831, 0xffffffffffffffff, 0x0) mincore(&(0x7f00000a7000/0x1000)=nil, 0x1002, &(0x7f0000000140)=""/127) 20:18:50 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\xafa\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[], 0x8) sendfile(r0, r1, &(0x7f00000001c0), 0xffff) fcntl$addseals(r1, 0x409, 0x8) fallocate(r1, 0x3, 0x80000000, 0x81) 20:18:50 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000001200)='net/netlink\x00') preadv(r1, &(0x7f00000006c0)=[{&(0x7f0000000040)=""/123, 0x7b}, {&(0x7f00000000c0)=""/22, 0x16}, {&(0x7f0000000140)=""/127, 0x7f}], 0x3, 0x8, 0x0) 20:18:50 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000001200)='net/netlink\x00') preadv(r1, &(0x7f00000006c0)=[{&(0x7f0000000040)=""/123, 0x7b}, {&(0x7f00000000c0)=""/22, 0x16}, {&(0x7f0000000140)=""/127, 0x7f}], 0x3, 0x8, 0x0) 20:18:50 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) r1 = socket$inet(0x2, 0x3, 0x5) getsockopt$inet_pktinfo(r1, 0x0, 0x8, 0x0, &(0x7f0000000040)=0x3) 20:18:50 executing program 2: setrlimit(0x8, &(0x7f0000000080)) mlockall(0x7) [ 766.260203][T30808] pci 0000:00:05.0: vgaarb: changed VGA decodes: olddecodes=io+mem,decodes=none:owns=io+mem 20:18:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='oom_adj\x00') preadv(r1, &(0x7f00000003c0)=[{&(0x7f00000002c0)=""/63, 0x3f}], 0x1, 0x0, 0x0) 20:18:50 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet6(0xa, 0x803, 0x6) setsockopt$inet6_int(r0, 0x29, 0x24, 0x0, 0x0) 20:18:50 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000001200)='net/netlink\x00') preadv(r1, &(0x7f00000006c0)=[{&(0x7f0000000040)=""/123, 0x7b}, {&(0x7f00000000c0)=""/22, 0x16}, {&(0x7f0000000140)=""/127, 0x7f}], 0x3, 0x8, 0x0) 20:18:50 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3f2}, 0x38}}, 0x0) 20:18:50 executing program 4: r0 = socket$inet(0x10, 0x80002, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x2) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="24000000210007041dfffd946f610500020000e8fe02080800010800080006000400ff7e", 0x24}], 0x1}, 0x0) 20:18:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x1e28, &(0x7f0000000080)={0x0, 0x0, 0x1}, &(0x7f0000ff3000/0x3000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_setup(0x75cc, &(0x7f0000000300), &(0x7f00003b2000/0x1000)=nil, &(0x7f00006d6000/0x2000)=nil, &(0x7f0000000180), 0x0) r4 = open(&(0x7f0000000280)='./bus\x00', 0x4042, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r4, 0x0, 0x0}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f00000001c0)=@IORING_OP_READ_FIXED, 0xfffffff7) syz_io_uring_setup(0x69de, &(0x7f00000003c0), &(0x7f00008e0000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000440), &(0x7f0000000000)=0x0) syz_io_uring_submit(r2, r5, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) io_uring_enter(r1, 0x450c, 0x0, 0x0, 0x0, 0x34) 20:18:50 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f00000001c0)='.', 0x0, 0x5010, 0x0) 20:18:50 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000000)={0x0, {{0x2, 0x0, @dev}}, 0x0, 0x1, [{{0xa, 0x0, @broadcast}}]}, 0x110) 20:18:50 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000001400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(r0, &(0x7f00000004c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) 20:18:50 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x20000009}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 20:18:50 executing program 5: sendmsg$NL80211_CMD_GET_PROTOCOL_FEATURES(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) syz_mount_image$msdos(&(0x7f0000000200), &(0x7f00000003c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000000040)="eb3d18", 0x41}], 0x0, &(0x7f0000000080)={[{@fat=@dos1xfloppy}]}) 20:18:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000100)={0x800001a, 0x0, 0x0, 0x0, 0x0, "2959f5f20fb8000000000f10e7ffffe10300"}) 20:18:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x1e28, &(0x7f0000000080)={0x0, 0x0, 0x1}, &(0x7f0000ff3000/0x3000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_setup(0x75cc, &(0x7f0000000300), &(0x7f00003b2000/0x1000)=nil, &(0x7f00006d6000/0x2000)=nil, &(0x7f0000000180), 0x0) r4 = open(&(0x7f0000000280)='./bus\x00', 0x4042, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r4, 0x0, 0x0}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f00000001c0)=@IORING_OP_READ_FIXED, 0xfffffff7) syz_io_uring_setup(0x69de, &(0x7f00000003c0), &(0x7f00008e0000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000440), &(0x7f0000000000)=0x0) syz_io_uring_submit(r2, r5, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) io_uring_enter(r1, 0x450c, 0x0, 0x0, 0x0, 0x34) 20:18:50 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGBITSND(r0, 0x80044502, 0x0) 20:18:50 executing program 0: creat(&(0x7f00000000c0)='./control\x00', 0x0) r0 = inotify_init() r1 = epoll_create(0x200008) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00007a8000)={0xb000001d}) r2 = inotify_add_watch(r0, &(0x7f0000000000)='./control\x00', 0x70) epoll_wait(r1, &(0x7f0000000040)=[{}], 0x39f, 0xc36) inotify_rm_watch(r0, r2) 20:18:50 executing program 5: sendmsg$NL80211_CMD_GET_PROTOCOL_FEATURES(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) syz_mount_image$msdos(&(0x7f0000000200), &(0x7f00000003c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000000040)="eb3d18", 0x41}], 0x0, &(0x7f0000000080)={[{@fat=@dos1xfloppy}]}) [ 766.598838][T30878] loop5: detected capacity change from 0 to 264192 [ 766.613439][T30878] FAT-fs (loop5): bogus number of reserved sectors [ 766.620009][T30878] FAT-fs (loop5): This doesn't look like a DOS 1.x volume; no bootstrapping code [ 766.629302][T30878] FAT-fs (loop5): Can't find a valid FAT filesystem 20:18:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x20, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0x8, 0x2, 0x0, 0x1, [{0x4, 0x3}]}]}, 0x20}}, 0x0) 20:18:50 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGBITSND(r0, 0x80044502, 0x0) 20:18:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x1e28, &(0x7f0000000080)={0x0, 0x0, 0x1}, &(0x7f0000ff3000/0x3000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_setup(0x75cc, &(0x7f0000000300), &(0x7f00003b2000/0x1000)=nil, &(0x7f00006d6000/0x2000)=nil, &(0x7f0000000180), 0x0) r4 = open(&(0x7f0000000280)='./bus\x00', 0x4042, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r4, 0x0, 0x0}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f00000001c0)=@IORING_OP_READ_FIXED, 0xfffffff7) syz_io_uring_setup(0x69de, &(0x7f00000003c0), &(0x7f00008e0000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000440), &(0x7f0000000000)=0x0) syz_io_uring_submit(r2, r5, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) io_uring_enter(r1, 0x450c, 0x0, 0x0, 0x0, 0x34) 20:18:50 executing program 5: sendmsg$NL80211_CMD_GET_PROTOCOL_FEATURES(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) syz_mount_image$msdos(&(0x7f0000000200), &(0x7f00000003c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000000040)="eb3d18", 0x41}], 0x0, &(0x7f0000000080)={[{@fat=@dos1xfloppy}]}) [ 766.718467][T30899] loop5: detected capacity change from 0 to 264192 [ 766.729130][T30899] FAT-fs (loop5): bogus number of reserved sectors [ 766.735671][T30899] FAT-fs (loop5): This doesn't look like a DOS 1.x volume; no bootstrapping code [ 766.744792][T30899] FAT-fs (loop5): Can't find a valid FAT filesystem 20:18:50 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x2) setsockopt$inet6_int(r0, 0x29, 0x33, &(0x7f00000011c0)=0x9, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000008240)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000001040)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=""/129, 0x81}}], 0x1, 0x0, 0x0) [ 766.837722][T30922] loop5: detected capacity change from 0 to 264192 [ 766.848568][T30922] FAT-fs (loop5): bogus number of reserved sectors [ 766.855112][T30922] FAT-fs (loop5): This doesn't look like a DOS 1.x volume; no bootstrapping code [ 766.864251][T30922] FAT-fs (loop5): Can't find a valid FAT filesystem 20:18:51 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) rseq(&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5}, 0x20, 0x0, 0x0) rseq(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0xb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x8400, 0x8, 0x0, 0x2, 0x0, 0x7fff}, 0x0, 0xf, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file1\x00', 0x5, 0x4, &(0x7f0000003680)=[{&(0x7f0000000580)="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", 0x1000, 0x1000}, {&(0x7f0000001580)="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", 0x7ec, 0x3}, {&(0x7f0000002580)="fd6c466fb1c9869aec4a3ae03daf53fc26c505008b5d3dd42efea6f0054281cf84457191551e0d8e372533bdccd287c482f1b9ab342e0d1df719a885d97ca28aa9714e476742aeeef2bcfa8c3cc2cd045fb9de7c6a27fc3554c995885d5e23d9790514b3f904b588491c8cc5e652a0b51abc2f15b43fbbe7", 0x78, 0x42}, {0x0, 0x0, 0x5}], 0x2080, &(0x7f0000003700)={[{@sb={'sb', 0x3d, 0x4}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}, {@block_validity}, {@barrier_val}], [{@dont_appraise}, {@subj_user={'subj_user', 0x3d, '/dev/vcsu#\x00'}}, {@dont_appraise}, {@seclabel}, {@fsname={'fsname', 0x3d, '^@-'}}, {@audit}, {@subj_user={'subj_user', 0x3d, '/dev/vcsu#\x00'}}, {@appraise_type}, {@obj_type={'obj_type', 0x3d, '/dev/vcsu#\x00'}}]}) syz_open_dev$vcsu(0x0, 0xff, 0x500) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x1, 0x824b2}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x19404, 0x0) close(r0) 20:18:51 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='loginuid\x00') write$cgroup_devices(r0, &(0x7f0000000200)=ANY=[@ANYRESOCT], 0x9) preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/114, 0x72}], 0x1, 0x0, 0x0) 20:18:51 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGBITSND(r0, 0x80044502, 0x0) 20:18:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x1e28, &(0x7f0000000080)={0x0, 0x0, 0x1}, &(0x7f0000ff3000/0x3000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_setup(0x75cc, &(0x7f0000000300), &(0x7f00003b2000/0x1000)=nil, &(0x7f00006d6000/0x2000)=nil, &(0x7f0000000180), 0x0) r4 = open(&(0x7f0000000280)='./bus\x00', 0x4042, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r4, 0x0, 0x0}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f00000001c0)=@IORING_OP_READ_FIXED, 0xfffffff7) syz_io_uring_setup(0x69de, &(0x7f00000003c0), &(0x7f00008e0000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000440), &(0x7f0000000000)=0x0) syz_io_uring_submit(r2, r5, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) io_uring_enter(r1, 0x450c, 0x0, 0x0, 0x0, 0x34) 20:18:51 executing program 2: sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000029001f4d154a817393278bff0c80a57802000000000484001403", 0x1e, 0x0, 0x0, 0x0) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000280)=ANY=[@ANYBLOB="f4a4c500", @ANYRES16=0x0, @ANYBLOB="0000000000000000000001080000c80000000000088797af0407000000007f00000199afb9dcd5bc796508000300edb5000074000000200004000a000000000000000000000004000000ffff0000bc67000040000000240002002cae60f5dd0570bbf48bf233fba1a9b017538688b5095343e13f2c7be6c565a82400010a270000004ca48ebbfaff226bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb4e00000000000000000003000008024000100e00000010000000000aaaaaaaaa2aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa0800030001"], 0x3}}, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000031001f00040000eb1b849ad502", 0x11, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="cbae00001a", 0x5, 0x0, 0x0, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0xe585, 0x800, 0x0, 0x4b6ae4f95a5de371) 20:18:51 executing program 5: sendmsg$NL80211_CMD_GET_PROTOCOL_FEATURES(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) syz_mount_image$msdos(&(0x7f0000000200), &(0x7f00000003c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000000040)="eb3d18", 0x41}], 0x0, &(0x7f0000000080)={[{@fat=@dos1xfloppy}]}) [ 767.480682][T30946] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 767.487629][T30949] loop5: detected capacity change from 0 to 264192 [ 767.488834][T30946] netlink: 43799 bytes leftover after parsing attributes in process `syz-executor.2'. [ 767.498366][T30949] FAT-fs (loop5): bogus number of reserved sectors [ 767.511444][T30949] FAT-fs (loop5): This doesn't look like a DOS 1.x volume; no bootstrapping code [ 767.520637][T30949] FAT-fs (loop5): Can't find a valid FAT filesystem 20:18:51 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x7) shmctl$SHM_UNLOCK(0x0, 0xc) munlockall() ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 20:18:51 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getsockopt$netlink(r0, 0x10e, 0xb, 0x0, &(0x7f0000000100)) 20:18:51 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGBITSND(r0, 0x80044502, 0x0) 20:18:51 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x440000, 0x30) r1 = syz_io_uring_setup(0x6b52, &(0x7f0000000080)={0x0, 0x0, 0x1, 0x3, 0x0, 0x0, r0}, &(0x7f0000000000/0x11000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r1, 0x4, 0x0, 0x1) syz_io_uring_submit(r2, r3, &(0x7f0000000100)=@IORING_OP_FADVISE={0x18, 0x5, 0x0, @fd_index=0x9, 0xea8, 0x0, 0x2, 0x5}, 0x2) io_uring_enter(r1, 0x3f3, 0x0, 0x9, 0x0, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x2000000, 0x13, r0, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000001c0)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x3, 0x0, r0}, 0x7) 20:18:51 executing program 2: r0 = socket(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f00000000c0)=0x1002, 0x4) setsockopt$inet_int(r0, 0x0, 0x12, &(0x7f0000000000)=0x3, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x2, 0x4e20}, 0x10) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x2001) [ 767.582544][T30950] loop4: detected capacity change from 0 to 32832 20:18:51 executing program 3: r0 = add_key(&(0x7f00000001c0)='id_legacy\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)="ac", 0x1, 0xfffffffffffffffc) keyctl$chown(0x4, r0, 0xee01, 0x0) keyctl$chown(0x4, r0, 0xffffffffffffffff, 0xee01) keyctl$setperm(0x5, r0, 0x8200100) keyctl$revoke(0x6, r0) [ 767.628583][T30950] loop4: p2 < > p4 [ 767.636831][T30950] loop4: p4 size 2097152 extends beyond EOD, truncated 20:18:51 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) rseq(&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5}, 0x20, 0x0, 0x0) rseq(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0xb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x8400, 0x8, 0x0, 0x2, 0x0, 0x7fff}, 0x0, 0xf, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file1\x00', 0x5, 0x4, &(0x7f0000003680)=[{&(0x7f0000000580)="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", 0x1000, 0x1000}, {&(0x7f0000001580)="1206f24ccf30d2fa340ad9375f012a2cfa7a8c8f899a5b6be68b10b094387bbe32646f1b122a5f13fc93534b59cafd3cd8f7a5f0174da275c2471cde94b18fbe6d7d77bc0a41ebc463f4cd20313ce6bdab52cdcd52cbdc47646454670a6f0a370baab2b1608e29cf2082963e4034bb965a6522885f80d3b76b94887f09cc938956d9371f04f78fd982da5668079524d1e4b06e070ecf3baa8a16f377b4c97a31e66d179b72aead5000347aec408c471c4082d2ca2031a53bbe7f76182551711ed3889f15455786055901aae216aa218b54e1bdfa0f14616081576477ec8eea3f3ae361c260a44acc8139836d3e1df390dbfde95f09cf702c1978af138a3ed8c0d9636b7ebd992d80196b0c0e3f7941185f042b817829ab9fd1d056b80c72764e867507917867270c4404c8bd4f25d3fbbff92693d7400bb35628711d46a7c81d69896959df33ed35710e7434c0bc48f3b587a6ef9c7f44e0b9266ef87e8bd4356908753163f6c868fc502ae60dc7e68d89a2eba3e81734e3089dff353f47b58d22ca5317ec06a2f0e837242675d42dca0fc03a6b457db8fc528b387d60676e6c7376e6004953c44f0dc2233dfa58469392e115e65bf0130c9cbdc40056176f5d1c57814c6cd73f19ee89e81748fd1d8f6c9c0b93d07dcfb915218afcbf8b9e4a1bbff074e749a6ecbb4f5c8fee8e2cebb0158272f82412f8854d8efd5ac4727fb42924a1c7dae1083e6c1ea116ba3022846acb5d023b340f6131c315c76f30ef52f7cbf3b7ee1c7ca17f29fc3c935e100da3afab23eb05afd93c2baa89d6178ccc02582c346e5eb7b80a0c434475b5c32ed7356afca77baa8accff60b7cde55bfaa7d475206e7978eb925ecdf9a9b7cfb0f598ffccbf61aef30c00be1e888518f1f9befdce482b31765ce859ff3c848e85c7bb6a658f7b64380516b8d705929b47877d45ac30421cf01fac6ab946251abe414438cb269a28b3622a2dad0590513d4593767584bf338f33fc053412aec9c23fe0e1cd3f8faaad7609f2e3db877368a4bb108b605651946c8a9191e45c83fa8ac7ff4423f43102afc7105969bf1358c8b1f420a675132dff3ace8aa1e1b30287f444d36c159f88b48444f288d903ab247f11b588408d100c14dabfe8fb85d010f2da07194f9dd405f6168a26d299f46e66104f6eb787e95ca969c87d67f28ab56262fca59a7730681d96821d358e269a55f2042927951696db3fdaf9e6455f25294c9fcc0e4b49414b6a4070f83e44b7861166f3cca6b3bbc950e4f2834511188d953dd9fb8159e87a2f00c85aee18ee219a9d52c4ed73ac39d67420f94722ed761ac4f110fb435f182af58e7b8e223473a82f948e9679dd4937f5949219f428e87b8da967c8d18f683b4ceaa0d0941557cce76f3077e2d19c7fc611a69733a30f018d435ca9ddcce9eaf90050d0f9e18a1152087301f426edc2699ffd52f56eae0ce434b311d0f10091e6f9fffd0a83d3601c1285042970cccc420f1845a0b7b8508e844256af9a08d4655e321644c084da24ae050bed3095e5a5b71183ae76e15e3462673cd57759042e3bfc1c1cae562a3cddaed9e34e093451b240baf8f2f8582d393889c7daaba2ae0be8383c2a18e13bbb48afca733d87fe9e8005e1f462aafc6ba3a5e3de665326fb7f4f486a44c2049c91b48b652bbea4b68b89c54d591d4218fd4eba720cf1a45a7bf3eff66396893d6afc8ea12c11d4ac5e2c83bb333f68914282a3799c68c07bac8313b226b7c3b8dbdd24bae96778d1792598507fbc5b63d3687df889748458aded1eb1e8bc31cf604dc88936a3311f1a0f113e1a5637ec3126641e549bc7f9f13a9888e42490a4684244ccf635a494c2c13dea65a09fabbd337b3362afa8c98281e95cc743b0e5d6d7c2392c99b8c2e12da10bbfc8fd18e008bab541ef4e65ca6a4b606b0105aa75943c0f46e3a60feeffa310f32996527d368e6893fcbc2ab5ebde7803aee16ec64995dbb46a8baa90b8482f0520fb8a591cb5c189c8add13775744704b218b3f28c018c482fd08eed0905aacd40679e13c11da9fcaddcda45b2231b3f5d466aae13e495b1e7eb8a9fdb19194302629789b33dd90c6c81cceaa2e30acc99323438f53e6cc9805a43c0be9ca0486490bf3a34c59fe9e92fd2bf9114b9ea1c0f20504714b7cffe957da0d0db95cbadad42caa3ace0b42c32adad3d4384e74aeac683aa04ad55492f5913e663810472cdf76c39d1ac084320446557d794b74c10cf239f0517b229c14f61b624f95d54860d8eb3a3ac2325990992db0f2b1c11d1701ad42ea877aa8f4bb8bfd9f96c5036b8bb46863ca12ddca50df98376700f3c1c57a6a65a35d50bd56f55a296c9913323c476e39daf19c8bec1d479cd092acf0095474d4ba62f7fbf54e6eb55a639147fefc8045a91766accaa09b75cd40a1e1578f70f27dd4d5f1c943ea41c736d967ff375ed903860f3d3c3dc0632fb7fbeab4753267b600b0b02d1cc9746b5c805d6d91bd4a4bff07bd9930829e1624c002174c69af15d8da0bb5b85de6dd62d350c6e0bba21a8735811708fc63f2c54eb173e5845d8f288d990d931f877c34fdb2d482623a11516c4dcdd27988a38c82ba9d591f3bb138015996afea7565012afe437a0988e8c36826e3c80670cb58e24e65a573dda4f5544b418a319298154fe02977ff282443fa480865048bd1dfdf49efb00127c7245c29f674be4e81710bbf950d2d9090ade9f8d5659b16ad97a7709fb87af0f3768dcaaeb62e038950743af0850fc8e3af5944a2a9f465757ace389142bd74b3e388659cc4d1aaa866b5c9b4c065fa3239977150772b7a8ca54dc5dc88950a2fbc3", 0x7ec, 0x3}, {&(0x7f0000002580)="fd6c466fb1c9869aec4a3ae03daf53fc26c505008b5d3dd42efea6f0054281cf84457191551e0d8e372533bdccd287c482f1b9ab342e0d1df719a885d97ca28aa9714e476742aeeef2bcfa8c3cc2cd045fb9de7c6a27fc3554c995885d5e23d9790514b3f904b588491c8cc5e652a0b51abc2f15b43fbbe7", 0x78, 0x42}, {0x0, 0x0, 0x5}], 0x2080, &(0x7f0000003700)={[{@sb={'sb', 0x3d, 0x4}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}, {@block_validity}, {@barrier_val}], [{@dont_appraise}, {@subj_user={'subj_user', 0x3d, '/dev/vcsu#\x00'}}, {@dont_appraise}, {@seclabel}, {@fsname={'fsname', 0x3d, '^@-'}}, {@audit}, {@subj_user={'subj_user', 0x3d, '/dev/vcsu#\x00'}}, {@appraise_type}, {@obj_type={'obj_type', 0x3d, '/dev/vcsu#\x00'}}]}) syz_open_dev$vcsu(0x0, 0xff, 0x500) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x1, 0x824b2}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x19404, 0x0) close(r0) 20:18:51 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x8724) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000100)=""/184, 0xffffffe8, 0x40012500, 0x0, 0xffffffffffffff49) 20:18:51 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000080)=@other={'lock', ' ', 'io'}, 0x8) write$vga_arbiter(r0, &(0x7f0000000040)=@other={'lock', ' ', 'io'}, 0x8) close(r0) 20:18:51 executing program 3: keyctl$session_to_parent(0x12) 20:18:51 executing program 1: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) r3 = socket$inet6(0xa, 0x400000000803, 0x5f) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x0, @mcast2}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) 20:18:51 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r1, r0, 0x0) [ 767.814954][T31002] loop4: detected capacity change from 0 to 32832 [ 767.877825][T31002] loop4: p2 < > p4 [ 767.888776][T31002] loop4: p4 size 2097152 extends beyond EOD, truncated 20:18:52 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x7) shmctl$SHM_UNLOCK(0x0, 0xc) munlockall() ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 20:18:52 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl(r0, 0x937b, &(0x7f00000000c0)="010000000000000018") 20:18:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x20012, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) mount(&(0x7f0000000040)=@md0, &(0x7f0000000080)='./bus\x00', &(0x7f0000000140)='configfs\x00', 0x0, 0x0) 20:18:52 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) rseq(&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5}, 0x20, 0x0, 0x0) rseq(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0xb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x8400, 0x8, 0x0, 0x2, 0x0, 0x7fff}, 0x0, 0xf, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file1\x00', 0x5, 0x4, &(0x7f0000003680)=[{&(0x7f0000000580)="6f01a72254601926fa9b8e96b81e7b50edb0723873e848ab18ddf27c719233390fec00e8a5d34a7d475daeeb68f9d7a32ebfec6406f4593e0e25e4d155a499db608480af3d656f80fd1979aff6ac491961626c402976840f89d8b33442212ae55958da6cd4e7ba0cdf9d3f1b4098e6f59a1749956ec5a2b2b8283a67b59dcd246ca9e4901462ac864ea42c6d30a81e4584669a6ba69e4214a96436b12130779fd14ad33a47c6dc5c12cf4c51633d2955de39dfa8a813e13245f295ab5a692b415348508b8f92a3796d831b0b0b255791823fee0fa8a14367683c42ecbc636bdb28b993b373589cafb2e1488506ed7798c606b53598d4b9d3e74bff446dbf6cc4e44eb6beee81d30dfa0effaa0c0d321957199a897d79a96b288d355a3f02d841c8bc360c8083b9464c9d5da645a32ae0ce7260c1fb4fd6f80bffb01745be27416a3461f82e5785c67731fad2c5c1b3ec91cc68410a1ee6ca32d4c3d58616d699ad195a1f27c34251c91031beded7f7e79d821f6710f3a62ad5e33ee617be76a3eda52c44d664575ddc57e926c628a3191fdfc8d7dbbf89cf5254d23d83b82b4d4ffebe007c5423cdaa11ca751a5ed763d8fd74a407abf31e84b6cac9bda3fd3a165f3af1f13ed7a741aa3a5b4adf4c96e2a42251fc92962e16665ddfb418347071f0ca0b7cc596908fd19b4787af17b1aea23b7d8119679c0c27daa20db9d0087d0945399a23166ea50914c61bac5fffc78f1102acd60e9aed34c2e39f7462cecbc10eb61e23d790e6d3097854d1d4a88479b3f4656117233311eed04862e66a864a5f332d4184e75b16d02220725dac1ca08137e2f3d1b731b9127485106b23ee38efbca12344e066c16a7bf30267c34a1f51ce08706f5b2fbb8da251111007d39d6ac43b5b71ee8883cea6e0ee61a462da0933392fa26582c0283fca5f04049ea08f053d4a4087e9cc03c9e9cdd18cb0bc3fe7770164ada65e450d97454330bbb369488bc2b7d3bcc4d20b62a498975260f4a8b694f090d07b11f0f91803b93fc73537b3a918e4d343d38e87d25db9d60b5c71a9bed940f4c682bd78fe4ee8fc82dd82435e75796c58783de0360faf425cb1ee4c7b565b613ab46e3047edb348171ba0944f4f7c1e0840cd09f606e40dbad1b758628b3fcc29bfc5dcbfadfd62172c274d0211ca047c97f4bdc0faad703b7ff808e6146b335b5b3ee18d3741fbd35e70b8b600ccc630641e82b829c23c89c26d364a8e6d6e9b1ba97ecc433080802cd152c1b6bcf88c62d3457cf2de79345e651411537ced389b1365072fcbd9c3d2388abef51a977c92ee007e4b95d106e199242314725baca18adfbf667fa60bdc67aaba522dbdd71c23e48e2ce0b2db1b7a3c32ed8cb6fbaaeac9d947863d7fa4cb0d0ef2cce7baa2d8189d312399089e10f73c796b38a5805747b220adb7940cd8c5cc8c8451bf3c9d1b4f6226e57027e52e367dfa30372235e0dd71260f7c4da32c242297069c96ff4d7dded0576b6818332b7d66e27be7f4e53d6677d5d8c54d7ceef31b1168714774f3715c9f9e94ae41b49f1df1df1fa4ae8ec877b6b6751a1b1e55b975472177ea418dffd10cd50a47c750ee0188140392e486f5844b3fe1900eda754177136f7b5275c8a93375913369e4eacee65dab352ce67829d8688ca798f9af93be5abc86c2b44c6c5bfab52b5c7627d4a9f118fe6ca13acec0c382bc69047a33c528958c4683b09ef7dae4d71a1581e94b7a6e35f495007e1ca056d5ae20751084a28ad92b7da96047b2ddfaaf73748d10f96c371ca1d0c3280edc5b37c362383b6e6a25193fd069f77c83d92a7a33e297ccd4e25e801ed94fb9b3a7e50a39be024284d97975c386032504381db4f313188c901751371e978da31bc14b0f51aab50a6ec742f73d8231496f0c562ee8e29425e946c2dc6dde7d20d80cb62e0b76691cffdbbe3d0bd368a4c195727ab6f42ab652bed8f5d517edad695a97436ff642551dfa98c994b0550297431c4da79e013cf02f2850d7dfd65bc2944433e96765db1a6b2fd957b4a9d07073bb042c0aeefc3c4abe04af1fcacbb36b2c293c5838c773d1272fdec3902dfacc4bd672154f6ea661d0760331cac92ca58ed60d0e4c1ec0ea27d30f34dc82b467292a0daeac98079109f7576d337f3d9bf0ca0bf120fefaeb83b272d7a4c132ff6faa1e0fd9c54d298b98e5dc455e273d2c58370bfebab0620f3f33f9f5caf6e59471c03569ed0c5d2100b2432bce32122aea9cadb5f0a42d4975d026369d9a583ab747f62a0c5121e7efaed28e0a0e3c99da80a71f314139a8e9c2de06624e0e89b15e43989ffddd4ce44c88210cd1e5b80a81538b2a04d09da94d407f05e094d8fe25ebdd363b5b610f9e6c76a27f8637385f0f0f48b0e4a184f07674849c77336225c886098aa934a78f0d29c3ec8ec8757a742c65e77ed7bdd6bbf4d5137bbc1a2ac56c3c5a58581cb3290272be08a7c017e929bfe9f9d7981f37a75cfc958a78a4f46bf854ecd1a0fce79c69294d61d8bdcc08681eca465563b268e9ab9911179eb4e338fc668cbd80339a277d9b04eadee3386f5294ad3c36dcb629364152ae4282856df0a5f80fbd4f994ba0a4050a8145d7f3c637dbca61f9f508c9e2869f78aca62227c1cf1a38f83412f9d21b9def836595316a60b859a64e12e339b6ccbc1773f314a0bac6c31297b9093419c36f61861c797753106b50ad2644ef9aab1d9adf1b425607bb40dae49bc72ca429a8dbf54cfd7d529e92d0b5e5afd5b51f1af335f98e73c10f636d964c9053a53ed88fe586e448e63f7bf8b1ea595f097f6aa42a7e24bf73add4c3695e2faabe2b116d1a8a36f222eccc082b9ab6db564e5f192619ee124aaf78f59269f041c974df09cf866384c52854a6b80cdce5528de3acc945b3dccef5742d7e1b54d7c24e6fd77b570923956b80116195f3c97177002d52dfd0230bb06e01a6e2cfc41760bd8ea14557177808449ad24eb3c9cf13b82edddf85d02e3237947932a4baad919198aaa00dab7341f1dcba6612687c3aacc949b3bfbd0245949f04764f1091eed7bbd2245623dfedbfb8dc8e9e9ea5d9f8d84e927a9a770653961fe0386fda3658d38a83498ccbd7e177787ef401e3ec20d3e8476de56d017021dac42148af35c739257733375c83ed69cfe55b1a040382702ee364312d33c89d0483d011698bd3f6cf2e4fc168c0ee54c949f307a8e416eea356e69702c05942abaa20ed13b55e6f61d7fd90973a25ed7a2ee023a4ef3c66135a2f972b55357d69a59ba55bcc010f12b0c48a9aa5b16903919711f2ed13dc13d5af6240499483831f9d9b89896129ec3cd8a7bb2be8155da3785a3dbc552987f53128b875f0e003fc9b14a28ddfc196fcaacb2591e49f7d24ccb6d14c4574d0a7079a68f3748b04380216535a1ee5389c476cfa39224bc83ab8a2bfd3715c28c2c94f339d3c59037d32a4a8271fd0cc15ca5664d800499ee9c3be0f52e2fff5b24418a603d015897151109fd36f85681ab1ce9dc7a8bf33befdd8146b4d3a2d3917edfd1f968522d91a74dd7365088da85ab741988476c349726bbd8725b2111184567da99ad2f09076973151c00c3ba1d3393695900e285a80d50d2ea89369f04abe9ffaa8bc390a8186627c7e22ecf8a216d7a74ee768c204a525c6712c8e377037386e681ac7333c563c035a2e674ac8d24e0c51c01d39fbf3e9e9a28743db4e225634217a7f4de442ce1cc525b0ea79f7500c1ba9ede0e1eea28539a9064ad978c19abf62bbd2fb8f044123c1ccdacb9d05e805d520f701748d538870c409bf521d683ac82d98ffd0037c6212a27fda425777370ea7b74601b76055fcb052e5f8889c6d797b43a37050a0ea8d9f025db85a97e08b7c9bdacd4a4c9cb93827d7b4133266ac3683ce8ec6eb271f5e835df7dabdd77313c177bf4ed64cb49b0842d1bd942fa456fbb94ca1165ab0365b9d4f2e5e201350e49259835124a853a986413ba7b66ad349a22f0ad468cd0b9c28a7428d6377a19524858ae4edad05512acf4aa044526b39d46e30f8bc405addf8d8f826c33264ba3ae43b53f2fe844de1cb92a74efd6b3d270ea94759045f416be55d7c219ba95f7188310b83d97fdf82a44d868a854e88853dbaa4954b59cbd5731d7203c2f453e4ee7c181d36977c3c0be6996c88f5be928bfeee7c74ad9cb17b7e057e976ba6f33c8c58a6e907d4a892b747583a0a42cbe98e9721ecf95a1e0b8a6d3ceb9d48f975bc9515ba35a79cc6accf23e4c37eb22d286931d4568094d2ed357d2ee7ee258d6237484fe228d291941716dbf045651fe76da719ca655ea7aabdddce8e19bac89e841550627b734453ff74a984a1f5312df3d68dc204772308e367e928d022b79b580f9507228a25c7d9128651bc0902f9efed7a555f086b68cf16079cdda492f655aace51df34768293f8b4c2db526b36fb5f2e9f5887186023b67657eb12343d51dbc2f5aaff0be005385ba62be6d305af2d70d222f65a4b9b6ef247532eab032bd02382c9030de2868dcaf530a921f2d7478581604e8b17385a89c2f0b27c75a076bf50fbbf08b09f7ffde550e8c259527e56d480ccf99ed3f0451bec306d6fc8402837d2d3dfa54ad0f8be98d7feb6df57e1950044a2afb1a444dcc5f34080b1d9f5de15d2b13b28feaac7e7bf290ac449ebcfbc6a2a08cb26bd9237471d803d6a576baf5ee7441736591131890a698812b553c033cddb338af1455e6f407dc9ad0eb59ab98b556e909d6df75fe8a3c3776e19651a64e39e4c2547c87c58d846a389839731c60097736d03562a46a85005e029ef2f62d4a2a649985534d5bc5aa3b3d7259ac2bf178e89c0fa1b1d08a51fe65f1d514298437ddaf0cab070b8f25c32c1fcf141fa90eed92c1cc15ea4bf6c2b017ba2fb33a6b8f2853015e474e5d5ccd2622be0326635c5c6e9ff5bc4cea5d500bbe11d84d13a295d57d91acddc2cfd365625197f29583fcea029eb1104139af30c46f152a90dc54ba2875416d416ee5dd20b2b3b1b3a9a036f50f12ffd2686928f9151b6b9bf6951bb234b82b0ad51bf774e2172600631005e20d5b5a12a63b28abbe9558003d3a10ba746a07e43475df087df9cff184e70f88c98a9af9e038e496ca6c1d39d778c9285c120eb125996ecf6ae7bf97a3c6bade863c57f5f6defe23fdc84dd650186bd1fc8cabea1685b9d338362494c2beb8e8762c993e866b74f49a2a52600b759e3b1b675183b2709e943181baac9cf96facdaa5fa66db292ca675a1011978bb7d1afb7b34f8dbe0a35f1248f2c5a7bcdd79c4bdfd41375245a7a8c04e8dd8db1d91d3cac9f919b7f00c7c223bc2de054432bdec9fb4dfe1f2cb171b4ee1ca092fc4c2c17e2289663f7192978e07403f5f4c3792b5e59974fab5d226496a4fc8bb5ebc592a5bd7682529741f036b6a5ba397d7d9e000681d28b70edf563a6211d31cc8f9df5ca6136856a61332679c16c79095d26f760d947a29236914144f41363380c4983a47c1961faa7cebf7e655f4bbc90866ad7e2160016fe7aa1b70d73b2ca68a12fd7cb1d4dc983f3bb37773310c88951dd74f4298f6b0fb7ed3a928a5bce042b77a29d0171da9e1135c46daeb9cc5479ed86548c234e27b768d011971253a6f1032ff149c39168f2847e9be1e1175708b82fb7ad3a98c6c73575f3d002ad59a68387eb9abe1c3aa392729e88ccf726e2cc86f1b9d1435f05a1961eab05b3e4d1262e0efb116dab01a2c8", 0x1000, 0x1000}, {&(0x7f0000001580)="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", 0x7ec, 0x3}, {&(0x7f0000002580)="fd6c466fb1c9869aec4a3ae03daf53fc26c505008b5d3dd42efea6f0054281cf84457191551e0d8e372533bdccd287c482f1b9ab342e0d1df719a885d97ca28aa9714e476742aeeef2bcfa8c3cc2cd045fb9de7c6a27fc3554c995885d5e23d9790514b3f904b588491c8cc5e652a0b51abc2f15b43fbbe7", 0x78, 0x42}, {0x0, 0x0, 0x5}], 0x2080, &(0x7f0000003700)={[{@sb={'sb', 0x3d, 0x4}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}, {@block_validity}, {@barrier_val}], [{@dont_appraise}, {@subj_user={'subj_user', 0x3d, '/dev/vcsu#\x00'}}, {@dont_appraise}, {@seclabel}, {@fsname={'fsname', 0x3d, '^@-'}}, {@audit}, {@subj_user={'subj_user', 0x3d, '/dev/vcsu#\x00'}}, {@appraise_type}, {@obj_type={'obj_type', 0x3d, '/dev/vcsu#\x00'}}]}) syz_open_dev$vcsu(0x0, 0xff, 0x500) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x1, 0x824b2}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x19404, 0x0) close(r0) 20:18:52 executing program 5: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)=0x10) io_setup(0x202, &(0x7f0000000200)=0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) io_submit(r1, 0x0, &(0x7f0000000180)) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r1, 0x3b, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x4000}]) 20:18:52 executing program 1: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) sendto$inet(r0, &(0x7f0000000100)='q', 0x1, 0x810, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 20:18:52 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0x5, 0x2000) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x5452, &(0x7f0000000180)) 20:18:52 executing program 1: pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='sit0\x00', 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) write$binfmt_misc(r1, &(0x7f00000002c0)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000080)=0x2, 0xb5) recvfrom$inet(r2, 0x0, 0x2, 0x42, 0x0, 0x0) [ 768.249862][T31039] loop4: detected capacity change from 0 to 32832 20:18:52 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000040), r1) sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r2, 0x1}, 0x14}}, 0x0) 20:18:52 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x33, &(0x7f0000000200)=0x8, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f00000000c0)=""/15, &(0x7f0000000040)=0xf) [ 768.300187][T31039] loop4: p2 < > p4 [ 768.309401][T31039] loop4: p4 size 2097152 extends beyond EOD, truncated 20:18:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x115c40, &(0x7f0000000080)=ANY=[]) [ 768.408803][T31045] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 768.423358][T31039] __loop_clr_fd: partition scan of loop4 failed (rc=-16) [ 768.426783][T31064] blk_update_request: I/O error, dev loop4, sector 32640 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 768.443351][ T966] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 768.454321][ T966] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 768.462472][ T966] blk_update_request: I/O error, dev loop4, sector 32640 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 768.473738][ T966] Buffer I/O error on dev loop4p4, logical block 4080, async page read [ 768.482096][ T966] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 768.492993][ T966] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 768.504717][ T966] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 768.515608][ T966] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 768.523710][ T703] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 768.534918][ T703] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 768.543036][ T966] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 768.553939][ T966] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 768.562083][ T966] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 768.573053][ T966] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 768.581423][ T966] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 768.592319][ T966] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 768.600496][ T703] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 768.608642][ T703] Buffer I/O error on dev loop4p2, logical block 0, async page read 20:18:52 executing program 3: prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffb000/0x2000)=nil) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x5, 0xffffffffffffffff) 20:18:52 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r1, r0, 0x0) 20:18:52 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x7) shmctl$SHM_UNLOCK(0x0, 0xc) munlockall() ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 20:18:52 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000004c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x50, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x8}, @NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5}, {0x5}, {0x5}, {0x5, 0x3, 0x5}]}]}, 0x50}}, 0x0) 20:18:52 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) rseq(&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5}, 0x20, 0x0, 0x0) rseq(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0xb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x8400, 0x8, 0x0, 0x2, 0x0, 0x7fff}, 0x0, 0xf, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af54031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file1\x00', 0x5, 0x4, &(0x7f0000003680)=[{&(0x7f0000000580)="6f01a72254601926fa9b8e96b81e7b50edb0723873e848ab18ddf27c719233390fec00e8a5d34a7d475daeeb68f9d7a32ebfec6406f4593e0e25e4d155a499db608480af3d656f80fd1979aff6ac491961626c402976840f89d8b33442212ae55958da6cd4e7ba0cdf9d3f1b4098e6f59a1749956ec5a2b2b8283a67b59dcd246ca9e4901462ac864ea42c6d30a81e4584669a6ba69e4214a96436b12130779fd14ad33a47c6dc5c12cf4c51633d2955de39dfa8a813e13245f295ab5a692b415348508b8f92a3796d831b0b0b255791823fee0fa8a14367683c42ecbc636bdb28b993b373589cafb2e1488506ed7798c606b53598d4b9d3e74bff446dbf6cc4e44eb6beee81d30dfa0effaa0c0d321957199a897d79a96b288d355a3f02d841c8bc360c8083b9464c9d5da645a32ae0ce7260c1fb4fd6f80bffb01745be27416a3461f82e5785c67731fad2c5c1b3ec91cc68410a1ee6ca32d4c3d58616d699ad195a1f27c34251c91031beded7f7e79d821f6710f3a62ad5e33ee617be76a3eda52c44d664575ddc57e926c628a3191fdfc8d7dbbf89cf5254d23d83b82b4d4ffebe007c5423cdaa11ca751a5ed763d8fd74a407abf31e84b6cac9bda3fd3a165f3af1f13ed7a741aa3a5b4adf4c96e2a42251fc92962e16665ddfb418347071f0ca0b7cc596908fd19b4787af17b1aea23b7d8119679c0c27daa20db9d0087d0945399a23166ea50914c61bac5fffc78f1102acd60e9aed34c2e39f7462cecbc10eb61e23d790e6d3097854d1d4a88479b3f4656117233311eed04862e66a864a5f332d4184e75b16d02220725dac1ca08137e2f3d1b731b9127485106b23ee38efbca12344e066c16a7bf30267c34a1f51ce08706f5b2fbb8da251111007d39d6ac43b5b71ee8883cea6e0ee61a462da0933392fa26582c0283fca5f04049ea08f053d4a4087e9cc03c9e9cdd18cb0bc3fe7770164ada65e450d97454330bbb369488bc2b7d3bcc4d20b62a498975260f4a8b694f090d07b11f0f91803b93fc73537b3a918e4d343d38e87d25db9d60b5c71a9bed940f4c682bd78fe4ee8fc82dd82435e75796c58783de0360faf425cb1ee4c7b565b613ab46e3047edb348171ba0944f4f7c1e0840cd09f606e40dbad1b758628b3fcc29bfc5dcbfadfd62172c274d0211ca047c97f4bdc0faad703b7ff808e6146b335b5b3ee18d3741fbd35e70b8b600ccc630641e82b829c23c89c26d364a8e6d6e9b1ba97ecc433080802cd152c1b6bcf88c62d3457cf2de79345e651411537ced389b1365072fcbd9c3d2388abef51a977c92ee007e4b95d106e199242314725baca18adfbf667fa60bdc67aaba522dbdd71c23e48e2ce0b2db1b7a3c32ed8cb6fbaaeac9d947863d7fa4cb0d0ef2cce7baa2d8189d312399089e10f73c796b38a5805747b220adb7940cd8c5cc8c8451bf3c9d1b4f6226e57027e52e367dfa30372235e0dd71260f7c4da32c242297069c96ff4d7dded0576b6818332b7d66e27be7f4e53d6677d5d8c54d7ceef31b1168714774f3715c9f9e94ae41b49f1df1df1fa4ae8ec877b6b6751a1b1e55b975472177ea418dffd10cd50a47c750ee0188140392e486f5844b3fe1900eda754177136f7b5275c8a93375913369e4eacee65dab352ce67829d8688ca798f9af93be5abc86c2b44c6c5bfab52b5c7627d4a9f118fe6ca13acec0c382bc69047a33c528958c4683b09ef7dae4d71a1581e94b7a6e35f495007e1ca056d5ae20751084a28ad92b7da96047b2ddfaaf73748d10f96c371ca1d0c3280edc5b37c362383b6e6a25193fd069f77c83d92a7a33e297ccd4e25e801ed94fb9b3a7e50a39be024284d97975c386032504381db4f313188c901751371e978da31bc14b0f51aab50a6ec742f73d8231496f0c562ee8e29425e946c2dc6dde7d20d80cb62e0b76691cffdbbe3d0bd368a4c195727ab6f42ab652bed8f5d517edad695a97436ff642551dfa98c994b0550297431c4da79e013cf02f2850d7dfd65bc2944433e96765db1a6b2fd957b4a9d07073bb042c0aeefc3c4abe04af1fcacbb36b2c293c5838c773d1272fdec3902dfacc4bd672154f6ea661d0760331cac92ca58ed60d0e4c1ec0ea27d30f34dc82b467292a0daeac98079109f7576d337f3d9bf0ca0bf120fefaeb83b272d7a4c132ff6faa1e0fd9c54d298b98e5dc455e273d2c58370bfebab0620f3f33f9f5caf6e59471c03569ed0c5d2100b2432bce32122aea9cadb5f0a42d4975d026369d9a583ab747f62a0c5121e7efaed28e0a0e3c99da80a71f314139a8e9c2de06624e0e89b15e43989ffddd4ce44c88210cd1e5b80a81538b2a04d09da94d407f05e094d8fe25ebdd363b5b610f9e6c76a27f8637385f0f0f48b0e4a184f07674849c77336225c886098aa934a78f0d29c3ec8ec8757a742c65e77ed7bdd6bbf4d5137bbc1a2ac56c3c5a58581cb3290272be08a7c017e929bfe9f9d7981f37a75cfc958a78a4f46bf854ecd1a0fce79c69294d61d8bdcc08681eca465563b268e9ab9911179eb4e338fc668cbd80339a277d9b04eadee3386f5294ad3c36dcb629364152ae4282856df0a5f80fbd4f994ba0a4050a8145d7f3c637dbca61f9f508c9e2869f78aca62227c1cf1a38f83412f9d21b9def836595316a60b859a64e12e339b6ccbc1773f314a0bac6c31297b9093419c36f61861c797753106b50ad2644ef9aab1d9adf1b425607bb40dae49bc72ca429a8dbf54cfd7d529e92d0b5e5afd5b51f1af335f98e73c10f636d964c9053a53ed88fe586e448e63f7bf8b1ea595f097f6aa42a7e24bf73add4c3695e2faabe2b116d1a8a36f222eccc082b9ab6db564e5f192619ee124aaf78f59269f041c974df09cf866384c52854a6b80cdce5528de3acc945b3dccef5742d7e1b54d7c24e6fd77b570923956b80116195f3c97177002d52dfd0230bb06e01a6e2cfc41760bd8ea14557177808449ad24eb3c9cf13b82edddf85d02e3237947932a4baad919198aaa00dab7341f1dcba6612687c3aacc949b3bfbd0245949f04764f1091eed7bbd2245623dfedbfb8dc8e9e9ea5d9f8d84e927a9a770653961fe0386fda3658d38a83498ccbd7e177787ef401e3ec20d3e8476de56d017021dac42148af35c739257733375c83ed69cfe55b1a040382702ee364312d33c89d0483d011698bd3f6cf2e4fc168c0ee54c949f307a8e416eea356e69702c05942abaa20ed13b55e6f61d7fd90973a25ed7a2ee023a4ef3c66135a2f972b55357d69a59ba55bcc010f12b0c48a9aa5b16903919711f2ed13dc13d5af6240499483831f9d9b89896129ec3cd8a7bb2be8155da3785a3dbc552987f53128b875f0e003fc9b14a28ddfc196fcaacb2591e49f7d24ccb6d14c4574d0a7079a68f3748b04380216535a1ee5389c476cfa39224bc83ab8a2bfd3715c28c2c94f339d3c59037d32a4a8271fd0cc15ca5664d800499ee9c3be0f52e2fff5b24418a603d015897151109fd36f85681ab1ce9dc7a8bf33befdd8146b4d3a2d3917edfd1f968522d91a74dd7365088da85ab741988476c349726bbd8725b2111184567da99ad2f09076973151c00c3ba1d3393695900e285a80d50d2ea89369f04abe9ffaa8bc390a8186627c7e22ecf8a216d7a74ee768c204a525c6712c8e377037386e681ac7333c563c035a2e674ac8d24e0c51c01d39fbf3e9e9a28743db4e225634217a7f4de442ce1cc525b0ea79f7500c1ba9ede0e1eea28539a9064ad978c19abf62bbd2fb8f044123c1ccdacb9d05e805d520f701748d538870c409bf521d683ac82d98ffd0037c6212a27fda425777370ea7b74601b76055fcb052e5f8889c6d797b43a37050a0ea8d9f025db85a97e08b7c9bdacd4a4c9cb93827d7b4133266ac3683ce8ec6eb271f5e835df7dabdd77313c177bf4ed64cb49b0842d1bd942fa456fbb94ca1165ab0365b9d4f2e5e201350e49259835124a853a986413ba7b66ad349a22f0ad468cd0b9c28a7428d6377a19524858ae4edad05512acf4aa044526b39d46e30f8bc405addf8d8f826c33264ba3ae43b53f2fe844de1cb92a74efd6b3d270ea94759045f416be55d7c219ba95f7188310b83d97fdf82a44d868a854e88853dbaa4954b59cbd5731d7203c2f453e4ee7c181d36977c3c0be6996c88f5be928bfeee7c74ad9cb17b7e057e976ba6f33c8c58a6e907d4a892b747583a0a42cbe98e9721ecf95a1e0b8a6d3ceb9d48f975bc9515ba35a79cc6accf23e4c37eb22d286931d4568094d2ed357d2ee7ee258d6237484fe228d291941716dbf045651fe76da719ca655ea7aabdddce8e19bac89e841550627b734453ff74a984a1f5312df3d68dc204772308e367e928d022b79b580f9507228a25c7d9128651bc0902f9efed7a555f086b68cf16079cdda492f655aace51df34768293f8b4c2db526b36fb5f2e9f5887186023b67657eb12343d51dbc2f5aaff0be005385ba62be6d305af2d70d222f65a4b9b6ef247532eab032bd02382c9030de2868dcaf530a921f2d7478581604e8b17385a89c2f0b27c75a076bf50fbbf08b09f7ffde550e8c259527e56d480ccf99ed3f0451bec306d6fc8402837d2d3dfa54ad0f8be98d7feb6df57e1950044a2afb1a444dcc5f34080b1d9f5de15d2b13b28feaac7e7bf290ac449ebcfbc6a2a08cb26bd9237471d803d6a576baf5ee7441736591131890a698812b553c033cddb338af1455e6f407dc9ad0eb59ab98b556e909d6df75fe8a3c3776e19651a64e39e4c2547c87c58d846a389839731c60097736d03562a46a85005e029ef2f62d4a2a649985534d5bc5aa3b3d7259ac2bf178e89c0fa1b1d08a51fe65f1d514298437ddaf0cab070b8f25c32c1fcf141fa90eed92c1cc15ea4bf6c2b017ba2fb33a6b8f2853015e474e5d5ccd2622be0326635c5c6e9ff5bc4cea5d500bbe11d84d13a295d57d91acddc2cfd365625197f29583fcea029eb1104139af30c46f152a90dc54ba2875416d416ee5dd20b2b3b1b3a9a036f50f12ffd2686928f9151b6b9bf6951bb234b82b0ad51bf774e2172600631005e20d5b5a12a63b28abbe9558003d3a10ba746a07e43475df087df9cff184e70f88c98a9af9e038e496ca6c1d39d778c9285c120eb125996ecf6ae7bf97a3c6bade863c57f5f6defe23fdc84dd650186bd1fc8cabea1685b9d338362494c2beb8e8762c993e866b74f49a2a52600b759e3b1b675183b2709e943181baac9cf96facdaa5fa66db292ca675a1011978bb7d1afb7b34f8dbe0a35f1248f2c5a7bcdd79c4bdfd41375245a7a8c04e8dd8db1d91d3cac9f919b7f00c7c223bc2de054432bdec9fb4dfe1f2cb171b4ee1ca092fc4c2c17e2289663f7192978e07403f5f4c3792b5e59974fab5d226496a4fc8bb5ebc592a5bd7682529741f036b6a5ba397d7d9e000681d28b70edf563a6211d31cc8f9df5ca6136856a61332679c16c79095d26f760d947a29236914144f41363380c4983a47c1961faa7cebf7e655f4bbc90866ad7e2160016fe7aa1b70d73b2ca68a12fd7cb1d4dc983f3bb37773310c88951dd74f4298f6b0fb7ed3a928a5bce042b77a29d0171da9e1135c46daeb9cc5479ed86548c234e27b768d011971253a6f1032ff149c39168f2847e9be1e1175708b82fb7ad3a98c6c73575f3d002ad59a68387eb9abe1c3aa392729e88ccf726e2cc86f1b9d1435f05a1961eab05b3e4d1262e0efb116dab01a2c8", 0x1000, 0x1000}, {&(0x7f0000001580)="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", 0x7ec, 0x3}, {&(0x7f0000002580)="fd6c466fb1c9869aec4a3ae03daf53fc26c505008b5d3dd42efea6f0054281cf84457191551e0d8e372533bdccd287c482f1b9ab342e0d1df719a885d97ca28aa9714e476742aeeef2bcfa8c3cc2cd045fb9de7c6a27fc3554c995885d5e23d9790514b3f904b588491c8cc5e652a0b51abc2f15b43fbbe7", 0x78, 0x42}, {0x0, 0x0, 0x5}], 0x2080, &(0x7f0000003700)={[{@sb={'sb', 0x3d, 0x4}}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}, {@block_validity}, {@barrier_val}], [{@dont_appraise}, {@subj_user={'subj_user', 0x3d, '/dev/vcsu#\x00'}}, {@dont_appraise}, {@seclabel}, {@fsname={'fsname', 0x3d, '^@-'}}, {@audit}, {@subj_user={'subj_user', 0x3d, '/dev/vcsu#\x00'}}, {@appraise_type}, {@obj_type={'obj_type', 0x3d, '/dev/vcsu#\x00'}}]}) syz_open_dev$vcsu(0x0, 0xff, 0x500) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x1, 0x824b2}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x19404, 0x0) close(r0) 20:18:52 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x101}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r4, 0x0, 0x10000, 0x0) vmsplice(r3, &(0x7f00000004c0)=[{&(0x7f00000002c0)='%', 0x1}], 0x1, 0x0) writev(r4, &(0x7f0000000000)=[{&(0x7f00000003c0)="05", 0x1}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0x10034) 20:18:52 executing program 3: prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffb000/0x2000)=nil) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x5, 0xffffffffffffffff) [ 768.745613][T31088] loop4: detected capacity change from 0 to 32832 [ 768.754229][ T25] kauditd_printk_skb: 630 callbacks suppressed [ 768.754241][ T25] audit: type=1326 audit(1619381932.646:5719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=31087 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 20:18:52 executing program 3: prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffb000/0x2000)=nil) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x5, 0xffffffffffffffff) [ 768.807463][T31088] loop4: p2 < > p4 [ 768.814231][T31088] loop4: p4 size 2097152 extends beyond EOD, truncated 20:18:55 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x4, 0x3004}, 0x4) 20:18:55 executing program 3: prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffb000/0x2000)=nil) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x5, 0xffffffffffffffff) 20:18:55 executing program 1: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) fstat(r2, &(0x7f00000024c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, r3) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fsetxattr$security_selinux(r0, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:mqueue_spool_t:s0\x00', 0xe, 0x0) 20:18:55 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r1, r0, 0x0) 20:18:55 executing program 5: r0 = msgget$private(0x0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000140)={{0x0, 0xee01, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 20:18:55 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x7) shmctl$SHM_UNLOCK(0x0, 0xc) munlockall() ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 20:18:55 executing program 5: syz_read_part_table(0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac00000000000f000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 20:18:55 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x456a4056fdf54672) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="2321a598ce2e713c090a"], 0x35) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 20:18:55 executing program 1: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) fstat(r2, &(0x7f00000024c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, r3) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fsetxattr$security_selinux(r0, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:mqueue_spool_t:s0\x00', 0xe, 0x0) [ 771.338806][ T25] audit: type=1326 audit(1619381935.236:5720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=31125 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 771.375785][T31134] SELinux: Context system_u:objec is not valid (left unmapped). 20:18:55 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000002c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000040), 0x12) r3 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 20:18:55 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000040)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f00000000c0)={r1, 0x1, r0}) 20:18:55 executing program 1: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) fstat(r2, &(0x7f00000024c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, r3) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fsetxattr$security_selinux(r0, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:mqueue_spool_t:s0\x00', 0xe, 0x0) [ 771.433083][T31143] loop5: detected capacity change from 0 to 1 20:18:55 executing program 1: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) fstat(r2, &(0x7f00000024c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, r3) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fsetxattr$security_selinux(r0, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:mqueue_spool_t:s0\x00', 0xe, 0x0) 20:18:55 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGID(r0, 0x541b, 0x0) [ 771.501052][T31143] loop5: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p2 [ 771.501299][T31143] loop5: p1 start 10 is beyond EOD, truncated [ 771.594462][T31143] loop5: p2 size 2 extends beyond EOD, truncated 20:18:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000080), 0x0, 0x0) mmap(&(0x7f0000a05000/0x400000)=nil, 0x400000, 0x9, 0x8012, r0, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x1) [ 771.639075][T31143] loop5: p3 start 225 is beyond EOD, truncated [ 771.645338][T31143] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 771.653479][ T25] audit: type=1326 audit(1619381935.546:5721): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=31157 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 771.677914][T31143] loop5: p5 start 10 is beyond EOD, truncated [ 771.681414][ T25] audit: type=1326 audit(1619381935.546:5722): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=31157 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=317 compat=0 ip=0x4665f9 code=0x7fc00000 [ 771.684087][T31143] loop5: p6 start 10 is beyond EOD, truncated [ 771.709244][ T25] audit: type=1326 audit(1619381935.546:5723): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=31157 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 771.714301][T31143] loop5: p7 start 10 is beyond EOD, truncated [ 771.744456][T31143] loop5: p8 start 10 is beyond EOD, truncated [ 771.750581][T31143] loop5: p9 start 10 is beyond EOD, truncated [ 771.756700][T31143] loop5: p10 start 10 is beyond EOD, truncated [ 771.762940][T31143] loop5: p11 start 10 is beyond EOD, truncated [ 771.769193][T31143] loop5: p12 start 10 is beyond EOD, truncated [ 771.775416][T31143] loop5: p13 start 10 is beyond EOD, truncated [ 771.779745][ T25] audit: type=1326 audit(1619381935.546:5724): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=31157 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 771.781572][T31143] loop5: p14 start 10 is beyond EOD, truncated [ 771.781589][T31143] loop5: p15 start 10 is beyond EOD, truncated [ 771.781602][T31143] loop5: p16 start 10 is beyond EOD, truncated [ 771.781619][T31143] loop5: p17 start 10 is beyond EOD, truncated [ 771.781630][T31143] loop5: p18 start 10 is beyond EOD, truncated [ 771.781663][T31143] loop5: p19 start 10 is beyond EOD, truncated [ 771.781674][T31143] loop5: p20 start 10 is beyond EOD, truncated [ 771.781685][T31143] loop5: p21 start 10 is beyond EOD, truncated [ 771.781697][T31143] loop5: p22 start 10 is beyond EOD, truncated [ 771.781708][T31143] loop5: p23 start 10 is beyond EOD, truncated [ 771.781719][T31143] loop5: p24 start 10 is beyond EOD, truncated [ 771.781730][T31143] loop5: p25 start 10 is beyond EOD, [ 771.840089][ T25] audit: type=1326 audit(1619381935.546:5725): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=31157 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 771.842962][T31143] truncated [ 771.842969][T31143] loop5: p26 start 10 is beyond EOD, truncated [ 771.842985][T31143] loop5: p27 start 10 is beyond EOD, [ 771.861405][ T25] audit: type=1326 audit(1619381935.546:5726): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=31157 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 771.861443][T31143] truncated [ 771.861450][T31143] loop5: p28 start 10 is beyond EOD, [ 771.876267][ T25] audit: type=1326 audit(1619381935.546:5727): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=31157 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 771.879116][T31143] truncated [ 771.913816][ T25] audit: type=1326 audit(1619381935.546:5728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=31157 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 771.917986][T31143] loop5: p29 start 10 is beyond EOD, truncated [ 771.918006][T31143] loop5: p30 start 10 is beyond EOD, truncated [ 772.014335][T31143] loop5: p31 start 10 is beyond EOD, truncated [ 772.020549][T31143] loop5: p32 start 10 is beyond EOD, truncated [ 772.026719][T31143] loop5: p33 start 10 is beyond EOD, truncated [ 772.032892][T31143] loop5: p34 start 10 is beyond EOD, truncated [ 772.039149][T31143] loop5: p35 start 10 is beyond EOD, truncated [ 772.045353][T31143] loop5: p36 start 10 is beyond EOD, truncated [ 772.051602][T31143] loop5: p37 start 10 is beyond EOD, truncated [ 772.057917][T31143] loop5: p38 start 10 is beyond EOD, truncated [ 772.064148][T31143] loop5: p39 start 10 is beyond EOD, truncated [ 772.070333][T31143] loop5: p40 start 10 is beyond EOD, truncated [ 772.076502][T31143] loop5: p41 start 10 is beyond EOD, truncated [ 772.082652][T31143] loop5: p42 start 10 is beyond EOD, truncated [ 772.088824][T31143] loop5: p43 start 10 is beyond EOD, truncated [ 772.095066][T31143] loop5: p44 start 10 is beyond EOD, truncated [ 772.101219][T31143] loop5: p45 start 10 is beyond EOD, truncated [ 772.107445][T31143] loop5: p46 start 10 is beyond EOD, truncated [ 772.113613][T31143] loop5: p47 start 10 is beyond EOD, truncated [ 772.119806][T31143] loop5: p48 start 10 is beyond EOD, truncated [ 772.125977][T31143] loop5: p49 start 10 is beyond EOD, truncated [ 772.132140][T31143] loop5: p50 start 10 is beyond EOD, truncated 20:18:56 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r1, r0, 0x0) 20:18:56 executing program 1: socketpair(0x10, 0x3, 0x2, &(0x7f0000000100)) 20:18:56 executing program 0: r0 = timerfd_create(0x0, 0x0) r1 = dup(r0) read$usbmon(r1, 0x0, 0x0) [ 772.138315][T31143] loop5: p51 start 10 is beyond EOD, truncated [ 772.144594][T31143] loop5: p52 start 10 is beyond EOD, truncated [ 772.150787][T31143] loop5: p53 start 10 is beyond EOD, truncated [ 772.156968][T31143] loop5: p54 start 10 is beyond EOD, truncated [ 772.163221][T31143] loop5: p55 start 10 is beyond EOD, truncated [ 772.169456][T31143] loop5: p56 start 10 is beyond EOD, truncated [ 772.175714][T31143] loop5: p57 start 10 is beyond EOD, truncated [ 772.181884][T31143] loop5: p58 start 10 is beyond EOD, truncated [ 772.188077][T31143] loop5: p59 start 10 is beyond EOD, truncated [ 772.194736][T31143] loop5: p60 start 10 is beyond EOD, truncated [ 772.200888][T31143] loop5: p61 start 10 is beyond EOD, truncated [ 772.207057][T31143] loop5: p62 start 10 is beyond EOD, truncated [ 772.213254][T31143] loop5: p63 start 10 is beyond EOD, truncated [ 772.219530][T31143] loop5: p64 start 10 is beyond EOD, truncated [ 772.225836][T31143] loop5: p65 start 10 is beyond EOD, truncated [ 772.231983][T31143] loop5: p66 start 10 is beyond EOD, truncated [ 772.238280][T31143] loop5: p67 start 10 is beyond EOD, truncated [ 772.244431][T31143] loop5: p68 start 10 is beyond EOD, truncated [ 772.250618][T31143] loop5: p69 start 10 is beyond EOD, truncated [ 772.256836][T31143] loop5: p70 start 10 is beyond EOD, truncated [ 772.262997][T31143] loop5: p71 start 10 is beyond EOD, truncated [ 772.269181][T31143] loop5: p72 start 10 is beyond EOD, truncated [ 772.275450][T31143] loop5: p73 start 10 is beyond EOD, truncated [ 772.281604][T31143] loop5: p74 start 10 is beyond EOD, truncated [ 772.287798][T31143] loop5: p75 start 10 is beyond EOD, truncated [ 772.294095][T31143] loop5: p76 start 10 is beyond EOD, truncated [ 772.300282][T31143] loop5: p77 start 10 is beyond EOD, truncated [ 772.306458][T31143] loop5: p78 start 10 is beyond EOD, truncated [ 772.312613][T31143] loop5: p79 start 10 is beyond EOD, truncated [ 772.318901][T31143] loop5: p80 start 10 is beyond EOD, truncated [ 772.325125][T31143] loop5: p81 start 10 is beyond EOD, truncated [ 772.331366][T31143] loop5: p82 start 10 is beyond EOD, truncated [ 772.337591][T31143] loop5: p83 start 10 is beyond EOD, truncated [ 772.343777][T31143] loop5: p84 start 10 is beyond EOD, truncated [ 772.350578][T31143] loop5: p85 start 10 is beyond EOD, truncated [ 772.356779][T31143] loop5: p86 start 10 is beyond EOD, truncated [ 772.363062][T31143] loop5: p87 start 10 is beyond EOD, truncated [ 772.369248][T31143] loop5: p88 start 10 is beyond EOD, truncated [ 772.375523][T31143] loop5: p89 start 10 is beyond EOD, truncated [ 772.381680][T31143] loop5: p90 start 10 is beyond EOD, truncated [ 772.387835][T31143] loop5: p91 start 10 is beyond EOD, truncated [ 772.394034][T31143] loop5: p92 start 10 is beyond EOD, truncated [ 772.400408][T31143] loop5: p93 start 10 is beyond EOD, truncated [ 772.406665][T31143] loop5: p94 start 10 is beyond EOD, truncated [ 772.412817][T31143] loop5: p95 start 10 is beyond EOD, truncated [ 772.418973][T31143] loop5: p96 start 10 is beyond EOD, truncated [ 772.425331][T31143] loop5: p97 start 10 is beyond EOD, truncated [ 772.431489][T31143] loop5: p98 start 10 is beyond EOD, truncated [ 772.437680][T31143] loop5: p99 start 10 is beyond EOD, truncated [ 772.443832][T31143] loop5: p100 start 10 is beyond EOD, truncated [ 772.450089][T31143] loop5: p101 start 10 is beyond EOD, truncated [ 772.456392][T31143] loop5: p102 start 10 is beyond EOD, truncated [ 772.462625][T31143] loop5: p103 start 10 is beyond EOD, truncated [ 772.468971][T31143] loop5: p104 start 10 is beyond EOD, truncated [ 772.475251][T31143] loop5: p105 start 10 is beyond EOD, truncated [ 772.481502][T31143] loop5: p106 start 10 is beyond EOD, truncated [ 772.487770][T31143] loop5: p107 start 10 is beyond EOD, truncated [ 772.494079][T31143] loop5: p108 start 10 is beyond EOD, truncated [ 772.500337][T31143] loop5: p109 start 10 is beyond EOD, truncated [ 772.506951][T31143] loop5: p110 start 10 is beyond EOD, truncated [ 772.513194][T31143] loop5: p111 start 10 is beyond EOD, truncated [ 772.519491][T31143] loop5: p112 start 10 is beyond EOD, truncated [ 772.525848][T31143] loop5: p113 start 10 is beyond EOD, truncated [ 772.532128][T31143] loop5: p114 start 10 is beyond EOD, truncated [ 772.538381][T31143] loop5: p115 start 10 is beyond EOD, truncated [ 772.544927][T31143] loop5: p116 start 10 is beyond EOD, truncated [ 772.551373][T31143] loop5: p117 start 10 is beyond EOD, truncated [ 772.557631][T31143] loop5: p118 start 10 is beyond EOD, truncated [ 772.564104][T31143] loop5: p119 start 10 is beyond EOD, truncated [ 772.570447][T31143] loop5: p120 start 10 is beyond EOD, truncated [ 772.576919][T31143] loop5: p121 start 10 is beyond EOD, truncated [ 772.583188][T31143] loop5: p122 start 10 is beyond EOD, truncated [ 772.589470][T31143] loop5: p123 start 10 is beyond EOD, truncated [ 772.595767][T31143] loop5: p124 start 10 is beyond EOD, truncated [ 772.602100][T31143] loop5: p125 start 10 is beyond EOD, truncated [ 772.608711][T31143] loop5: p126 start 10 is beyond EOD, truncated [ 772.614981][T31143] loop5: p127 start 10 is beyond EOD, truncated [ 772.621243][T31143] loop5: p128 start 10 is beyond EOD, truncated [ 772.627506][T31143] loop5: p129 start 10 is beyond EOD, truncated [ 772.633753][T31143] loop5: p130 start 10 is beyond EOD, truncated [ 772.640000][T31143] loop5: p131 start 10 is beyond EOD, truncated [ 772.646260][T31143] loop5: p132 start 10 is beyond EOD, truncated [ 772.652492][T31143] loop5: p133 start 10 is beyond EOD, truncated [ 772.658755][T31143] loop5: p134 start 10 is beyond EOD, truncated [ 772.665029][T31143] loop5: p135 start 10 is beyond EOD, truncated [ 772.671411][T31143] loop5: p136 start 10 is beyond EOD, truncated [ 772.677673][T31143] loop5: p137 start 10 is beyond EOD, truncated [ 772.683947][T31143] loop5: p138 start 10 is beyond EOD, truncated [ 772.690281][T31143] loop5: p139 start 10 is beyond EOD, truncated [ 772.696743][T31143] loop5: p140 start 10 is beyond EOD, truncated [ 772.702985][T31143] loop5: p141 start 10 is beyond EOD, truncated [ 772.709234][T31143] loop5: p142 start 10 is beyond EOD, truncated [ 772.715630][T31143] loop5: p143 start 10 is beyond EOD, truncated [ 772.721865][T31143] loop5: p144 start 10 is beyond EOD, truncated [ 772.728123][T31143] loop5: p145 start 10 is beyond EOD, truncated [ 772.734366][T31143] loop5: p146 start 10 is beyond EOD, truncated [ 772.740613][T31143] loop5: p147 start 10 is beyond EOD, truncated [ 772.746925][T31143] loop5: p148 start 10 is beyond EOD, truncated [ 772.753186][T31143] loop5: p149 start 10 is beyond EOD, truncated [ 772.759437][T31143] loop5: p150 start 10 is beyond EOD, truncated [ 772.765729][T31143] loop5: p151 start 10 is beyond EOD, truncated [ 772.771968][T31143] loop5: p152 start 10 is beyond EOD, truncated [ 772.778304][T31143] loop5: p153 start 10 is beyond EOD, truncated [ 772.784533][T31143] loop5: p154 start 10 is beyond EOD, truncated [ 772.790771][T31143] loop5: p155 start 10 is beyond EOD, truncated [ 772.797108][T31143] loop5: p156 start 10 is beyond EOD, truncated [ 772.803454][T31143] loop5: p157 start 10 is beyond EOD, truncated [ 772.809692][T31143] loop5: p158 start 10 is beyond EOD, truncated [ 772.815990][T31143] loop5: p159 start 10 is beyond EOD, truncated [ 772.822242][T31143] loop5: p160 start 10 is beyond EOD, truncated [ 772.828728][T31143] loop5: p161 start 10 is beyond EOD, truncated [ 772.835007][T31143] loop5: p162 start 10 is beyond EOD, truncated [ 772.841291][T31143] loop5: p163 start 10 is beyond EOD, truncated [ 772.847562][T31143] loop5: p164 start 10 is beyond EOD, truncated [ 772.853943][T31143] loop5: p165 start 10 is beyond EOD, truncated [ 772.860250][T31143] loop5: p166 start 10 is beyond EOD, truncated [ 772.866509][T31143] loop5: p167 start 10 is beyond EOD, truncated [ 772.872774][T31143] loop5: p168 start 10 is beyond EOD, truncated [ 772.879019][T31143] loop5: p169 start 10 is beyond EOD, truncated [ 772.885294][T31143] loop5: p170 start 10 is beyond EOD, truncated [ 772.891621][T31143] loop5: p171 start 10 is beyond EOD, truncated [ 772.898114][T31143] loop5: p172 start 10 is beyond EOD, truncated [ 772.904376][T31143] loop5: p173 start 10 is beyond EOD, truncated [ 772.910803][T31143] loop5: p174 start 10 is beyond EOD, truncated [ 772.917088][T31143] loop5: p175 start 10 is beyond EOD, truncated [ 772.923318][T31143] loop5: p176 start 10 is beyond EOD, truncated [ 772.929580][T31143] loop5: p177 start 10 is beyond EOD, truncated [ 772.935960][T31143] loop5: p178 start 10 is beyond EOD, truncated [ 772.942228][T31143] loop5: p179 start 10 is beyond EOD, truncated [ 772.948614][T31143] loop5: p180 start 10 is beyond EOD, truncated [ 772.954898][T31143] loop5: p181 start 10 is beyond EOD, truncated [ 772.961153][T31143] loop5: p182 start 10 is beyond EOD, truncated [ 772.967411][T31143] loop5: p183 start 10 is beyond EOD, truncated [ 772.973848][T31143] loop5: p184 start 10 is beyond EOD, truncated [ 772.980106][T31143] loop5: p185 start 10 is beyond EOD, truncated [ 772.986431][T31143] loop5: p186 start 10 is beyond EOD, truncated [ 772.992767][T31143] loop5: p187 start 10 is beyond EOD, truncated [ 772.999022][T31143] loop5: p188 start 10 is beyond EOD, truncated [ 773.005337][T31143] loop5: p189 start 10 is beyond EOD, truncated [ 773.011600][T31143] loop5: p190 start 10 is beyond EOD, truncated [ 773.017850][T31143] loop5: p191 start 10 is beyond EOD, truncated [ 773.024093][T31143] loop5: p192 start 10 is beyond EOD, truncated [ 773.030387][T31143] loop5: p193 start 10 is beyond EOD, truncated [ 773.036695][T31143] loop5: p194 start 10 is beyond EOD, truncated [ 773.043123][T31143] loop5: p195 start 10 is beyond EOD, truncated [ 773.049404][T31143] loop5: p196 start 10 is beyond EOD, truncated [ 773.055709][T31143] loop5: p197 start 10 is beyond EOD, truncated [ 773.061951][T31143] loop5: p198 start 10 is beyond EOD, truncated [ 773.068214][T31143] loop5: p199 start 10 is beyond EOD, truncated [ 773.074608][T31143] loop5: p200 start 10 is beyond EOD, truncated [ 773.080934][T31143] loop5: p201 start 10 is beyond EOD, truncated [ 773.087197][T31143] loop5: p202 start 10 is beyond EOD, truncated [ 773.093439][T31143] loop5: p203 start 10 is beyond EOD, truncated [ 773.099765][T31143] loop5: p204 start 10 is beyond EOD, truncated [ 773.106022][T31143] loop5: p205 start 10 is beyond EOD, truncated [ 773.112319][T31143] loop5: p206 start 10 is beyond EOD, truncated [ 773.118573][T31143] loop5: p207 start 10 is beyond EOD, truncated [ 773.124838][T31143] loop5: p208 start 10 is beyond EOD, truncated [ 773.131087][T31143] loop5: p209 start 10 is beyond EOD, truncated [ 773.137349][T31143] loop5: p210 start 10 is beyond EOD, truncated [ 773.143630][T31143] loop5: p211 start 10 is beyond EOD, truncated [ 773.149887][T31143] loop5: p212 start 10 is beyond EOD, truncated [ 773.156164][T31143] loop5: p213 start 10 is beyond EOD, truncated [ 773.162510][T31143] loop5: p214 start 10 is beyond EOD, truncated [ 773.168807][T31143] loop5: p215 start 10 is beyond EOD, truncated [ 773.175133][T31143] loop5: p216 start 10 is beyond EOD, truncated [ 773.181397][T31143] loop5: p217 start 10 is beyond EOD, truncated [ 773.187642][T31143] loop5: p218 start 10 is beyond EOD, truncated [ 773.194088][T31143] loop5: p219 start 10 is beyond EOD, truncated [ 773.200337][T31143] loop5: p220 start 10 is beyond EOD, truncated [ 773.206648][T31143] loop5: p221 start 10 is beyond EOD, truncated [ 773.212893][T31143] loop5: p222 start 10 is beyond EOD, truncated [ 773.219150][T31143] loop5: p223 start 10 is beyond EOD, truncated [ 773.225518][T31143] loop5: p224 start 10 is beyond EOD, truncated [ 773.231844][T31143] loop5: p225 start 10 is beyond EOD, truncated [ 773.238086][T31143] loop5: p226 start 10 is beyond EOD, truncated [ 773.244355][T31143] loop5: p227 start 10 is beyond EOD, truncated [ 773.250634][T31143] loop5: p228 start 10 is beyond EOD, truncated [ 773.256915][T31143] loop5: p229 start 10 is beyond EOD, truncated [ 773.264337][T31143] loop5: p230 start 10 is beyond EOD, truncated [ 773.270605][T31143] loop5: p231 start 10 is beyond EOD, truncated [ 773.276916][T31143] loop5: p232 start 10 is beyond EOD, truncated [ 773.283148][T31143] loop5: p233 start 10 is beyond EOD, truncated [ 773.289394][T31143] loop5: p234 start 10 is beyond EOD, truncated [ 773.295692][T31143] loop5: p235 start 10 is beyond EOD, truncated [ 773.301944][T31143] loop5: p236 start 10 is beyond EOD, truncated [ 773.309100][T31143] loop5: p237 start 10 is beyond EOD, truncated [ 773.315466][T31143] loop5: p238 start 10 is beyond EOD, truncated [ 773.321701][T31143] loop5: p239 start 10 is beyond EOD, truncated [ 773.328060][T31143] loop5: p240 start 10 is beyond EOD, truncated [ 773.334361][T31143] loop5: p241 start 10 is beyond EOD, truncated [ 773.340899][T31143] loop5: p242 start 10 is beyond EOD, truncated [ 773.347491][T31143] loop5: p243 start 10 is beyond EOD, truncated [ 773.353822][T31143] loop5: p244 start 10 is beyond EOD, truncated [ 773.360081][T31143] loop5: p245 start 10 is beyond EOD, truncated [ 773.366397][T31143] loop5: p246 start 10 is beyond EOD, truncated [ 773.372640][T31143] loop5: p247 start 10 is beyond EOD, truncated [ 773.378897][T31143] loop5: p248 start 10 is beyond EOD, truncated [ 773.385163][T31143] loop5: p249 start 10 is beyond EOD, truncated [ 773.391834][T31143] loop5: p250 start 10 is beyond EOD, truncated [ 773.398163][T31143] loop5: p251 start 10 is beyond EOD, truncated [ 773.404457][T31143] loop5: p252 start 10 is beyond EOD, truncated [ 773.410780][T31143] loop5: p253 start 10 is beyond EOD, truncated [ 773.417188][T31143] loop5: p254 start 10 is beyond EOD, truncated [ 773.423484][T31143] loop5: p255 start 10 is beyond EOD, truncated [ 773.451388][ T1028] loop5: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p2 [ 773.451584][ T1028] loop5: p1 start 10 is beyond EOD, truncated [ 773.545290][ T1028] loop5: p2 size 2 extends beyond EOD, truncated [ 773.552324][ T1028] loop5: p3 start 225 is beyond EOD, truncated [ 773.558596][ T1028] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 773.566132][ T1028] loop5: p5 start 10 is beyond EOD, truncated [ 773.572307][ T1028] loop5: p6 start 10 is beyond EOD, truncated [ 773.578419][ T1028] loop5: p7 start 10 is beyond EOD, truncated [ 773.584476][ T1028] loop5: p8 start 10 is beyond EOD, truncated [ 773.590539][ T1028] loop5: p9 start 10 is beyond EOD, truncated [ 773.596620][ T1028] loop5: p10 start 10 is beyond EOD, truncated [ 773.602779][ T1028] loop5: p11 start 10 is beyond EOD, truncated [ 773.609055][ T1028] loop5: p12 start 10 is beyond EOD, truncated [ 773.615233][ T1028] loop5: p13 start 10 is beyond EOD, truncated [ 773.621427][ T1028] loop5: p14 start 10 is beyond EOD, truncated [ 773.627622][ T1028] loop5: p15 start 10 is beyond EOD, truncated [ 773.633777][ T1028] loop5: p16 start 10 is beyond EOD, truncated [ 773.640045][ T1028] loop5: p17 start 10 is beyond EOD, truncated [ 773.646227][ T1028] loop5: p18 start 10 is beyond EOD, truncated [ 773.652368][ T1028] loop5: p19 start 10 is beyond EOD, truncated [ 773.658530][ T1028] loop5: p20 start 10 is beyond EOD, truncated [ 773.664746][ T1028] loop5: p21 start 10 is beyond EOD, truncated [ 773.670903][ T1028] loop5: p22 start 10 is beyond EOD, truncated [ 773.677050][ T1028] loop5: p23 start 10 is beyond EOD, truncated [ 773.683195][ T1028] loop5: p24 start 10 is beyond EOD, truncated [ 773.689367][ T1028] loop5: p25 start 10 is beyond EOD, truncated [ 773.695534][ T1028] loop5: p26 start 10 is beyond EOD, truncated [ 773.701761][ T1028] loop5: p27 start 10 is beyond EOD, truncated [ 773.707925][ T1028] loop5: p28 start 10 is beyond EOD, truncated [ 773.714127][ T1028] loop5: p29 start 10 is beyond EOD, truncated [ 773.720282][ T1028] loop5: p30 start 10 is beyond EOD, truncated [ 773.726467][ T1028] loop5: p31 start 10 is beyond EOD, truncated [ 773.732612][ T1028] loop5: p32 start 10 is beyond EOD, truncated [ 773.738776][ T1028] loop5: p33 start 10 is beyond EOD, truncated [ 773.744963][ T1028] loop5: p34 start 10 is beyond EOD, truncated [ 773.751178][ T1028] loop5: p35 start 10 is beyond EOD, truncated [ 773.757360][ T1028] loop5: p36 start 10 is beyond EOD, truncated [ 773.763594][ T1028] loop5: p37 start 10 is beyond EOD, truncated [ 773.769813][ T1028] loop5: p38 start 10 is beyond EOD, truncated [ 773.775978][ T1028] loop5: p39 start 10 is beyond EOD, truncated [ 773.782194][ T1028] loop5: p40 start 10 is beyond EOD, truncated [ 773.788348][ T1028] loop5: p41 start 10 is beyond EOD, truncated [ 773.794620][ T1028] loop5: p42 start 10 is beyond EOD, truncated [ 773.800788][ T1028] loop5: p43 start 10 is beyond EOD, truncated [ 773.807106][ T1028] loop5: p44 start 10 is beyond EOD, truncated [ 773.813266][ T1028] loop5: p45 start 10 is beyond EOD, truncated [ 773.819442][ T1028] loop5: p46 start 10 is beyond EOD, truncated [ 773.825696][ T1028] loop5: p47 start 10 is beyond EOD, truncated [ 773.831942][ T1028] loop5: p48 start 10 is beyond EOD, truncated [ 773.838167][ T1028] loop5: p49 start 10 is beyond EOD, truncated [ 773.844370][ T1028] loop5: p50 start 10 is beyond EOD, truncated [ 773.850527][ T1028] loop5: p51 start 10 is beyond EOD, truncated [ 773.856712][ T1028] loop5: p52 start 10 is beyond EOD, truncated [ 773.862874][ T1028] loop5: p53 start 10 is beyond EOD, truncated [ 773.869127][ T1028] loop5: p54 start 10 is beyond EOD, truncated [ 773.875373][ T1028] loop5: p55 start 10 is beyond EOD, truncated [ 773.881675][ T1028] loop5: p56 start 10 is beyond EOD, truncated [ 773.887836][ T1028] loop5: p57 start 10 is beyond EOD, truncated [ 773.894058][ T1028] loop5: p58 start 10 is beyond EOD, truncated [ 773.900387][ T1028] loop5: p59 start 10 is beyond EOD, truncated [ 773.906579][ T1028] loop5: p60 start 10 is beyond EOD, truncated [ 773.912736][ T1028] loop5: p61 start 10 is beyond EOD, truncated [ 773.918923][ T1028] loop5: p62 start 10 is beyond EOD, truncated [ 773.925115][ T1028] loop5: p63 start 10 is beyond EOD, truncated [ 773.931312][ T1028] loop5: p64 start 10 is beyond EOD, truncated [ 773.937541][ T1028] loop5: p65 start 10 is beyond EOD, truncated [ 773.943959][ T1028] loop5: p66 start 10 is beyond EOD, truncated [ 773.950136][ T1028] loop5: p67 start 10 is beyond EOD, truncated [ 773.956360][ T1028] loop5: p68 start 10 is beyond EOD, truncated [ 773.962631][ T1028] loop5: p69 start 10 is beyond EOD, truncated [ 773.968809][ T1028] loop5: p70 start 10 is beyond EOD, truncated [ 773.975063][ T1028] loop5: p71 start 10 is beyond EOD, truncated [ 773.981235][ T1028] loop5: p72 start 10 is beyond EOD, truncated [ 773.987396][ T1028] loop5: p73 start 10 is beyond EOD, truncated [ 773.994088][ T1028] loop5: p74 start 10 is beyond EOD, truncated [ 774.000272][ T1028] loop5: p75 start 10 is beyond EOD, truncated [ 774.006446][ T1028] loop5: p76 start 10 is beyond EOD, truncated [ 774.012608][ T1028] loop5: p77 start 10 is beyond EOD, truncated [ 774.018778][ T1028] loop5: p78 start 10 is beyond EOD, truncated [ 774.024999][ T1028] loop5: p79 start 10 is beyond EOD, truncated [ 774.031155][ T1028] loop5: p80 start 10 is beyond EOD, truncated [ 774.037340][ T1028] loop5: p81 start 10 is beyond EOD, truncated [ 774.044282][ T1028] loop5: p82 start 10 is beyond EOD, truncated [ 774.050443][ T1028] loop5: p83 start 10 is beyond EOD, truncated [ 774.056634][ T1028] loop5: p84 start 10 is beyond EOD, truncated [ 774.062779][ T1028] loop5: p85 start 10 is beyond EOD, truncated [ 774.068992][ T1028] loop5: p86 start 10 is beyond EOD, truncated [ 774.075186][ T1028] loop5: p87 start 10 is beyond EOD, truncated [ 774.081461][ T1028] loop5: p88 start 10 is beyond EOD, truncated [ 774.087650][ T1028] loop5: p89 start 10 is beyond EOD, truncated [ 774.093822][ T1028] loop5: p90 start 10 is beyond EOD, truncated [ 774.100212][ T1028] loop5: p91 start 10 is beyond EOD, truncated [ 774.106406][ T1028] loop5: p92 start 10 is beyond EOD, truncated [ 774.115374][ T1028] loop5: p93 start 10 is beyond EOD, truncated [ 774.122293][ T1028] loop5: p94 start 10 is beyond EOD, truncated [ 774.128467][ T1028] loop5: p95 start 10 is beyond EOD, truncated [ 774.134682][ T1028] loop5: p96 start 10 is beyond EOD, truncated [ 774.140950][ T1028] loop5: p97 start 10 is beyond EOD, truncated [ 774.147114][ T1028] loop5: p98 start 10 is beyond EOD, truncated [ 774.153272][ T1028] loop5: p99 start 10 is beyond EOD, truncated [ 774.159457][ T1028] loop5: p100 start 10 is beyond EOD, truncated [ 774.165785][ T1028] loop5: p101 start 10 is beyond EOD, truncated [ 774.172096][ T1028] loop5: p102 start 10 is beyond EOD, truncated [ 774.178417][ T1028] loop5: p103 start 10 is beyond EOD, truncated [ 774.184681][ T1028] loop5: p104 start 10 is beyond EOD, truncated [ 774.190938][ T1028] loop5: p105 start 10 is beyond EOD, truncated [ 774.197172][ T1028] loop5: p106 start 10 is beyond EOD, truncated [ 774.203414][ T1028] loop5: p107 start 10 is beyond EOD, truncated [ 774.209665][ T1028] loop5: p108 start 10 is beyond EOD, truncated [ 774.215957][ T1028] loop5: p109 start 10 is beyond EOD, truncated [ 774.222516][ T1028] loop5: p110 start 10 is beyond EOD, truncated [ 774.228824][ T1028] loop5: p111 start 10 is beyond EOD, truncated [ 774.235179][ T1028] loop5: p112 start 10 is beyond EOD, truncated [ 774.241563][ T1028] loop5: p113 start 10 is beyond EOD, truncated [ 774.247810][ T1028] loop5: p114 start 10 is beyond EOD, truncated [ 774.254093][ T1028] loop5: p115 start 10 is beyond EOD, truncated [ 774.260492][ T1028] loop5: p116 start 10 is beyond EOD, truncated [ 774.266748][ T1028] loop5: p117 start 10 is beyond EOD, truncated [ 774.272981][ T1028] loop5: p118 start 10 is beyond EOD, truncated [ 774.279221][ T1028] loop5: p119 start 10 is beyond EOD, truncated [ 774.285486][ T1028] loop5: p120 start 10 is beyond EOD, truncated [ 774.291718][ T1028] loop5: p121 start 10 is beyond EOD, truncated [ 774.297957][ T1028] loop5: p122 start 10 is beyond EOD, truncated [ 774.304214][ T1028] loop5: p123 start 10 is beyond EOD, truncated [ 774.310481][ T1028] loop5: p124 start 10 is beyond EOD, truncated [ 774.316941][ T1028] loop5: p125 start 10 is beyond EOD, truncated [ 774.323895][ T1028] loop5: p126 start 10 is beyond EOD, truncated [ 774.330300][ T1028] loop5: p127 start 10 is beyond EOD, truncated [ 774.336611][ T1028] loop5: p128 start 10 is beyond EOD, truncated [ 774.342906][ T1028] loop5: p129 start 10 is beyond EOD, truncated [ 774.349156][ T1028] loop5: p130 start 10 is beyond EOD, truncated [ 774.355745][ T1028] loop5: p131 start 10 is beyond EOD, truncated [ 774.362104][ T1028] loop5: p132 start 10 is beyond EOD, truncated [ 774.368350][ T1028] loop5: p133 start 10 is beyond EOD, truncated [ 774.374723][ T1028] loop5: p134 start 10 is beyond EOD, truncated [ 774.381051][ T1028] loop5: p135 start 10 is beyond EOD, truncated [ 774.387308][ T1028] loop5: p136 start 10 is beyond EOD, truncated [ 774.393642][ T1028] loop5: p137 start 10 is beyond EOD, truncated [ 774.399975][ T1028] loop5: p138 start 10 is beyond EOD, truncated [ 774.406254][ T1028] loop5: p139 start 10 is beyond EOD, truncated [ 774.412499][ T1028] loop5: p140 start 10 is beyond EOD, truncated [ 774.418871][ T1028] loop5: p141 start 10 is beyond EOD, truncated [ 774.425238][ T1028] loop5: p142 start 10 is beyond EOD, truncated [ 774.431477][ T1028] loop5: p143 start 10 is beyond EOD, truncated [ 774.437905][ T1028] loop5: p144 start 10 is beyond EOD, truncated [ 774.444209][ T1028] loop5: p145 start 10 is beyond EOD, truncated [ 774.450466][ T1028] loop5: p146 start 10 is beyond EOD, truncated [ 774.456751][ T1028] loop5: p147 start 10 is beyond EOD, truncated [ 774.463944][ T1028] loop5: p148 start 10 is beyond EOD, truncated [ 774.470294][ T1028] loop5: p149 start 10 is beyond EOD, truncated [ 774.476558][ T1028] loop5: p150 start 10 is beyond EOD, truncated [ 774.482813][ T1028] loop5: p151 start 10 is beyond EOD, truncated [ 774.489070][ T1028] loop5: p152 start 10 is beyond EOD, truncated [ 774.495504][ T1028] loop5: p153 start 10 is beyond EOD, truncated [ 774.501809][ T1028] loop5: p154 start 10 is beyond EOD, truncated [ 774.508055][ T1028] loop5: p155 start 10 is beyond EOD, truncated [ 774.514371][ T1028] loop5: p156 start 10 is beyond EOD, truncated [ 774.520634][ T1028] loop5: p157 start 10 is beyond EOD, truncated [ 774.526934][ T1028] loop5: p158 start 10 is beyond EOD, truncated [ 774.533170][ T1028] loop5: p159 start 10 is beyond EOD, truncated [ 774.539432][ T1028] loop5: p160 start 10 is beyond EOD, truncated [ 774.545714][ T1028] loop5: p161 start 10 is beyond EOD, truncated [ 774.552256][ T1028] loop5: p162 start 10 is beyond EOD, truncated [ 774.558522][ T1028] loop5: p163 start 10 is beyond EOD, truncated [ 774.564821][ T1028] loop5: p164 start 10 is beyond EOD, truncated [ 774.571168][ T1028] loop5: p165 start 10 is beyond EOD, truncated [ 774.578015][ T1028] loop5: p166 start 10 is beyond EOD, truncated [ 774.584270][ T1028] loop5: p167 start 10 is beyond EOD, truncated [ 774.590524][ T1028] loop5: p168 start 10 is beyond EOD, truncated [ 774.596818][ T1028] loop5: p169 start 10 is beyond EOD, truncated [ 774.603065][ T1028] loop5: p170 start 10 is beyond EOD, truncated [ 774.609323][ T1028] loop5: p171 start 10 is beyond EOD, truncated [ 774.615646][ T1028] loop5: p172 start 10 is beyond EOD, truncated [ 774.621880][ T1028] loop5: p173 start 10 is beyond EOD, truncated [ 774.628150][ T1028] loop5: p174 start 10 is beyond EOD, truncated [ 774.634406][ T1028] loop5: p175 start 10 is beyond EOD, truncated [ 774.640833][ T1028] loop5: p176 start 10 is beyond EOD, truncated [ 774.647266][ T1028] loop5: p177 start 10 is beyond EOD, truncated [ 774.653502][ T1028] loop5: p178 start 10 is beyond EOD, truncated [ 774.659824][ T1028] loop5: p179 start 10 is beyond EOD, truncated [ 774.666087][ T1028] loop5: p180 start 10 is beyond EOD, truncated [ 774.672321][ T1028] loop5: p181 start 10 is beyond EOD, truncated [ 774.678583][ T1028] loop5: p182 start 10 is beyond EOD, truncated [ 774.684879][ T1028] loop5: p183 start 10 is beyond EOD, truncated [ 774.691186][ T1028] loop5: p184 start 10 is beyond EOD, truncated [ 774.697442][ T1028] loop5: p185 start 10 is beyond EOD, truncated [ 774.703747][ T1028] loop5: p186 start 10 is beyond EOD, truncated [ 774.710057][ T1028] loop5: p187 start 10 is beyond EOD, truncated [ 774.716358][ T1028] loop5: p188 start 10 is beyond EOD, truncated [ 774.722642][ T1028] loop5: p189 start 10 is beyond EOD, truncated [ 774.729029][ T1028] loop5: p190 start 10 is beyond EOD, truncated [ 774.735445][ T1028] loop5: p191 start 10 is beyond EOD, truncated [ 774.741707][ T1028] loop5: p192 start 10 is beyond EOD, truncated [ 774.747973][ T1028] loop5: p193 start 10 is beyond EOD, truncated [ 774.754420][ T1028] loop5: p194 start 10 is beyond EOD, truncated [ 774.760674][ T1028] loop5: p195 start 10 is beyond EOD, truncated [ 774.766955][ T1028] loop5: p196 start 10 is beyond EOD, truncated [ 774.773276][ T1028] loop5: p197 start 10 is beyond EOD, truncated [ 774.779531][ T1028] loop5: p198 start 10 is beyond EOD, truncated [ 774.785829][ T1028] loop5: p199 start 10 is beyond EOD, truncated [ 774.792460][ T1028] loop5: p200 start 10 is beyond EOD, truncated [ 774.798729][ T1028] loop5: p201 start 10 is beyond EOD, truncated [ 774.804999][ T1028] loop5: p202 start 10 is beyond EOD, truncated [ 774.811252][ T1028] loop5: p203 start 10 is beyond EOD, truncated [ 774.817497][ T1028] loop5: p204 start 10 is beyond EOD, truncated [ 774.823915][ T1028] loop5: p205 start 10 is beyond EOD, truncated [ 774.830190][ T1028] loop5: p206 start 10 is beyond EOD, truncated [ 774.836515][ T1028] loop5: p207 start 10 is beyond EOD, truncated [ 774.842781][ T1028] loop5: p208 start 10 is beyond EOD, truncated [ 774.849043][ T1028] loop5: p209 start 10 is beyond EOD, truncated [ 774.855439][ T1028] loop5: p210 start 10 is beyond EOD, truncated [ 774.861995][ T1028] loop5: p211 start 10 is beyond EOD, truncated [ 774.868250][ T1028] loop5: p212 start 10 is beyond EOD, truncated [ 774.874531][ T1028] loop5: p213 start 10 is beyond EOD, truncated [ 774.880805][ T1028] loop5: p214 start 10 is beyond EOD, truncated [ 774.887090][ T1028] loop5: p215 start 10 is beyond EOD, truncated [ 774.893428][ T1028] loop5: p216 start 10 is beyond EOD, truncated [ 774.899723][ T1028] loop5: p217 start 10 is beyond EOD, truncated [ 774.905988][ T1028] loop5: p218 start 10 is beyond EOD, truncated [ 774.912236][ T1028] loop5: p219 start 10 is beyond EOD, truncated [ 774.918567][ T1028] loop5: p220 start 10 is beyond EOD, truncated [ 774.924914][ T1028] loop5: p221 start 10 is beyond EOD, truncated [ 774.931165][ T1028] loop5: p222 start 10 is beyond EOD, truncated [ 774.937423][ T1028] loop5: p223 start 10 is beyond EOD, truncated [ 774.943686][ T1028] loop5: p224 start 10 is beyond EOD, truncated [ 774.949972][ T1028] loop5: p225 start 10 is beyond EOD, truncated [ 774.956247][ T1028] loop5: p226 start 10 is beyond EOD, truncated [ 774.962510][ T1028] loop5: p227 start 10 is beyond EOD, truncated [ 774.968763][ T1028] loop5: p228 start 10 is beyond EOD, truncated [ 774.975023][ T1028] loop5: p229 start 10 is beyond EOD, truncated [ 774.981255][ T1028] loop5: p230 start 10 is beyond EOD, truncated [ 774.987498][ T1028] loop5: p231 start 10 is beyond EOD, truncated [ 774.993745][ T1028] loop5: p232 start 10 is beyond EOD, truncated [ 775.000021][ T1028] loop5: p233 start 10 is beyond EOD, truncated [ 775.006329][ T1028] loop5: p234 start 10 is beyond EOD, truncated [ 775.012570][ T1028] loop5: p235 start 10 is beyond EOD, truncated [ 775.018823][ T1028] loop5: p236 start 10 is beyond EOD, truncated [ 775.025109][ T1028] loop5: p237 start 10 is beyond EOD, truncated [ 775.031469][ T1028] loop5: p238 start 10 is beyond EOD, truncated [ 775.037781][ T1028] loop5: p239 start 10 is beyond EOD, truncated [ 775.044028][ T1028] loop5: p240 start 10 is beyond EOD, truncated [ 775.050304][ T1028] loop5: p241 start 10 is beyond EOD, truncated [ 775.056567][ T1028] loop5: p242 start 10 is beyond EOD, truncated [ 775.062805][ T1028] loop5: p243 start 10 is beyond EOD, truncated [ 775.069078][ T1028] loop5: p244 start 10 is beyond EOD, truncated [ 775.075361][ T1028] loop5: p245 start 10 is beyond EOD, truncated [ 775.081590][ T1028] loop5: p246 start 10 is beyond EOD, truncated [ 775.087833][ T1028] loop5: p247 start 10 is beyond EOD, truncated [ 775.094176][ T1028] loop5: p248 start 10 is beyond EOD, truncated [ 775.100437][ T1028] loop5: p249 start 10 is beyond EOD, truncated 20:18:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(r0, 0x0, 0x1, 0x0, &(0x7f0000000040)) 20:18:59 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff000}, {0x6}]}, 0x10) 20:18:59 executing program 3: r0 = syz_io_uring_setup(0xa, &(0x7f0000000080), &(0x7f0000001000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee6000/0x4000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000), &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000000)=@IORING_OP_ASYNC_CANCEL, 0x1) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000200)={0x0, r3+10000000}}, 0x101) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 20:18:59 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x42, &(0x7f0000000380)=0x6, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f000001b080)=""/102398, &(0x7f0000000080)=0x18ffe) 20:18:59 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000180), 0x0, 0x147382) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x8213, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) 20:18:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) vmsplice(r2, &(0x7f0000e79000)=[{&(0x7f00003fb000)="f7", 0xfdea}], 0x1, 0x0) [ 775.106710][ T1028] loop5: p250 start 10 is beyond EOD, truncated [ 775.112960][ T1028] loop5: p251 start 10 is beyond EOD, truncated [ 775.119405][ T1028] loop5: p252 start 10 is beyond EOD, truncated [ 775.125697][ T1028] loop5: p253 start 10 is beyond EOD, truncated [ 775.131967][ T1028] loop5: p254 start 10 is beyond EOD, truncated [ 775.138310][ T1028] loop5: p255 start 10 is beyond EOD, truncated 20:18:59 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@getsa={0x28, 0x12, 0x1, 0x0, 0x0, {@in6=@remote, 0x0, 0xa, 0x6c}}, 0x28}}, 0x0) 20:18:59 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0xfc00, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) 20:18:59 executing program 2: clone(0x100808900, 0x0, 0x0, 0x0, 0x0) socketpair(0x2, 0x2, 0x106, &(0x7f0000000000)) [ 775.174509][T31205] loop0: detected capacity change from 0 to 65 20:18:59 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="66530700ae897094e71b0fa1f147a8378f364602812c66538d750f6ee1d001f43f0500", 0x23}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x1) 20:18:59 executing program 5: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) prctl$PR_SET_MM(0x23, 0xb, &(0x7f0000a2f000/0x2000)=nil) 20:18:59 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x80}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x800}, 0x1c) 20:18:59 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180), 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x100000001, 0x4}) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 20:18:59 executing program 0: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={0x1000ac, 0x74}, 0x20) 20:18:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x20, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0xc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}]}]}, 0x20}}, 0x0) 20:18:59 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0xfc00, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) 20:18:59 executing program 2: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)={0x80000005}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 20:18:59 executing program 1: clone(0x20016406dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='oom_score_adj\x00') ppoll(0x0, 0x0, 0x0, 0x0, 0x0) write$tcp_mem(r0, &(0x7f0000000000)={0x0, 0x20, 0x0, 0x20, 0x0, 0x9}, 0x48) 20:18:59 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000001c0)=[{0x0, 0x3, 0x0, 0x0, @time={0x0, 0x1f}}], 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0x2b3, @time={0x2}}) 20:18:59 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0xfc00, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) 20:18:59 executing program 4: r0 = socket(0x11, 0x3, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x107, 0x8, 0x0, 0x0) 20:18:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x15d, &(0x7f0000000140)="c4c691019919da078a0098d1e0a593b040f762910000000000000022addee07bee0d6333b5cacd891fa870d434223169b618322ff6602022511253508b5a4496728c2a46e1bc340e29b9ab9b7136283e350808ffdb2dbea7410b36000000007baa17dacdcfac32957dc8bb44e203c4b1bc83d8c0b29f75bcf2e3482945fef116371f8c8c0c4db583a208718e3cccd9dd3bf7a0132044681400bf30024514a6d2675bab926125c43083e773eb3d8dea74700066ee70c42196645292c0e4c3622c102a16be9066fc27e7d4466cbb295eb7f286dcccfde0740cb90366fdd064888fc176574bd977c8c7ef316262a70e75001b11c7c49ae8797518e425ef9080c77c164ad240e88feb024ff8cdd59ea301679ac9655e0bbfa3cd7f00729e4572f401001961318a36c672d3427c660df4544d99987ce9aa5d5c4d40112dc343cb2211c2901a2f8b4a1be407fd745673f70614f7329579c1cf0134a6aa3e72ac"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x17) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x40) 20:18:59 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0xfc00, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) 20:18:59 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) inotify_init() 20:18:59 executing program 5: creat(&(0x7f0000003240)='./file0\x00', 0x0) llistxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)=""/9, 0x9) 20:18:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x200000000000011, 0x4000000000080002, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500803103000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000d94b352a0a2f80c06d5709ffc2c654"}, 0x46) getsockname$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r3}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r1, &(0x7f0000000d00), 0x400004e, 0x0) 20:18:59 executing program 4: semop(0x0, &(0x7f0000000100)=[{0x0, 0x8}], 0x1) r0 = semget$private(0x0, 0x8, 0x0) semop(r0, &(0x7f0000000000)=[{0x3, 0x4}, {0x3}], 0x2) semop(r0, &(0x7f0000000100), 0x2d) semctl$GETZCNT(r0, 0x0, 0xf, 0x0) 20:18:59 executing program 0: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f000049e000/0x1000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_ASYNC_CANCEL, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000000c0)={0x77359400}, 0x0) io_uring_enter(r0, 0x1d70, 0x0, 0x0, 0x0, 0x0) 20:18:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000009c0)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000a00)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000010500)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000300)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[], 0x82) fallocate(r0, 0x0, 0x0, 0x100) 20:19:00 executing program 1: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@private0, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4={'\x00', '\xff\xff', @local}, 0x0, 0x33}, 0x0, @in6=@loopback, 0x0, 0x1, 0x3, 0xb7}}, 0xe8) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x8000000000001f4) umount2(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'macvtap0\x00'}) 20:19:00 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)="390000001300034700bb65e1c3e4ffff01000000020000005600000025000000190004000400249f07fd17e5ffff080004000000282459801b", 0x39}], 0x1) 20:19:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x200000000000011, 0x4000000000080002, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500803103000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000d94b352a0a2f80c06d5709ffc2c654"}, 0x46) getsockname$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r3}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r1, &(0x7f0000000d00), 0x400004e, 0x0) 20:19:00 executing program 5: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="1c00000007ffff", @ANYRES16=r0, @ANYRES32], 0x52) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@noextend}]}}) 20:19:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x200000000000011, 0x4000000000080002, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500803103000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000d94b352a0a2f80c06d5709ffc2c654"}, 0x46) getsockname$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r3}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r1, &(0x7f0000000d00), 0x400004e, 0x0) 20:19:00 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r2, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) perf_event_open(&(0x7f0000000080)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="c8"], 0x2) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r2, 0x0) bind$inet(r1, 0x0, 0x0) socket(0x11, 0x800000003, 0x8) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x0, &(0x7f0000000100)}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) setresuid(0x0, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000180)='./bus\x00', 0x94cc, 0x0, 0x0, 0x54010, &(0x7f0000000740)={[{@hide}], [{@fowner_gt}, {@smackfsdef}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@subj_type={'subj_type', 0x3d, ','}}, {@euid_gt}, {@smackfshat={'smackfshat', 0x3d, '.$\xe4-'}}]}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44840}, 0x0) 20:19:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x200000000000011, 0x4000000000080002, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500803103000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000d94b352a0a2f80c06d5709ffc2c654"}, 0x46) getsockname$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r3}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r1, &(0x7f0000000d00), 0x400004e, 0x0) [ 776.359637][ T918] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=918 comm=kworker/1:2 [ 776.372832][T31325] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 776.381071][T31324] 9pnet: p9_errstr2errno: server reported unknown error ÿÿÿ 20:19:00 executing program 5: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x8003, 0x8020001) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x7}, 0x7) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) 20:19:00 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) sendfile(r1, r0, 0x0, 0x80000001) 20:19:00 executing program 4: semop(0x0, &(0x7f0000000100)=[{0x0, 0x8}], 0x1) r0 = semget$private(0x0, 0x8, 0x0) semop(r0, &(0x7f0000000000)=[{0x3, 0x4}, {0x3}], 0x2) semop(r0, &(0x7f0000000100), 0x2d) semctl$GETZCNT(r0, 0x0, 0xf, 0x0) 20:19:00 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='net_prio.prioidx\x00', 0x275a, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000240)={0x0, 0xffffffffffffffbe, 0x7fefe}) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000240)={0x0, 0x4000007ffffffd}) 20:19:00 executing program 5: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r2 = epoll_create(0x8000) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)) epoll_pwait(r2, &(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) 20:19:00 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r2, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) perf_event_open(&(0x7f0000000080)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="c8"], 0x2) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r2, 0x0) bind$inet(r1, 0x0, 0x0) socket(0x11, 0x800000003, 0x8) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x0, &(0x7f0000000100)}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) setresuid(0x0, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000180)='./bus\x00', 0x94cc, 0x0, 0x0, 0x54010, &(0x7f0000000740)={[{@hide}], [{@fowner_gt}, {@smackfsdef}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@subj_type={'subj_type', 0x3d, ','}}, {@euid_gt}, {@smackfshat={'smackfshat', 0x3d, '.$\xe4-'}}]}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44840}, 0x0) 20:19:00 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r2, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) perf_event_open(&(0x7f0000000080)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="c8"], 0x2) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r2, 0x0) bind$inet(r1, 0x0, 0x0) socket(0x11, 0x800000003, 0x8) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x0, &(0x7f0000000100)}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) setresuid(0x0, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000180)='./bus\x00', 0x94cc, 0x0, 0x0, 0x54010, &(0x7f0000000740)={[{@hide}], [{@fowner_gt}, {@smackfsdef}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@subj_type={'subj_type', 0x3d, ','}}, {@euid_gt}, {@smackfshat={'smackfshat', 0x3d, '.$\xe4-'}}]}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44840}, 0x0) 20:19:00 executing program 1: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@private0, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4={'\x00', '\xff\xff', @local}, 0x0, 0x33}, 0x0, @in6=@loopback, 0x0, 0x1, 0x3, 0xb7}}, 0xe8) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x8000000000001f4) umount2(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'macvtap0\x00'}) 20:19:00 executing program 5: prctl$PR_MCE_KILL(0x2f, 0x3, 0x0) [ 776.663440][T31367] new mount options do not match the existing superblock, will be ignored [ 776.680983][T31367] new mount options do not match the existing superblock, will be ignored 20:19:00 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r2, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) perf_event_open(&(0x7f0000000080)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="c8"], 0x2) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r2, 0x0) bind$inet(r1, 0x0, 0x0) socket(0x11, 0x800000003, 0x8) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x0, &(0x7f0000000100)}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) setresuid(0x0, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000180)='./bus\x00', 0x94cc, 0x0, 0x0, 0x54010, &(0x7f0000000740)={[{@hide}], [{@fowner_gt}, {@smackfsdef}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@subj_type={'subj_type', 0x3d, ','}}, {@euid_gt}, {@smackfshat={'smackfshat', 0x3d, '.$\xe4-'}}]}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44840}, 0x0) 20:19:00 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r2, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) perf_event_open(&(0x7f0000000080)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="c8"], 0x2) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r2, 0x0) bind$inet(r1, 0x0, 0x0) socket(0x11, 0x800000003, 0x8) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x0, &(0x7f0000000100)}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) setresuid(0x0, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000180)='./bus\x00', 0x94cc, 0x0, 0x0, 0x54010, &(0x7f0000000740)={[{@hide}], [{@fowner_gt}, {@smackfsdef}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@subj_type={'subj_type', 0x3d, ','}}, {@euid_gt}, {@smackfshat={'smackfshat', 0x3d, '.$\xe4-'}}]}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44840}, 0x0) 20:19:00 executing program 5: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x1, 0x70}, 0x0, 0x0, r0, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 20:19:00 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r2, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) perf_event_open(&(0x7f0000000080)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="c8"], 0x2) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r2, 0x0) bind$inet(r1, 0x0, 0x0) socket(0x11, 0x800000003, 0x8) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x0, &(0x7f0000000100)}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) setresuid(0x0, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000180)='./bus\x00', 0x94cc, 0x0, 0x0, 0x54010, &(0x7f0000000740)={[{@hide}], [{@fowner_gt}, {@smackfsdef}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@subj_type={'subj_type', 0x3d, ','}}, {@euid_gt}, {@smackfshat={'smackfshat', 0x3d, '.$\xe4-'}}]}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44840}, 0x0) 20:19:00 executing program 5: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x1, 0x70}, 0x0, 0x0, r0, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 20:19:01 executing program 4: semop(0x0, &(0x7f0000000100)=[{0x0, 0x8}], 0x1) r0 = semget$private(0x0, 0x8, 0x0) semop(r0, &(0x7f0000000000)=[{0x3, 0x4}, {0x3}], 0x2) semop(r0, &(0x7f0000000100), 0x2d) semctl$GETZCNT(r0, 0x0, 0xf, 0x0) 20:19:01 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r2, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) perf_event_open(&(0x7f0000000080)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="c8"], 0x2) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r2, 0x0) bind$inet(r1, 0x0, 0x0) socket(0x11, 0x800000003, 0x8) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x0, &(0x7f0000000100)}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) setresuid(0x0, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000180)='./bus\x00', 0x94cc, 0x0, 0x0, 0x54010, &(0x7f0000000740)={[{@hide}], [{@fowner_gt}, {@smackfsdef}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@subj_type={'subj_type', 0x3d, ','}}, {@euid_gt}, {@smackfshat={'smackfshat', 0x3d, '.$\xe4-'}}]}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44840}, 0x0) 20:19:01 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='net_prio.prioidx\x00', 0x275a, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000240)={0x0, 0xffffffffffffffbe, 0x7fefe}) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000240)={0x0, 0x4000007ffffffd}) 20:19:01 executing program 5: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x1, 0x70}, 0x0, 0x0, r0, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 20:19:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='net_prio.prioidx\x00', 0x275a, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000240)={0x0, 0xffffffffffffffbe, 0x7fefe}) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000240)={0x0, 0x4000007ffffffd}) 20:19:01 executing program 1: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@private0, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4={'\x00', '\xff\xff', @local}, 0x0, 0x33}, 0x0, @in6=@loopback, 0x0, 0x1, 0x3, 0xb7}}, 0xe8) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x8000000000001f4) umount2(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'macvtap0\x00'}) 20:19:01 executing program 5: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x1, 0x70}, 0x0, 0x0, r0, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 20:19:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='net_prio.prioidx\x00', 0x275a, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000240)={0x0, 0xffffffffffffffbe, 0x7fefe}) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000240)={0x0, 0x4000007ffffffd}) 20:19:01 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='net_prio.prioidx\x00', 0x275a, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000240)={0x0, 0xffffffffffffffbe, 0x7fefe}) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000240)={0x0, 0x4000007ffffffd}) 20:19:01 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000002140)=[{{&(0x7f0000000080)={0x2, 0x4e22, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000200)=[@ip_retopts={{0x18, 0x0, 0x7, {[@noop, @timestamp={0x7, 0x2}, @generic={0x0, 0x3, "e8"}]}}}], 0x18}}], 0x1, 0x0) 20:19:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = memfd_create(&(0x7f0000000900)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf!\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c!\x0f/\xb8o8\xb9\x8d\x19\xe2\xca\x01y\x83\xe7\ng\x87\xd93\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf!\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c!\x0f/\xb8o8\xb9\x8d\x19\xe2\xca\x01y\x83\xe7\ng\x87\xd930x0}) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fchown(r2, 0xee01, r4) fstat(r0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000380)={{}, {}, [{0x2, 0x1, 0xee01}], {}, [{0x8, 0x5}, {}, {0x8, 0x2}, {0x8, 0x0, 0xee01}, {0x8, 0x6}, {0x8, 0x4, r1}, {0x8, 0x7}, {0x8, 0x1}], {0x10, 0x2}}, 0x6c, 0x1) rmdir(0x0) socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x14) creat(&(0x7f00000004c0)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x4203) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="2f6465762f1984f78d623000"], &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000440)='binder\x00', 0x21, &(0x7f0000000480)='ext4\x00') 20:19:02 executing program 1: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@private0, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4={'\x00', '\xff\xff', @local}, 0x0, 0x33}, 0x0, @in6=@loopback, 0x0, 0x1, 0x3, 0xb7}}, 0xe8) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x8000000000001f4) umount2(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'macvtap0\x00'}) 20:19:02 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap$IORING_OFF_SQES(&(0x7f00009fe000/0x600000)=nil, 0x600000, 0x9, 0x31, 0xffffffffffffffff, 0x10000000) getsockopt$inet_tcp_int(r0, 0x6, 0x1, 0x0, &(0x7f0000d12ffc)=0x34) 20:19:02 executing program 0: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$setperm(0x5, r1, 0x202002) keyctl$chown(0x3, r1, 0x0, 0x0) [ 778.421735][T31459] new mount options do not match the existing superblock, will be ignored [ 778.441591][T31459] loop5: detected capacity change from 0 to 4096 20:19:02 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000000c0)="900000001c001f4d154a817393278bff0a80a578020000000104740014000100ac1414bb0542d6401051a2d708f37ac8da1a297e0099c5ac0000c5b068d0bf46d323456536016466fcb78dcaaf6c3efed495a46215be0000760700c0c80cefd28581d158ba86c9d2896c6d3bca2d0000000b0015009e49a6560641263da4de1df32c1739d7fbee9aa241731ae9e0b390", 0x90, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto$inet6(r0, &(0x7f0000000180)="900000001d001f4d154a817393278bff0a80a578020000000404840014000100ac1414bb0542d6401051a2d708f37ac8da1a297e0099c5ac0000c5b068d0bf46d323456536016466fcb78dcaaf6c3efed495a46215be0000766436c0c80cefd28581d158ba86c9d2896c6d3bca2d0000000b0015009e49a6560641263da4de1df32c1739d7fbee9aa241731ae9e0b390", 0x90, 0x0, 0x0, 0x0) 20:19:02 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000002680)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="0400485a", 0x4}], 0x1}}], 0x1, 0x0) [ 778.488672][T31459] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 20:19:02 executing program 0: pipe(&(0x7f0000003e80)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x101, &(0x7f0000000240)=0x0) io_submit(r2, 0x2, &(0x7f0000001380)=[&(0x7f00000012c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000280)="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", 0x1000}, &(0x7f0000001340)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x3, r1}]) [ 778.541499][T31480] netlink: 96 bytes leftover after parsing attributes in process `syz-executor.3'. [ 778.565921][T31459] EXT4-fs error (device loop5): __ext4_new_inode:1069: comm syz-executor.5: reserved inode found cleared - inode=1 [ 778.581615][T31480] netlink: 96 bytes leftover after parsing attributes in process `syz-executor.3'. 20:19:02 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000019500)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x13b, &(0x7f0000000140)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 778.615831][T31482] new mount options do not match the existing superblock, will be ignored 20:19:03 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) stat(&(0x7f0000000500)='./file0/file1\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fchown(r2, 0xee01, r4) fstat(r0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000380)={{}, {}, [{0x2, 0x1, 0xee01}], {}, [{0x8, 0x5}, {}, {0x8, 0x2}, {0x8, 0x0, 0xee01}, {0x8, 0x6}, {0x8, 0x4, r1}, {0x8, 0x7}, {0x8, 0x1}], {0x10, 0x2}}, 0x6c, 0x1) rmdir(0x0) socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x14) creat(&(0x7f00000004c0)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x4203) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="2f6465762f1984f78d623000"], &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000440)='binder\x00', 0x21, &(0x7f0000000480)='ext4\x00') 20:19:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="1c00000007ffff", @ANYRES16=r1], 0x52) r4 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@noextend}]}}) 20:19:03 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) stat(&(0x7f0000000500)='./file0/file1\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fchown(r2, 0xee01, r4) fstat(r0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000380)={{}, {}, [{0x2, 0x1, 0xee01}], {}, [{0x8, 0x5}, {}, {0x8, 0x2}, {0x8, 0x0, 0xee01}, {0x8, 0x6}, {0x8, 0x4, r1}, {0x8, 0x7}, {0x8, 0x1}], {0x10, 0x2}}, 0x6c, 0x1) rmdir(0x0) socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x14) creat(&(0x7f00000004c0)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x4203) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="2f6465762f1984f78d623000"], &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000440)='binder\x00', 0x21, &(0x7f0000000480)='ext4\x00') 20:19:03 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) stat(&(0x7f0000000500)='./file0/file1\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fchown(r2, 0xee01, r4) fstat(r0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000380)={{}, {}, [{0x2, 0x1, 0xee01}], {}, [{0x8, 0x5}, {}, {0x8, 0x2}, {0x8, 0x0, 0xee01}, {0x8, 0x6}, {0x8, 0x4, r1}, {0x8, 0x7}, {0x8, 0x1}], {0x10, 0x2}}, 0x6c, 0x1) rmdir(0x0) socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x14) creat(&(0x7f00000004c0)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x4203) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="2f6465762f1984f78d623000"], &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000440)='binder\x00', 0x21, &(0x7f0000000480)='ext4\x00') 20:19:03 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) stat(&(0x7f0000000500)='./file0/file1\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fchown(r2, 0xee01, r4) fstat(r0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000380)={{}, {}, [{0x2, 0x1, 0xee01}], {}, [{0x8, 0x5}, {}, {0x8, 0x2}, {0x8, 0x0, 0xee01}, {0x8, 0x6}, {0x8, 0x4, r1}, {0x8, 0x7}, {0x8, 0x1}], {0x10, 0x2}}, 0x6c, 0x1) rmdir(0x0) socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x14) creat(&(0x7f00000004c0)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x4203) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="2f6465762f1984f78d623000"], &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000440)='binder\x00', 0x21, &(0x7f0000000480)='ext4\x00') 20:19:03 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) stat(&(0x7f0000000500)='./file0/file1\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fchown(r2, 0xee01, r4) fstat(r0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000380)={{}, {}, [{0x2, 0x1, 0xee01}], {}, [{0x8, 0x5}, {}, {0x8, 0x2}, {0x8, 0x0, 0xee01}, {0x8, 0x6}, {0x8, 0x4, r1}, {0x8, 0x7}, {0x8, 0x1}], {0x10, 0x2}}, 0x6c, 0x1) rmdir(0x0) socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x14) creat(&(0x7f00000004c0)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x4203) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="2f6465762f1984f78d623000"], &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000440)='binder\x00', 0x21, &(0x7f0000000480)='ext4\x00') [ 779.232905][T31511] new mount options do not match the existing superblock, will be ignored [ 779.246148][T31513] new mount options do not match the existing superblock, will be ignored [ 779.266357][T17766] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=17766 comm=kworker/0:4 [ 779.267857][T31513] loop5: detected capacity change from 0 to 4096 [ 779.285792][T31518] new mount options do not match the existing superblock, will be ignored [ 779.290259][T31511] loop0: detected capacity change from 0 to 4096 [ 779.309559][T31521] new mount options do not match the existing superblock, will be ignored [ 779.315873][T31511] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 779.320102][T31516] 9pnet: p9_errstr2errno: server reported unknown error ¾ [ 779.355712][T31525] new mount options do not match the existing superblock, will be ignored [ 779.372642][T31513] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 20:19:03 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) stat(&(0x7f0000000500)='./file0/file1\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fchown(r2, 0xee01, r4) fstat(r0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000380)={{}, {}, [{0x2, 0x1, 0xee01}], {}, [{0x8, 0x5}, {}, {0x8, 0x2}, {0x8, 0x0, 0xee01}, {0x8, 0x6}, {0x8, 0x4, r1}, {0x8, 0x7}, {0x8, 0x1}], {0x10, 0x2}}, 0x6c, 0x1) rmdir(0x0) socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x14) creat(&(0x7f00000004c0)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x4203) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="2f6465762f1984f78d623000"], &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000440)='binder\x00', 0x21, &(0x7f0000000480)='ext4\x00') 20:19:03 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) stat(&(0x7f0000000500)='./file0/file1\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fchown(r2, 0xee01, r4) fstat(r0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000380)={{}, {}, [{0x2, 0x1, 0xee01}], {}, [{0x8, 0x5}, {}, {0x8, 0x2}, {0x8, 0x0, 0xee01}, {0x8, 0x6}, {0x8, 0x4, r1}, {0x8, 0x7}, {0x8, 0x1}], {0x10, 0x2}}, 0x6c, 0x1) rmdir(0x0) socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x14) creat(&(0x7f00000004c0)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x4203) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="2f6465762f1984f78d623000"], &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000440)='binder\x00', 0x21, &(0x7f0000000480)='ext4\x00') 20:19:03 executing program 3: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000100)={0x2}, 0x8, 0x0) 20:19:03 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) stat(&(0x7f0000000500)='./file0/file1\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fchown(r2, 0xee01, r4) fstat(r0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000380)={{}, {}, [{0x2, 0x1, 0xee01}], {}, [{0x8, 0x5}, {}, {0x8, 0x2}, {0x8, 0x0, 0xee01}, {0x8, 0x6}, {0x8, 0x4, r1}, {0x8, 0x7}, {0x8, 0x1}], {0x10, 0x2}}, 0x6c, 0x1) rmdir(0x0) socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x14) creat(&(0x7f00000004c0)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x4203) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="2f6465762f1984f78d623000"], &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000440)='binder\x00', 0x21, &(0x7f0000000480)='ext4\x00') 20:19:03 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) stat(&(0x7f0000000500)='./file0/file1\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fchown(r2, 0xee01, r4) fstat(r0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000380)={{}, {}, [{0x2, 0x1, 0xee01}], {}, [{0x8, 0x5}, {}, {0x8, 0x2}, {0x8, 0x0, 0xee01}, {0x8, 0x6}, {0x8, 0x4, r1}, {0x8, 0x7}, {0x8, 0x1}], {0x10, 0x2}}, 0x6c, 0x1) rmdir(0x0) socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x14) creat(&(0x7f00000004c0)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x4203) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="2f6465762f1984f78d623000"], &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000440)='binder\x00', 0x21, &(0x7f0000000480)='ext4\x00') [ 779.398680][ T918] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=918 comm=kworker/1:2 [ 779.405034][T31532] EXT4-fs error (device loop5): __ext4_new_inode:1069: comm syz-executor.5: reserved inode found cleared - inode=1 [ 779.425958][T31525] loop4: detected capacity change from 0 to 4096 [ 779.437524][T31511] EXT4-fs error (device loop0): __ext4_new_inode:1069: comm syz-executor.0: reserved inode found cleared - inode=1 [ 779.487660][T31545] new mount options do not match the existing superblock, will be ignored [ 779.527301][T31552] new mount options do not match the existing superblock, will be ignored 20:19:03 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) stat(&(0x7f0000000500)='./file0/file1\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fchown(r2, 0xee01, r4) fstat(r0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000380)={{}, {}, [{0x2, 0x1, 0xee01}], {}, [{0x8, 0x5}, {}, {0x8, 0x2}, {0x8, 0x0, 0xee01}, {0x8, 0x6}, {0x8, 0x4, r1}, {0x8, 0x7}, {0x8, 0x1}], {0x10, 0x2}}, 0x6c, 0x1) rmdir(0x0) socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x14) creat(&(0x7f00000004c0)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x4203) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="2f6465762f1984f78d623000"], &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000440)='binder\x00', 0x21, &(0x7f0000000480)='ext4\x00') [ 779.536713][T31525] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 20:19:03 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) stat(&(0x7f0000000500)='./file0/file1\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fchown(r2, 0xee01, r4) fstat(r0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000380)={{}, {}, [{0x2, 0x1, 0xee01}], {}, [{0x8, 0x5}, {}, {0x8, 0x2}, {0x8, 0x0, 0xee01}, {0x8, 0x6}, {0x8, 0x4, r1}, {0x8, 0x7}, {0x8, 0x1}], {0x10, 0x2}}, 0x6c, 0x1) rmdir(0x0) socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x14) creat(&(0x7f00000004c0)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x4203) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="2f6465762f1984f78d623000"], &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000440)='binder\x00', 0x21, &(0x7f0000000480)='ext4\x00') [ 779.589727][T31559] new mount options do not match the existing superblock, will be ignored [ 779.603078][T31560] new mount options do not match the existing superblock, will be ignored [ 779.629449][T31559] loop5: detected capacity change from 0 to 4096 20:19:03 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) stat(&(0x7f0000000500)='./file0/file1\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fchown(r2, 0xee01, r4) fstat(r0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000380)={{}, {}, [{0x2, 0x1, 0xee01}], {}, [{0x8, 0x5}, {}, {0x8, 0x2}, {0x8, 0x0, 0xee01}, {0x8, 0x6}, {0x8, 0x4, r1}, {0x8, 0x7}, {0x8, 0x1}], {0x10, 0x2}}, 0x6c, 0x1) rmdir(0x0) socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x14) creat(&(0x7f00000004c0)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x4203) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="2f6465762f1984f78d623000"], &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000440)='binder\x00', 0x21, &(0x7f0000000480)='ext4\x00') 20:19:03 executing program 3: r0 = perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) mlock2(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x1b, &(0x7f0000000640)="f47970da7c2fd541e0656c5762306aa606a0c2a76e59b65fa78fb1"}}], 0x1c) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 779.642343][T31566] new mount options do not match the existing superblock, will be ignored [ 779.670985][T31559] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 779.672064][T31560] loop0: detected capacity change from 0 to 4096 [ 779.700237][T31577] new mount options do not match the existing superblock, will be ignored 20:19:03 executing program 2: prctl$PR_MCE_KILL(0x23, 0x2, 0x7fffffffefff) 20:19:03 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) unshare(0x2a040400) pselect6(0x40, &(0x7f0000000000)={0x9}, 0x0, 0x0, 0x0, 0x0) [ 779.756431][T31560] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 779.758678][T31559] EXT4-fs error (device loop5): __ext4_new_inode:1069: comm syz-executor.5: reserved inode found cleared - inode=1 [ 779.768093][T31582] new mount options do not match the existing superblock, will be ignored 20:19:03 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) stat(&(0x7f0000000500)='./file0/file1\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fchown(r2, 0xee01, r4) fstat(r0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000380)={{}, {}, [{0x2, 0x1, 0xee01}], {}, [{0x8, 0x5}, {}, {0x8, 0x2}, {0x8, 0x0, 0xee01}, {0x8, 0x6}, {0x8, 0x4, r1}, {0x8, 0x7}, {0x8, 0x1}], {0x10, 0x2}}, 0x6c, 0x1) rmdir(0x0) socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x14) creat(&(0x7f00000004c0)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x4203) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="2f6465762f1984f78d623000"], &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000440)='binder\x00', 0x21, &(0x7f0000000480)='ext4\x00') 20:19:03 executing program 1: r0 = semget$private(0x0, 0x20000000102, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x8}, {}], 0x2) semctl$IPC_RMID(r0, 0x0, 0x10) 20:19:03 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) stat(&(0x7f0000000500)='./file0/file1\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fchown(r2, 0xee01, r4) fstat(r0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000380)={{}, {}, [{0x2, 0x1, 0xee01}], {}, [{0x8, 0x5}, {}, {0x8, 0x2}, {0x8, 0x0, 0xee01}, {0x8, 0x6}, {0x8, 0x4, r1}, {0x8, 0x7}, {0x8, 0x1}], {0x10, 0x2}}, 0x6c, 0x1) rmdir(0x0) socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x14) creat(&(0x7f00000004c0)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x4203) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="2f6465762f1984f78d623000"], &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000440)='binder\x00', 0x21, &(0x7f0000000480)='ext4\x00') 20:19:03 executing program 2: prctl$PR_MCE_KILL(0x23, 0x2, 0x7fffffffefff) [ 779.826639][T31560] EXT4-fs error (device loop0): __ext4_new_inode:1069: comm syz-executor.0: reserved inode found cleared - inode=1 [ 779.850632][T31582] loop4: detected capacity change from 0 to 4096 20:19:03 executing program 3: r0 = syz_io_uring_setup(0x1ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_io_uring_setup(0x4a85, &(0x7f0000000080)={0x0, 0x8162, 0x6a, 0x0, 0x0, 0x0, r0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) [ 779.885259][T31582] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 779.933891][T31614] new mount options do not match the existing superblock, will be ignored [ 779.949404][T31582] EXT4-fs error (device loop4): __ext4_new_inode:1069: comm syz-executor.4: reserved inode found cleared - inode=1 [ 779.957456][T31617] new mount options do not match the existing superblock, will be ignored [ 779.962259][T31614] loop5: detected capacity change from 0 to 4096 20:19:03 executing program 2: prctl$PR_MCE_KILL(0x23, 0x2, 0x7fffffffefff) 20:19:03 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) stat(&(0x7f0000000500)='./file0/file1\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fchown(r2, 0xee01, r4) fstat(r0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000380)={{}, {}, [{0x2, 0x1, 0xee01}], {}, [{0x8, 0x5}, {}, {0x8, 0x2}, {0x8, 0x0, 0xee01}, {0x8, 0x6}, {0x8, 0x4, r1}, {0x8, 0x7}, {0x8, 0x1}], {0x10, 0x2}}, 0x6c, 0x1) rmdir(0x0) socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x14) creat(&(0x7f00000004c0)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x4203) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="2f6465762f1984f78d623000"], &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000440)='binder\x00', 0x21, &(0x7f0000000480)='ext4\x00') [ 779.982355][T31617] loop0: detected capacity change from 0 to 4096 20:19:03 executing program 2: prctl$PR_MCE_KILL(0x23, 0x2, 0x7fffffffefff) 20:19:03 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r2 = dup3(r0, r1, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000100)={0xaaed}) 20:19:04 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r2 = dup3(r0, r1, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000100)={0xaaed}) [ 780.042962][T31614] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 780.057965][T31617] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 780.080882][T31637] EXT4-fs warning (device sda1): verify_group_input:132: Cannot add at group 43757 (only 16 groups) 20:19:04 executing program 2: set_mempolicy(0x1, 0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200002, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34cc0006ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) fchown(r0, 0xee01, 0x0) [ 780.117750][T31614] EXT4-fs error (device loop5): __ext4_new_inode:1069: comm syz-executor.5: reserved inode found cleared - inode=1 [ 780.136765][T31617] EXT4-fs error (device loop0): __ext4_new_inode:1069: comm syz-executor.0: reserved inode found cleared - inode=1 [ 780.157643][T31645] new mount options do not match the existing superblock, will be ignored 20:19:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="80000000"], 0x80}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="10000000030203"], 0x18}}, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100000002) 20:19:04 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000006c0), r0) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f00000000c0)={0x50, r1, 0x1, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:hugetlbfs_t:s0\x00'}]}, 0x50}}, 0x0) [ 780.169387][T31648] EXT4-fs warning (device sda1): verify_group_input:132: Cannot add at group 43757 (only 16 groups) [ 780.191777][T31645] loop4: detected capacity change from 0 to 4096 [ 780.223875][T31645] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 780.259025][T31645] EXT4-fs error (device loop4): __ext4_new_inode:1069: comm syz-executor.4: reserved inode found cleared - inode=1 20:19:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000000)) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0), 0x20601, 0x0) sched_setscheduler(0x0, 0x0, 0x0) close(0xffffffffffffffff) 20:19:04 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r2 = dup3(r0, r1, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000100)={0xaaed}) 20:19:04 executing program 2: r0 = syz_io_uring_setup(0x22e2, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000080)}, 0x0) syz_io_uring_setup(0x58b2, &(0x7f00000001c0), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) pipe(&(0x7f0000000080)) syz_io_uring_submit(r1, r2, &(0x7f0000000400)=@IORING_OP_ASYNC_CANCEL, 0x8) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) 20:19:04 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={0x2a, 0x100078}, 0x20) 20:19:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000340)="560cee8a", 0x4}, {&(0x7f0000000180)="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", 0x11e}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x36) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 20:19:04 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount$9p_xen(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x100c1e3, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004105) 20:19:04 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x206100, 0x0) timerfd_gettime(r0, 0x0) 20:19:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000340)="560cee8a", 0x4}, {&(0x7f0000000180)="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", 0x11e}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x36) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 20:19:04 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000440)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000004540)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)=[{0x10, 0x1, 0x25}], 0x10}}], 0x2, 0x0) [ 780.774432][T31693] EXT4-fs warning (device sda1): verify_group_input:132: Cannot add at group 43757 (only 16 groups) 20:19:04 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000140)=0x3f) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000240)="ae88bff8240b01005aa6ca9566d98e06c896fdffffffffffffffdd0000fffffffffbfffff000000000000f60a6dc33191c71fb828e976e36321fc5e899ccb93167247a38f43c51b0cf73046a79df58b5b7f938cf30b0a1f4b3cc35a4cb7455834686ea6bf9835926d004b410b24e2ea25bfd9b2aa91d2459bf4126e49c5323a7f9a44e33e2d4b41772981b806747c350e79f03", 0x93}], 0x1) readv(r0, &(0x7f0000000580)=[{&(0x7f0000000480)=""/251, 0xfb}], 0x1) 20:19:04 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r2 = dup3(r0, r1, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000100)={0xaaed}) 20:19:04 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount$9p_xen(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x100c1e3, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004105) 20:19:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000340)="560cee8a", 0x4}, {&(0x7f0000000180)="82bb7102cc6560ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2fc903c2b54706c05e4cb2e2875107608f9143f299d8e3f78f4bf076484885fd4089cb084607435b77c7f44cf0783279a494c8e4eba955b16e77f57966d4b79ce63a7560f2950035254b654ed339b07ebcf3b498fccba20bcae2b6f577b36b79f72f77ef0d450a8f25ea6cd09c60baabf84ab4350874b05f4635c7449bac43836221bc3130b44a9df8704c9656b60912ff6bdb6fb1f138ece7e020fc235330fb8f4e6ad5d3e000000c39ddf762cbf9517642e3a308259aa7de01faeb7d3552a4131bc6095cf49a861757730701f7331e28ae3218b19a4281108c2d3671b6af8d50fbfd8507a81", 0x11e}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x36) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 20:19:04 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSBRK(r1, 0x5409, 0x0) [ 780.893312][T31721] sg_write: data in/out 68352/48 bytes for SCSI command 0xf0-- guessing data in; [ 780.893312][T31721] program syz-executor.2 not setting count and/or reply_len properly [ 780.920332][T31727] sg_write: data in/out 68352/48 bytes for SCSI command 0xf0-- guessing data in; [ 780.920332][T31727] program syz-executor.2 not setting count and/or reply_len properly 20:19:04 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000100)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) r3 = socket$packet(0x11, 0x3, 0x300) sendto$packet(r3, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x11, 0x8906, r2, 0x1, 0x0, 0x6, @remote}, 0x14) 20:19:04 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000100)=""/247) 20:19:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000340)="560cee8a", 0x4}, {&(0x7f0000000180)="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", 0x11e}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x36) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 20:19:04 executing program 5: r0 = syz_io_uring_setup(0x1ede, &(0x7f0000000240)={0x0, 0x0, 0x2}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_io_uring_setup(0x4a85, &(0x7f0000000080)={0x0, 0x8162, 0x6a, 0x0, 0x0, 0x0, r0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) [ 780.938311][T31723] EXT4-fs warning (device sda1): verify_group_input:132: Cannot add at group 43757 (only 16 groups) 20:19:04 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount$9p_xen(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x100c1e3, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004105) 20:19:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socket$inet6_icmp(0xa, 0x2, 0x11) 20:19:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f000001d000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc101}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:19:04 executing program 4: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) utimensat(r0, 0x0, &(0x7f0000000040)={{0x0, 0xea60}, {0x0, 0x3ffffffe}}, 0x0) 20:19:05 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x13e, &(0x7f0000000140)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x40) 20:19:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000b00)={@ipv4={'\x00', '\xff\xff', @private}, @remote, @rand_addr=' \x01\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b0293}) ioctl$sock_SIOCDELRT(r1, 0x890c, &(0x7f00000000c0)={0x0, @tipc=@id, @ipx={0x4, 0x0, 0x0, "c7f5d9645c16"}, @in={0x2, 0x0, @multicast2}}) 20:19:05 executing program 3: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(0x0, 0x1, 0x0, 0x0, 0x0, 0x0) 20:19:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x190, &(0x7f00000002c0)="c4c691019919da078a0098d1e0a593b040f762910000000000000022addee07bee0d6333b5cacd891fa870d434223169b618322ff6602022511253508b5a4496728c2a46e1bc340e29b9ab9b7136283e350808ffdb2dbea7410b36000000007baa17dacdcfac32957dc8bb44e203c4b1bc83d8c0b29f75bcf2e3482945fef116371f8c8c0c4db583a208718e3cccd9dd3bf7a0132044681400bf30024514a6d2675bab926125c43083e773eb3d8dea74700066ee70c42196645292c0e4c3622c102a16be9066fc27e7d4466cbb295eb7f286dcccfde0740cb90366fdd064888fc176574bd977c8c7ef316262a70e75001b11c7c49ae8797518e425ef9080c77c164ad240e88feb024ff8cdd59ea301679ac9655e0bbfa3cd7f00729e4572f401001961318a36c672d3427c660df4544d99987ce9aa5d5c4d40112dc343cb2211c2fb9cbf6bda4cfad72aa74bc1e8fea9621223a2dd81aaf6756e7c50ef17f4f8364361053e316135584ce616461f7e7bfdefa9d42c3ba87eb9b40304d9c74d9630b396ee67201337cf32914fa70eb500"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x17) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x40) 20:19:05 executing program 2: perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x0, 0x7fffffff, 0x4) 20:19:05 executing program 1: r0 = socket(0xa, 0x3, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) 20:19:05 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount$9p_xen(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x100c1e3, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004105) 20:19:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000040)='./bus/file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0x0) linkat(r1, &(0x7f0000000080)='\x00', r2, &(0x7f0000000000)='./file1\x00', 0x1400) 20:19:05 executing program 1: r0 = shmget$private(0x0, 0x3000, 0x1a00, &(0x7f0000ffd000/0x3000)=nil) shmat(r0, &(0x7f0000000000/0x2000)=nil, 0x4000) shmctl$IPC_RMID(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) shmctl$IPC_RMID(r0, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000d06000)=0x18, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) semctl$SETVAL(0xffffffffffffffff, 0x2, 0x10, &(0x7f0000000000)=0x4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f00000001c0)=0x2, 0x4) r2 = shmget$private(0x0, 0x3000, 0x1a00, &(0x7f0000ffd000/0x3000)=nil) shmat(r2, &(0x7f0000000000/0x2000)=nil, 0x4000) 20:19:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f00000013c0)=[{{&(0x7f0000000040)={0xa, 0x4e24, 0x0, @dev}, 0x1c, &(0x7f0000000240)=[{&(0x7f0000000180)="4854e11617437d1c4c9c39b35d549265c6a80556f0783770309a7a46be4852c8d1d4a5a0cab3a3af2298f3891c03fc773e014aef0a2fef218aae2f262cfb0803051225621eab13b4e201d9fe9d3e9d2df05e48f9f82961d787d17769192cbd9d66be8b5c933f1048b5e4d7bb8c5a74c515192c92041b15039bd3d7194afc017baa0110c7a0b9291a", 0x88}], 0x1}}, {{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000002c0)="9cc2e3660bd268b95f60847d4a1ef6ce6cb44ea600a5", 0x16}, {&(0x7f0000000300)="ed", 0x1}, {&(0x7f0000000400)="6b70e30f3b68cc5d4fa8764c825bf9", 0xf}, {&(0x7f0000000440)="7dc0e4984598dbbb8d258c7eba5e1fd8344d699b4f4577a54850329cc49083abf0443a", 0x23}, {&(0x7f0000000500)="e58c688fcc56cb3b0d", 0x9}], 0x5}}, {{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000740)="bbfca1c53854f1991f99b0bd427dfcc13ba00ca9f7d7e850f325a6e49bcfff025aaa21d6432ecc854eb1bb24b8ba61c2900dda94", 0x34}, {&(0x7f00000007c0)="eedfb3e07e9104bfa923695fafc7911fbc633e1968e47e79dfa86b251e3685341da779378f8dbd3f8e8a57403f", 0x2d}, {&(0x7f0000000880)}], 0x3}}, {{0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000bc0)}], 0x1}}], 0x4, 0x8081) 20:19:05 executing program 3: r0 = socket(0x2, 0x3, 0x50) io_setup(0x4, &(0x7f0000000040)=0x0) io_submit(r1, 0x2, &(0x7f0000001400)=[&(0x7f0000000100)={0x0, 0x0, 0x2, 0x0, 0x0, r0, 0x0}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffdff}]) 20:19:05 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffffff7}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b5877341e0e1dcc2025aa18c9228103b66e1d49d31d322dbecfa63da", 0x82}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 20:19:05 executing program 4: syz_io_uring_setup(0x5c8c, &(0x7f0000000100), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mincore(&(0x7f0000ffb000/0x1000)=nil, 0x1000, &(0x7f0000000000)=""/4) 20:19:05 executing program 2: io_cancel(0x0, &(0x7f0000000180)={0x0, 0x8501, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 20:19:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setrlimit(0x40000000000008, &(0x7f0000000000)) mlock2(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0) 20:19:05 executing program 0: unshare(0x2c020000) clone(0x4103b900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:19:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setresuid(0x0, 0xee01, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0xd, &(0x7f0000001080)="96", 0x1) 20:19:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) socket(0x27, 0x80000, 0x7) getuid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee00) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f00000005c0)={0x4, &(0x7f0000000580)=[{}, {}, {}, {}]}) 20:19:05 executing program 3: r0 = epoll_create1(0x0) r1 = eventfd2(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000200)={0x40000015}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000000)) epoll_wait(r0, &(0x7f0000000180)=[{}], 0x1, 0x0) 20:19:05 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x0, 0x0, 0x4) 20:19:06 executing program 1: r0 = shmget$private(0x0, 0x3000, 0x1a00, &(0x7f0000ffd000/0x3000)=nil) shmat(r0, &(0x7f0000000000/0x2000)=nil, 0x4000) shmctl$IPC_RMID(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) shmctl$IPC_RMID(r0, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000d06000)=0x18, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) semctl$SETVAL(0xffffffffffffffff, 0x2, 0x10, &(0x7f0000000000)=0x4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f00000001c0)=0x2, 0x4) r2 = shmget$private(0x0, 0x3000, 0x1a00, &(0x7f0000ffd000/0x3000)=nil) shmat(r2, &(0x7f0000000000/0x2000)=nil, 0x4000) 20:19:06 executing program 5: r0 = syz_io_uring_setup(0x87, &(0x7f00000002c0), &(0x7f0000ff9000/0x4000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000240)=0x0) syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540), &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000280)=@IORING_OP_SPLICE, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 20:19:06 executing program 4: r0 = epoll_create(0x5) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_pwait(r0, &(0x7f0000000080)=[{}], 0x1, 0xaf, 0x0, 0x0) write$nbd(r2, &(0x7f0000000080)=ANY=[], 0xffffffd5) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) shutdown(r1, 0x0) 20:19:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/icmp6\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/173, 0xad}], 0x1, 0x0, 0x0) 20:19:06 executing program 3: unshare(0x400) r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000300)={{}, {0x0, 0x3938700}}, &(0x7f00000002c0)) 20:19:06 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x0, 0x0, 0x4) 20:19:06 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x0, 0x0, 0x4) 20:19:06 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rpc\x00') getdents(r0, &(0x7f0000000f00)=""/43, 0x2b) getdents(r0, &(0x7f0000003f40)=""/4096, 0x1000) 20:19:06 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f00000005c0), 0x8) sendmmsg(r0, &(0x7f0000001b00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[{0x10}], 0x10}}], 0x1, 0x0) 20:19:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/icmp6\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/173, 0xad}], 0x1, 0x0, 0x0) 20:19:06 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x0, 0x0, 0x4) 20:19:06 executing program 3: gettid() timer_create(0x3, &(0x7f0000000180)={0x0, 0x17}, &(0x7f0000000000)) r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) timer_settime(0x0, 0x1, &(0x7f0000000200)={{}, {0x0, 0x989680}}, &(0x7f0000000240)) 20:19:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/icmp6\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/173, 0xad}], 0x1, 0x0, 0x0) 20:19:06 executing program 1: r0 = shmget$private(0x0, 0x3000, 0x1a00, &(0x7f0000ffd000/0x3000)=nil) shmat(r0, &(0x7f0000000000/0x2000)=nil, 0x4000) shmctl$IPC_RMID(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) shmctl$IPC_RMID(r0, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000d06000)=0x18, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) semctl$SETVAL(0xffffffffffffffff, 0x2, 0x10, &(0x7f0000000000)=0x4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f00000001c0)=0x2, 0x4) r2 = shmget$private(0x0, 0x3000, 0x1a00, &(0x7f0000ffd000/0x3000)=nil) shmat(r2, &(0x7f0000000000/0x2000)=nil, 0x4000) 20:19:06 executing program 3: gettid() timer_create(0x3, &(0x7f0000000180)={0x0, 0x17}, &(0x7f0000000000)) r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) timer_settime(0x0, 0x1, &(0x7f0000000200)={{}, {0x0, 0x989680}}, &(0x7f0000000240)) 20:19:06 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fstat(r0, &(0x7f00000000c0)) 20:19:06 executing program 4: clone(0x4000008006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') setreuid(0xee01, 0x0) exit(0x0) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000040)=""/81, 0x51}], 0x1, 0x6, 0x0) 20:19:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x6, &(0x7f0000000500)={0x90, {{0x29, 0x0, 0x2000000, @mcast1}}}, 0x90) 20:19:07 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x200800, 0x0) preadv(r0, 0x0, 0x0, 0x0, 0x0) 20:19:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/icmp6\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/173, 0xad}], 0x1, 0x0, 0x0) 20:19:07 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000100)='cpuset.effective_mems\x00', 0x0, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) sched_setattr(r2, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000019840)=""/102400, 0x19000}], 0x1, 0x0, 0x0) 20:19:07 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast1, @in=@multicast2}, {@in6=@private2, 0x0, 0x6c}, @in6=@private1}, 0x0, 0x34000}}, 0xf8}}, 0x0) 20:19:07 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x3c3) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = open(&(0x7f00000003c0)='./file0\x00', 0x40c2, 0x0) dup2(r3, r0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4), 0x1c) 20:19:07 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001440)="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", 0x109}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="c3", 0x1}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 783.141845][T31926] new mount options do not match the existing superblock, will be ignored 20:19:07 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000500)=[{0x0}, {&(0x7f0000000100)="c6", 0x1}, {&(0x7f0000000080)='d', 0x1}], 0x3, 0x0) 20:19:07 executing program 1: r0 = shmget$private(0x0, 0x3000, 0x1a00, &(0x7f0000ffd000/0x3000)=nil) shmat(r0, &(0x7f0000000000/0x2000)=nil, 0x4000) shmctl$IPC_RMID(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) shmctl$IPC_RMID(r0, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000d06000)=0x18, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) semctl$SETVAL(0xffffffffffffffff, 0x2, 0x10, &(0x7f0000000000)=0x4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f00000001c0)=0x2, 0x4) r2 = shmget$private(0x0, 0x3000, 0x1a00, &(0x7f0000ffd000/0x3000)=nil) shmat(r2, &(0x7f0000000000/0x2000)=nil, 0x4000) 20:19:07 executing program 5: r0 = perf_event_open(&(0x7f0000001a40)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x26040400) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 20:19:07 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xa}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) shutdown(r0, 0x0) 20:19:07 executing program 3: gettid() timer_create(0x3, &(0x7f0000000180)={0x0, 0x17}, &(0x7f0000000000)) r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) timer_settime(0x0, 0x1, &(0x7f0000000200)={{}, {0x0, 0x989680}}, &(0x7f0000000240)) 20:19:07 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000400000/0xc00000)=nil, 0xc00000) 20:19:07 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000000c0)={[{@mpol={'mpol', 0x3d, {'prefer', '', @val={0x3a, [0x30, 0x2d, 0x35, 0x3a, 0x0]}}}, 0x33}]}) [ 783.974043][T31926] new mount options do not match the existing superblock, will be ignored 20:19:07 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="66530700ae897094e71b0fb1f147a825d86800278dcff47d01000067dd32378f364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2363933ea1315b9532f3af2f5e153eb78020fa00eb", 0x54}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 784.035175][T31973] tmpfs: Bad value for 'mpol' [ 784.045874][T31975] tmpfs: Bad value for 'mpol' 20:19:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x3c, 0xd9f, 0x0) r1 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) r2 = shmat(r1, &(0x7f0000ffa000/0x4000)=nil, 0x5000) shmdt(r2) r3 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmat(r3, &(0x7f0000ffc000/0x4000)=nil, 0x0) 20:19:08 executing program 3: gettid() timer_create(0x3, &(0x7f0000000180)={0x0, 0x17}, &(0x7f0000000000)) r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) timer_settime(0x0, 0x1, &(0x7f0000000200)={{}, {0x0, 0x989680}}, &(0x7f0000000240)) 20:19:08 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) 20:19:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfc, 0x6200}, 0xc) bind$netlink(r0, &(0x7f0000000180)={0x10, 0x0, 0x25dfdbfc}, 0xc) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfc}, 0xc) 20:19:08 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x3c3) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = open(&(0x7f00000003c0)='./file0\x00', 0x40c2, 0x0) dup2(r3, r0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4), 0x1c) 20:19:08 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) 20:19:08 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) poll(&(0x7f0000000000)=[{r0}, {r0}], 0x2, 0x1) 20:19:08 executing program 5: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)=ANY=[@ANYBLOB='nr_inodes=1']) symlinkat(&(0x7f0000000080)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 20:19:08 executing program 4: socketpair(0xa, 0x3, 0x1, &(0x7f0000000080)) 20:19:08 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchownat(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x1000) 20:19:08 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="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", 0xfe}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 20:19:08 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x3de, &(0x7f0000c22fa0)=[{&(0x7f0000000040)=""/15, 0x2d77744}], 0x1, 0x0) fork() [ 784.841516][ T25] kauditd_printk_skb: 146 callbacks suppressed [ 784.841583][ T25] audit: type=1326 audit(1619381948.736:5875): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=32010 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 20:19:08 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{@mpol={'mpol', 0x3d, {'bind', '', @val={0x3a, [0x37]}}}, 0x33}]}) 20:19:08 executing program 4: perf_event_open$cgroup(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fcb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2011, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 20:19:08 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c0a, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614fac6a21d3dcf2b3e871587f53cd809f98e", "f8b699c929b92ee722240b5b4c44a41eb88c87cff1866be0bec480ebc5c2189e"}) 20:19:08 executing program 3: clock_gettime(0xf170ee56a1c37d08, 0x0) [ 784.880027][ T25] audit: type=1326 audit(1619381948.776:5876): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=32010 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=26 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 784.923553][T32032] tmpfs: Bad value for 'mpol' [ 784.970135][ T25] audit: type=1326 audit(1619381948.776:5877): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=32010 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 20:19:09 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x3c3) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = open(&(0x7f00000003c0)='./file0\x00', 0x40c2, 0x0) dup2(r3, r0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4), 0x1c) 20:19:09 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000080)) 20:19:09 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0xa, 0x0, 0x4) 20:19:09 executing program 1: mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) chdir(&(0x7f00000002c0)='./bus\x00') r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r1, r0, 0x0, 0xa198) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x401c5820, &(0x7f00000001c0)=0x8) 20:19:09 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) read(r2, &(0x7f0000000280)=""/4096, 0x1000) mq_open(0x0, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) read(r2, &(0x7f0000000180)=""/185, 0xfffffdef) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 20:19:09 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x3de, &(0x7f0000c22fa0)=[{&(0x7f0000000040)=""/15, 0x2d77744}], 0x1, 0x0) fork() [ 785.007742][ T25] audit: type=1326 audit(1619381948.776:5878): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=32010 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=157 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 785.034170][ T25] audit: type=1326 audit(1619381948.776:5879): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=32010 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 20:19:09 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x1c, 0x0, 0xc04a01) 20:19:09 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x3de, &(0x7f0000c22fa0)=[{&(0x7f0000000040)=""/15, 0x2d77744}], 0x1, 0x0) fork() 20:19:09 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000080)) 20:19:09 executing program 4: r0 = creat(&(0x7f0000003240)='./file0\x00', 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000040)=ANY=[]) 20:19:09 executing program 1: mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) chdir(&(0x7f00000002c0)='./bus\x00') r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r1, r0, 0x0, 0xa198) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x401c5820, &(0x7f00000001c0)=0x8) 20:19:09 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x3de, &(0x7f0000c22fa0)=[{&(0x7f0000000040)=""/15, 0x2d77744}], 0x1, 0x0) fork() 20:19:09 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x3c3) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = open(&(0x7f00000003c0)='./file0\x00', 0x40c2, 0x0) dup2(r3, r0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4), 0x1c) 20:19:09 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000080)) 20:19:09 executing program 5: pipe(&(0x7f0000001880)={0xffffffffffffffff}) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) io_setup(0x9, &(0x7f00000003c0)=0x0) io_submit(r2, 0x2, &(0x7f00000002c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x0, r1, 0x0}]) 20:19:09 executing program 1: mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) chdir(&(0x7f00000002c0)='./bus\x00') r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r1, r0, 0x0, 0xa198) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x401c5820, &(0x7f00000001c0)=0x8) 20:19:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000380)={@in6={{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x0, 0x0, 0x1d, 0x0, "32cd4c8ddee62fdeffb9b98e2fedcffd56bd8d50f56847d16b564aeb6384562621ad945278234d3c48db25389f1698e25b250bc3d07edf691dd1b9c259d978c9ff49c11c5b6baf26b87844da23e71dae"}, 0xd8) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x32, 0x0, "def152ef6ea77efc9b51480189cf0d9511a1bb2939d56c3f2b79c6d836ec2c73addbc8871cec6505eb4bd2496811112463817baa8d20d4bd9031d3c9bcb4fe51b3105695aa33ca0e85f26fd76326edd4"}, 0xd8) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) 20:19:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00jiJqv\xdd\x92}\x00\x00\x00\x00\xd7\xcfq\xe5s\x9f\x16Hs:\x87\xbf\x15\xbb\x17\x1c\x8b\x1bio\x91\x05R3\x1a\x87\x18Z1\xcd\\\xb2\xbah2@\xc3U\x84G\x84\xdb\x04i\xd4w', 0x0) fsetxattr$security_capability(r1, &(0x7f0000000000), &(0x7f0000000080)=@v2, 0x14, 0x0) pwrite64(r1, &(0x7f0000000180)="a9", 0xfdef, 0x0) 20:19:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000380)={@in6={{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x0, 0x0, 0x1d, 0x0, "32cd4c8ddee62fdeffb9b98e2fedcffd56bd8d50f56847d16b564aeb6384562621ad945278234d3c48db25389f1698e25b250bc3d07edf691dd1b9c259d978c9ff49c11c5b6baf26b87844da23e71dae"}, 0xd8) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x32, 0x0, "def152ef6ea77efc9b51480189cf0d9511a1bb2939d56c3f2b79c6d836ec2c73addbc8871cec6505eb4bd2496811112463817baa8d20d4bd9031d3c9bcb4fe51b3105695aa33ca0e85f26fd76326edd4"}, 0xd8) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) 20:19:09 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r1) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgroups(0x2, &(0x7f0000000180)=[r3, 0x0]) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) fstat(r4, &(0x7f00000024c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, r5) syz_open_procfs(0x0, &(0x7f0000000040)='net/nf_conntrack\x00') 20:19:09 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000080)) 20:19:10 executing program 5: syz_mount_image$vfat(&(0x7f0000001440), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000fa", 0x16}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) 20:19:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000380)={@in6={{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x0, 0x0, 0x1d, 0x0, "32cd4c8ddee62fdeffb9b98e2fedcffd56bd8d50f56847d16b564aeb6384562621ad945278234d3c48db25389f1698e25b250bc3d07edf691dd1b9c259d978c9ff49c11c5b6baf26b87844da23e71dae"}, 0xd8) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x32, 0x0, "def152ef6ea77efc9b51480189cf0d9511a1bb2939d56c3f2b79c6d836ec2c73addbc8871cec6505eb4bd2496811112463817baa8d20d4bd9031d3c9bcb4fe51b3105695aa33ca0e85f26fd76326edd4"}, 0xd8) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) 20:19:10 executing program 1: mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) chdir(&(0x7f00000002c0)='./bus\x00') r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r1, r0, 0x0, 0xa198) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x401c5820, &(0x7f00000001c0)=0x8) 20:19:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="4c0000001d00290700000000000000000a0000000000000000000000040001"], 0x4c}}, 0x0) [ 786.137677][T32131] loop5: detected capacity change from 0 to 16 [ 786.157876][T32131] FAT-fs (loop5): bogus number of FAT sectors [ 786.164057][T32131] FAT-fs (loop5): Can't find a valid FAT filesystem [ 786.222142][T32131] loop5: detected capacity change from 0 to 16 [ 786.231539][T32131] FAT-fs (loop5): bogus number of FAT sectors [ 786.237755][T32131] FAT-fs (loop5): Can't find a valid FAT filesystem 20:19:10 executing program 1: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/238, 0xee) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0xa9}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000340)) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f0000000180)) tkill(r0, 0x7) 20:19:10 executing program 3: r0 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="240000001a0007041dfffd946f6105000a0003e8fe02080100010800080002000400ff7e", 0x24}], 0x1}, 0x0) 20:19:10 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x40) sendmmsg(r0, &(0x7f0000006c80)=[{{&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, 0x0}}, {{&(0x7f00000001c0)=@l2tp6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x40}, 0x80, 0x0}}], 0x2, 0x0) 20:19:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000380)={@in6={{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x0, 0x0, 0x1d, 0x0, "32cd4c8ddee62fdeffb9b98e2fedcffd56bd8d50f56847d16b564aeb6384562621ad945278234d3c48db25389f1698e25b250bc3d07edf691dd1b9c259d978c9ff49c11c5b6baf26b87844da23e71dae"}, 0xd8) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x32, 0x0, "def152ef6ea77efc9b51480189cf0d9511a1bb2939d56c3f2b79c6d836ec2c73addbc8871cec6505eb4bd2496811112463817baa8d20d4bd9031d3c9bcb4fe51b3105695aa33ca0e85f26fd76326edd4"}, 0xd8) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) 20:19:10 executing program 5: creat(&(0x7f00000001c0)='./bus\x00', 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) dup3(r0, r1, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, r1, 0x0) read(r1, &(0x7f0000000180)=""/19, 0xfffffe47) 20:19:10 executing program 2: r0 = syz_io_uring_setup(0x5575, &(0x7f0000000080)={0x0, 0x0, 0x1}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d5000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f00000001c0)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 20:19:10 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) wait4(0x0, 0x0, 0x0, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r1, 0x388, 0x9df3) ptrace$pokeuser(0x6, r0, 0x388, 0x0) 20:19:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240b0000010200000000aff0f6b78ef7c8962c22772e108cf41bdd0000ffff825bbbfffffffffff00300", 0x2e}, {&(0x7f0000000680)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70b12535b38940d748bc0ec6c000000001b1bab0525dcda9f60dd168581a4095dc9fab22c7600f8d85f960511335d85", 0x58}], 0x2) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0xf5}], 0x2) 20:19:10 executing program 0: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) open(&(0x7f00000001c0)='./bus\x00', 0xc0000, 0x0) 20:19:10 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0, 0x0) rmdir(&(0x7f0000000040)='./file0/bus\x00') 20:19:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet(0x2, 0x3, 0x14) setsockopt$inet_msfilter(r2, 0x0, 0x8, &(0x7f0000000200)=ANY=[], 0x1) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000000)={0x0, @local, @local}, &(0x7f0000000080)=0xc) sendto$packet(r1, &(0x7f00000000c0)="b23d921378e9a83f1254ccf05513784d88a8", 0x12, 0x0, &(0x7f0000000040)={0x11, 0x8100, r3, 0x1, 0x0, 0x6, @dev}, 0x14) 20:19:10 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) 20:19:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x7ff}) 20:19:10 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1496d, 0x0, 0x0, 0x4}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./cgroup.net/syz1\x00', 0x1ff) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x6, 0x103382) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000340)) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) rt_sigtimedwait(&(0x7f0000000200), 0x0, &(0x7f0000000400), 0x8) ptrace$peeksig(0x4209, 0x0, &(0x7f00000004c0)={0xffffffff, 0x1, 0x6}, &(0x7f0000000840)=[{}, {}, {}, {}, {}, {}]) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x40, 0x0, 0x0, 0x80, 0x0, 0x6000000000000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x9, 0x1, 0xffffffffffffffff, 0x9, 0xad}, 0x0, 0xa, 0xffffffffffffffff, 0x2) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x5, 0x0, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614fac6a21d3dcf2b3e871587f53cd809f98e", "f8b699c929b92ee722240b5b4c44a41eb88c87cff1866be0bec480ebc5c2189e", [0x0, 0x2d]}) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x18) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x1d, 0x9, "2bbb19e5631df896ba98674d0b4703551f0d03e2ed186049da15bffbdd1a3e02c2dda1e04e6fcd5ce9801d897649292487be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7, 0xfffffffffffff8a2]}) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000600)={0x0, {}, 0x0, {}, 0x0, 0x2, 0x4, 0x0, "641f738624679713ddee573f4b3e937f520d11dea6b6892979b70eb1f3e79c3856d788e3188ac0e792a061aee7ef6fc3a31cebc504d6d790e331ce9bb00f50a1", "18a4fa05cd8e41a6cd843acc762cf3fd6b38a179b93e896f6f2c0405ffb2b018", [0x9, 0x101]}) 20:19:10 executing program 0: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_setup(0x59d8, &(0x7f0000000240), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x4000)=nil, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0x0, &(0x7f0000000340)=""/65, 0x41}, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800009, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) 20:19:10 executing program 1: r0 = epoll_create(0x2) lseek(r0, 0x0, 0x7) 20:19:11 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x11e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x7) 20:19:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000010500)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000300)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) getdents64(r1, &(0x7f0000000280)=""/205, 0xcd) 20:19:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x2de5, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000400000/0xc00000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000a00)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_LINK_TIMEOUT={0xf, 0x8, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x77359400}}, 0x38b) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_io_uring_submit(r2, r3, &(0x7f00000001c0)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x0, 0x0, r4}, 0x0) io_uring_enter(r1, 0xa2, 0x0, 0x0, 0x0, 0x0) 20:19:11 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCMBIC(r0, 0x5417, 0x0) 20:19:11 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) clone(0xe684a500, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) clone(0x200000, &(0x7f0000000000)="d8bac004e7c905ff82376f82b874f37c6eeec93efee298edade2af6bec2e8e1013679350d3392a60485e59825b205e4303f4d07ec3f9f4c34153c62348519c7e899e2e20aabc6277418c92878c12792ddb208b50b23909fb3bf091dac98793af2b3d430fc58e0ff78419aed294c045703bd701a1721bcf848d9573f6baf3d0d09fd8e6d5d567095bd9d886badcce77a36ed4549c4c4663d1ef5d1e6ab7cdd76f3146e7af35ebe5020ea399b6b711a04a5709db2365624064673e025e86b71f7699c499783b805bc904d7690364305b1484d8de38c341b0f22f7abd8d874c18a458224538f6a42e2ab50dfe09c9dcacc177b64f340a505e", &(0x7f0000000180), 0x0, &(0x7f0000000200)="4fb8a486bb3d70c4e68462985ba8bef8521c26bbdbc116b8252cac37b1a663da900ab76744f75f9767248835188e60e3db4bb114a4ab147167589d752f7f69560dc4dfa7e4b0b2263ed24c5c4f560c0488b77ad2c1eb70c2cad11007") wait4(0x0, 0x0, 0x0, 0x0) 20:19:11 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r3 = socket(0x400000000000010, 0x3, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r2, 0x0, 0x3, 0x0, 0x0) 20:19:11 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x11e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x7) [ 787.179147][T32221] loop4: detected capacity change from 0 to 512 20:19:11 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(r1, r3, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r5, 0xee00) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0x0, r7) 20:19:11 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x5) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000180)=0xffffffc1, 0x4) sendmmsg(r0, &(0x7f0000001e00)=[{{&(0x7f0000000180)=@l2tp6={0xa, 0x500, 0x0, @remote}, 0x80, 0x0}}], 0x1, 0x0) [ 787.220584][T32221] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 20:19:11 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r2) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='reno\x00', 0x5) 20:19:11 executing program 4: timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)) timer_create(0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) unshare(0x20020400) fcntl$lock(r0, 0x6, &(0x7f0000002000)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000080)) fcntl$lock(r0, 0x7, &(0x7f0000000100)) timer_create(0x0, 0x0, &(0x7f0000000100)) timer_create(0x0, &(0x7f0000000000)={0x0, 0x13}, &(0x7f0000000280)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) 20:19:11 executing program 1: mremap(&(0x7f00006f2000/0x4000)=nil, 0x7fffdfef9000, 0x4000, 0x3, &(0x7f0000106000/0x4000)=nil) mprotect(&(0x7f0000107000/0x2000)=nil, 0x2000, 0x100000e) 20:19:11 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7a}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x0) getrusage(0x1, &(0x7f0000000080)) 20:19:11 executing program 0: r0 = open$dir(&(0x7f00000011c0)='./file0\x00', 0x42, 0x0) write$binfmt_elf64(r0, &(0x7f00000011c0)=ANY=[], 0xfffffe1e) fcntl$addseals(r0, 0x409, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), 0x0, 0x0, 0x0) 20:19:11 executing program 5: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x6, 0x0) 20:19:11 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000003200)=[{{&(0x7f0000000000)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000040)="d9cf", 0x2}], 0x1}}, {{&(0x7f00000001c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000003340)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x4}, @timestamp={0x44, 0x4, 0x49, 0x0, 0xf}]}}}], 0x18}}], 0x2, 0x0) 20:19:11 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="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", 0x14b}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 787.449559][ T25] audit: type=1400 audit(1619381951.346:5880): avc: denied { create } for pid=32288 comm="syz-executor.5" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dccp_socket permissive=1 20:19:11 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x41, &(0x7f00000000c0)=0x27df, 0x4) sendmmsg(r2, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r2, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0xff00, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000001100)={'lo\x00', 0x0}) sendto$packet(r3, 0x0, 0x0, 0x0, &(0x7f0000001140)={0x11, 0x3, r4}, 0x14) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={@private2, 0x7c, r4}) r5 = syz_open_dev$tty1(0xc, 0x4, 0x2) writev(r5, &(0x7f0000001240)=[{&(0x7f0000000000)="8e0ee8678a081b4d309b3348", 0x2009}], 0x1) 20:19:14 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x11e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x7) 20:19:14 executing program 1: r0 = socket(0x2, 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)={0x60002002}) epoll_wait(r1, &(0x7f0000000040)=[{}], 0x1, 0x4000d898) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000c, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = dup3(r0, r1, 0x0) shutdown(r3, 0x0) 20:19:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae897094e71b0fa1f147a8378f3657cdcf86db93aa6ed9", 0x1b}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x1e) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="02000000010004000000000002000100", @ANYRES32, @ANYBLOB="040004000000000008000400", @ANYRES32, @ANYBLOB="08000500", @ANYRES32, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0xee00, @ANYBLOB="01000000", @ANYRES32, @ANYBLOB="08000300", @ANYRES32, @ANYBLOB="08000500", @ANYRES32=0xee00, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB="08000400", @ANYRES32=0xee01, @ANYBLOB="08000500", @ANYRES32, @ANYBLOB="100002000000"], 0x7c, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 20:19:14 executing program 3: r0 = perf_event_open$cgroup(&(0x7f0000001c40)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0x40082406, &(0x7f0000000000)=ANY=[@ANYBLOB="28402833c8c2668dc9a2e503830759b26ce7f57483c09911c27b7ef32bcabe66e0c3f4acab4290d9bce012f57e5204d0fe94b667f8c5bd92f96f1cc69ca33e59e7e1ed06f955c6bfb2e95f1d3bad66fe3dee4e9289324367faeabeba3cedb0842b29"]) 20:19:14 executing program 0: ioprio_set$pid(0x0, 0x0, 0x4007) 20:19:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RXATTRCREATE(r3, &(0x7f0000000040)={0x7}, 0x7) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xfffffffffffffffb]}, 0x0, 0x8) splice(r1, 0x0, r2, 0x0, 0x200, 0x0) 20:19:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 20:19:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x11, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 20:19:14 executing program 3: r0 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000100)={0x1}, 0x10) write(r0, &(0x7f0000000080)="240000004a005f0014f9f407000904000a00000000000000000000000400020000000000", 0x24) 20:19:14 executing program 0: futex(0xfffffffffffffffc, 0x7, 0x0, 0x0, 0x0, 0x0) 20:19:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae897094e71b0fa1f147a8378f3657cdcf86db93aa6ed9", 0x1b}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x1e) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="02000000010004000000000002000100", @ANYRES32, @ANYBLOB="040004000000000008000400", @ANYRES32, @ANYBLOB="08000500", @ANYRES32, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0xee00, @ANYBLOB="01000000", @ANYRES32, @ANYBLOB="08000300", @ANYRES32, @ANYBLOB="08000500", @ANYRES32=0xee00, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB="08000400", @ANYRES32=0xee01, @ANYBLOB="08000500", @ANYRES32, @ANYBLOB="100002000000"], 0x7c, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 20:19:14 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f00000001c0)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000014, &(0x7f00000000c0)=0x1, 0x4) sendmmsg(r0, &(0x7f0000008f80)=[{{0x0, 0x0, &(0x7f00000012c0)=[{&(0x7f0000000200)="93cec981406d1666b5148be4b1ec613b0d8b63a48a8aceba6d7ca428233380d3f329d856322e3bc416acbe972a70dacf2f17a19b782402bd8df7e3eb2bc6f763414ef9595325bdc490975e9f858fca7105906dd6acb180cc27698d3af01a523148285fac00ce10431ecc671eb84c8620f8db05d25da76a728c306462360fb77d4f9554daa8056b7cadd1f2b5dd85e704a763b5c9d0ecda53801200092408ffe745be87244e6b10b25e584a5f8a98743b74850a5d35d4a56bc6055af9c82d94cd86f5bbb40148e2ee094d370a646d8e414efb804a081b17d37f051ca31fec1a85fa73f674124098d9968e801a173388b7ffb8809fe3678c26f7daf77669ed8f48c710d2a41c7ce795960ee626b396b6bdd4b65ba515d403a1acea4809d7edfc5dafe8adec42ec6b561acdd39289dcc34bde2547c731120d6289cf7b4fb63636d3174539b9b30f0cf9e29bdad6431f160900e9c20aefc9369a7d040627955752558f8a50065dc6c73c4394e80cd30693d6338bd5d10c7e39ad102d4a40f99eb003628d30e0f19b6c71ba43bfcbabb25128ec5a228b38d612530a0cda9dd8ae235399bff70e7e012aa942d8b89543cd67d54f501ca7ab3a736dcad422b732752445659fe661dfe31428b10c233044e06d96677e238dd445848974f36bee1cf00b4dd37e3d31ce97ed0721bb0bdb8480684d3287aad8042fafe0fee126e89d881eae08d73a20099de5c9babbe3e41cdca54a306df89868c99056de5bdd580a35add56972c7f49fb2025a22ac28e7d85a6559c6bd44f5fc286bf9690249b65f022b5bb02f90a21bd1baf5eca6762cadc3749b4191af32f8dc70d22835c27863c7a0a9d7ca6b0378062fecae09e9b713f79260e1f32fda902c8135b8e8bc0b4054d986ff0ce207ff4843505acfc574b1d46edf1b0429a804f359fa689e2eea91a2169277e5b476b1f69ba2eb68ac602ca31f28e40795a4c0fecd5113d013a8af96ffaffeaefc1c76bc7e923a32f2da03b8961d206b7143094955a059166e5940fc5ebd2bbb58cc933fc1325b66a8487304f5b3b189470e1ea9ea6d1a21c42fe48368ae0cb9acf84415e10e394940b18012c39334133470f5af09abcf14b5ab11b1aa2c40ec21fae14ab799a4156541c69877fbd1eabccf10b78581603f5048d3f2df60ccbc32573695010187ea1d61e9e8ba2b1431ce740aa8f7b1d0e31de01a3c0c3cac1436ccaee07207e10e5b750f1a85755f327080d77ba8dbd7f612c0a50f5541498edf71c7fc829b038c7a46e803a0b7ab47d3141a0dabcc1fd51f7baae7a7852554bddcb810ed3b954375720aa8ac177c3af0a340e89018a7f18f42b87ff8afb3340ef26b873a11e6fbdce7ae436d323bd37f099baf6a8fbf8472ec79b4bcf9aa504b63df76bb10e419e11a0c92254a174e4790a3a593cb3f350380f697578e73a997c60f48522c45d2b608fd4b59b8fe28615833b883ace25b017226a55729321a7414540ad8bbb7f245fa8c7e4711aa6379f53f65d42c8c0f048232d2e64b790f1b8b67fdbea73c6b1bd4c93c4011e777953786e67500e2add2bae90796c2024e52d812ef72b16db3c73abcbf863ca9a4ad9e953f365062be6766abbcf0eee727271032d9d6ca8800deeb1a0a681bfe8e84dc9932f5ec9e4c42da48145f50e63ce9efe5d40397739602cc3f1f83e917d486b6b928e3157158bcd83aab5183e2e73e68aa70d53f2290a9a23a4ae0d9a3e20f9f1eecbdf3f9a2071c3b88c96c3e1ddb7f52dfffc45e84f923c0e794d7fdd4f95057387023ae130373bd22259d30cbc5f8873e487e33eb96302416c03b96084d57c4dd9a65fc597b669ffcfb5766fa44d715b14abdded536042bbcc27795a45d7e5daaab32d1264c85f6ea3c73cd022f0d3500972f9335587886278597d4c11d3934516ad8c8019bff5831ea4ccb946fd94c68f4ae4a235f53ccad9bcad636be47871c9b41c6235fd9eb66ebc628ca9e8ee84dd9da66c8ff2dfe23b7c2d8a3f737c7b85b3609d848b2ddfa6a35d830e5ba719b347dd7bbae2bc2033f7382b5b0f398dd86d37b91761c094b5b2ffe4da035962b30c424cdcdcbf3bf20b1b6526715e3524cac3534514eb18f8c29688253d69ba188c07f74e8f020db3f75b31231f68dfdac1f997e00a30b686db92cbab0b1614474066724850e1b6939a1d7206f05e01756f070c32e4eb01cc67370a4fab8dfffee8061d94029a90c2f362be604e0867f40094251c1afb8e7b56dc8e1073cf418ba8f4bb34059181b3553c21593d2b3c8ccd66596b54e10deb6f8416c872c82867eb0ab7f0a984bb1e9e9742ceca392cf14d6094b9685f823d7cde44b4a125260d752340b1deb573378962aa2c0def4bd7966ea6a4b32ffe46f31d1f42f5e34865f97a225ad11ef1e0b52ac6d676ca0e69b172ba976983359c641c1d48dc2e30a8ff48743cb32db908705d4aceb3675cc7c93828c337988e3ae07d9dd629aefb91dd4ac141f6c581aab8ab7ec5fed08918d270dc14e3104802c26b19d0217cb90941fb59c4a3fc38e52858eb2706ada445ae55e23fcc0b96ded1b8816881975b65678801965689990f669567f4319a59df2e82269f67cb273786d54076656bf86439f8e3b7582974cbfb341c1315f75653c69a34f26fe7b3db9651f870d1a11fc4700c2fcc7da65d0194c018fc44c0a1cec7b0926e6a995460950e4b9030154dc8df2ab4050c142bb9b6c7242c9a8bdfd92a979809114d694a646985ab0f5de8cec0c9b42e3d159857c44f2ee2e63b09f5f28993d240542da6ad6e71b47b4d49494e63a8afc4245ce249c78801b15de7e4b5518e71cb799c756b0cf733ad4834fa7e25c82b9319c40a587abd0152a524af027adf4c6fd66c34f83bb9ca6d0883d0e65e2bbec103444f3aedc61919bf4516410b02bb8548a1fbe50d22fe807950b097fb22beef07fda1fa46ef02b6c6cc1628cadd26717f725ba5eeca955deba2e5e725c0b591657f2e82c8086fdf3536ca5dd1d8edf80eb0506eb6ef27392a3e96ba38d285d4168b5df91858f8dee3267ecb7c3f04a77f62c4489f0fb47a34bf99c4e544a508fb5c47d3537e89a8a8095e6cf436df008a9f828634d7a7ebec1778ddd5cbad9a9300be7695b2c2d64beab6352a35190f3af0f7ebeb07a1bb0ea2e4f0aa7a3d66fb72cc3df03d3bed984e96b9e31d010f5661c9c09e7c3936d75b6d17f6135d274ea125d815390512f91fdb6914da7b4b8160b71777bda2e49b0b2e2924c5a06b51c7216fbf0230947b62454390e5854206afa86b5826a2475a58446eb537c5e94e4122492fcbe655ed4119e8c0be5a576d32de1f881d08b1a2689960fa0cd3ec031a2b0714b4b975e6f48556b33aa3d5e96831999ca839dc884e88b5b7968cda20f3d8a949edf5c4dd7fecec9c78ae817af56d068a70ea902a489e06dd02959e308ed959b093314ed403ee1bfb74ac602032e32d13c9d3e5a10c435740bb8f0885569ac6a247fd9f423fee0302c82b855e6e97007f069473e6005ab254e6a2bf6c4c95b7f4d74c625cdd7a959308d4c6cb6c17ca79906d513b612dc17de819252b001890f4bb16b506b085f4b00f24aa8089158f6db048630bb7e0a51d330790e3e934f6465aa3edee90fda7bd07060498f8648fd1737d8dddc4a0b8fc40b9b99ee8e97fe369e7f03f3f1d95ed26f33f75b3bc3f4053793e9ad7bf4fb0ec41741b679b48dc897fbde6417b0440467cba48481256b0ef11b209c7dad382720bb72a28a32f5fb5b1e921ae8f93c8632bc58c1cd8e5dc386e6f158e07e81f5b67a68f1cefa3f58d27b15c407158e3f38415009c24c82455f11cf1c9eb03dca10611ef4eb5bb357399192c6b6a15202ea39db8d5b541a5c98127ddd8ea26e598ac4210ac67af6967d5879a64cbc6f1698e2222208534b7a9518121e6925fda4801d023033f6b48f339056a99ce21f84ce8a3c4bd965d789ca6f2cc8f8e6bb05da9b7ab4f0fab323096844db1fd0aea36423291dbc5100de815b290d391a821fa7e0187552664bd1d6105cc747e93d60d40101b68b977ec1c90cf5bac5713a94a5e31d09b9bc1684576625e7630d41a2c37d2e4d28f03068f7e0ab9046a9fc9e0a1ce7179a7d168f1739d244f0b7bc917b40266d283fb45f20d1c31661d44cb8e4c6a16ae55f8b1c28e4ba03f76c89669a2c4e96d3c77c10e4eda19e5a16b65c7df972f3b93397cedcbd8117710ae4e8086ff7a20d852536f502157b52111bbbd08c481918eff2f9b9e5e97cab5869f842a17477db2e21043f80fc0287b98d986f7cea10b8a45d7e8f825950ff28dc486b83213063043251ce8da11bde11edd87457dfa5f7448a5663be922ba928123ebe2f826324f7eb1c6a47c84987451e18cf5be7f3793b9e75a5a62800b6934b106c1396d9f2faff52a6eac66fa35ec7bef227b203409ae32f2d1a77fd1910712ddf4eecae62b0981a0a8722a4f1b5e1711cd1bcc19d8d56dba6d6cabb6bc27a6dff53ab6e5f97954d67f5151d507f7bc72d152fb404277552df24c4b5f0c0a6bcecdc22dc2dda65c3af129236f7f27b4e7edce3c74a608f130bc252b84e9e1a1d27227df419254288eafc59ffc5aa3204a47a1182d403818154871dfd748e974d78284e16a875b379e0ab3ecafa2c4d1f72aa9242711a86f47f5444041815f8c5d9c085ac5c3be9bc905e9ef8013df3eda98a770d8b165c6ce2615357bc3014d71250e43bf911a12269e09b21cd17819d03df3a48de1a8e6874e4ed1506f75bb7fbf17df047c5b6338db7c59225b437cc2e6e44cacfa68a33e3fd936351c3e396492f728b681723ad9e59e26fe4d5164cc95902dca915d4a2834e634274a058459446ef78129d6bd737cfe303d5eee1214d17c9fed4ab696b5ec4bc5d068ddf50c92fccba4c82e83f5fd5de8a262b544c9f09e6dc99445ebc2ad4f9f64338953fccac290cb87bc987f4b65399624b3d24390e3918712fb459c2bc414ab6813bae45cae73ac28963a252189e7ed1c0477c14199234763392dc5e9aae35378393e84cc1406509ed2a6be121f39f1ace7176be4cb43fe0f309c57911761002e525fb5ca12c8593b14d516ff8dca668d8ece4645b6afd2bec0b5a07525d47793610c33e77561676ff1fcde971e675cf938fcb34e5013694a44346b5e608c5bb02fca34f4f9fa8cf02f858c0841871743e9b58ed29d46ad0f26e866c31858b98f714d47b4cbd27d394323ee94b98eb8793b828a17c3968b4b012117e60d09a9621ff4d35e4f1bcf8d4fe0f5525335fbccd4cd2777b320c542fb21559d6d3f89b9858339a8bb8488c325f69444c78ebab25aab110886dc6990f57705ebe72be5bddb83d78e57d99b0067d1c4fd7d991ca324968c3757eeb6137dc42c617cd8e3e787d335836f6c00edbf641eef0d1a627b2d212c530888bc69900352d33da423e35ec99993c41ce64227cf3c2d3113bba35eaca756e2301891432a1d98cf55034ff25640cb2711273de65eb05451d5773c756826ed0bac830fdf39f222e76ff8ac859698cba915d717d60d4a554df0903aeefa62dc75d2abe2b6fdbb914dbd5a28815aea8d265ce7b7114d867075252a21a9417b4b6949b4261fda722d7619fe2e24bb4191e6c802d6ae39fc844f2f64eceed2dbc79afc1638207e10de98885239f649502e9079b2478dd516f3c46b7cdb2e4218d9d68615e60d5e2b8a78eed8b046b3ef700017f6405e78e4041c148ad3dff055541e451451972dbe10b35df1eaa821298902fcb6e4a77", 0x1000}, {&(0x7f0000001200)="a2", 0x1}], 0x2}}, {{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f0000001640)="f9", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000001c80)=[{&(0x7f0000001c40)='<', 0x1}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x48}}], 0x5, 0x0) 20:19:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x2de5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x4000)=nil, &(0x7f0000005e40), &(0x7f0000000140)) sendmmsg(0xffffffffffffffff, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x158}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000025c0)=[{0x58, 0x1, 0x0, "bec2a9f7740a377ddd5e96c58a5b31a16aadb962544be51d47b4041c53896a0a5bd587cb9be8f3b14f115e0e2654bba037db125a4c7f05a05b09f371168a9290ba"}, {0x30, 0x0, 0x0, "cde19b1b8b351585a063e2ddd7a3fa301e6c6781292fb62632"}, {0xb8, 0x0, 0x0, "05f060a91b36dbd30fa60ee59cdcbae4b6627b99fcfcf508d52d49dc8054fcec4b3f7a0d51d17f14689514e89608aab0de0f9136cac2f24f2345ffe5beedd2f9975db8add66bb56053f5274a006f72a8af66e37501176787bb85f31a925e86ae2bc799995ba12ec9b95c919dee489f76d8852a445fd32a40b005a8ae61f731aecf75a7421fa55c4645a5b5400d58cb414d036dbd3f9c70556576cb6e7414992f9e"}, {0x908, 0x0, 0x0, "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"}], 0xa48}}], 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) 20:19:17 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) move_pages(0x0, 0x10, &(0x7f0000000040)=[&(0x7f0000ffd000/0x3000)=nil], 0x0, &(0x7f0000000080), 0x0) 20:19:17 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x2, 0x11, r0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) 20:19:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae897094e71b0fa1f147a8378f3657cdcf86db93aa6ed9", 0x1b}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x1e) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="02000000010004000000000002000100", @ANYRES32, @ANYBLOB="040004000000000008000400", @ANYRES32, @ANYBLOB="08000500", @ANYRES32, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0xee00, @ANYBLOB="01000000", @ANYRES32, @ANYBLOB="08000300", @ANYRES32, @ANYBLOB="08000500", @ANYRES32=0xee00, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB="08000400", @ANYRES32=0xee01, @ANYBLOB="08000500", @ANYRES32, @ANYBLOB="100002000000"], 0x7c, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 20:19:17 executing program 3: prctl$PR_CAPBSET_READ(0x17, 0x24) r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000000c0)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000001c0)={@private0={0xfc, 0x0, '\x00', 0x1}, 0x11, r1}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote, r1}, 0x14) prctl$PR_CAPBSET_READ(0x17, 0x28) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, 0x0, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000010}, 0x4000000) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x1, &(0x7f0000000000)="3edd3b8b9e260e5c4a7b955a4eaeb4faf3e41a222d7e33dec478e696a0c3e554a7d57ce21bb9fa64f79f995245fedc99879af19f80c3e4842702c80cbcd44d84565d7bd6e09a36e30a0f40c8ed842e084894c4d7e76e7203cfd2bc50171d6432577ebeb47f8e05be7250988bfd8e7890f90cc93afd7116b059341c6de57daa") 20:19:17 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x11e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x7) 20:19:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae897094e71b0fa1f147a8378f3657cdcf86db93aa6ed9", 0x1b}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x1e) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="02000000010004000000000002000100", @ANYRES32, @ANYBLOB="040004000000000008000400", @ANYRES32, @ANYBLOB="08000500", @ANYRES32, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0xee00, @ANYBLOB="01000000", @ANYRES32, @ANYBLOB="08000300", @ANYRES32, @ANYBLOB="08000500", @ANYRES32=0xee00, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB="08000400", @ANYRES32=0xee01, @ANYBLOB="08000500", @ANYRES32, @ANYBLOB="100002000000"], 0x7c, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 20:19:17 executing program 4: clone(0x66100d00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_netdev_private(r0, 0x8947, &(0x7f0000000000)=':') 20:19:17 executing program 1: syz_genetlink_get_family_id$fou(0x0, 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, 0x0, 0x0) 20:19:17 executing program 3: prctl$PR_CAPBSET_READ(0x17, 0x24) r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000000c0)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000001c0)={@private0={0xfc, 0x0, '\x00', 0x1}, 0x11, r1}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote, r1}, 0x14) prctl$PR_CAPBSET_READ(0x17, 0x28) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, 0x0, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000010}, 0x4000000) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x1, &(0x7f0000000000)="3edd3b8b9e260e5c4a7b955a4eaeb4faf3e41a222d7e33dec478e696a0c3e554a7d57ce21bb9fa64f79f995245fedc99879af19f80c3e4842702c80cbcd44d84565d7bd6e09a36e30a0f40c8ed842e084894c4d7e76e7203cfd2bc50171d6432577ebeb47f8e05be7250988bfd8e7890f90cc93afd7116b059341c6de57daa") 20:19:17 executing program 0: openat$incfs(0xffffffffffffffff, &(0x7f0000000100)='.log\x00', 0x59d382, 0x0) 20:19:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x80000000}], 0x0, &(0x7f0000000400)) 20:19:20 executing program 4: clone(0x66100d00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_netdev_private(r0, 0x8947, &(0x7f0000000000)=':') 20:19:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/206, 0xce}], 0x1, 0x0, 0x0) 20:19:20 executing program 3: prctl$PR_CAPBSET_READ(0x17, 0x24) r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000000c0)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000001c0)={@private0={0xfc, 0x0, '\x00', 0x1}, 0x11, r1}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote, r1}, 0x14) prctl$PR_CAPBSET_READ(0x17, 0x28) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, 0x0, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000010}, 0x4000000) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x1, &(0x7f0000000000)="3edd3b8b9e260e5c4a7b955a4eaeb4faf3e41a222d7e33dec478e696a0c3e554a7d57ce21bb9fa64f79f995245fedc99879af19f80c3e4842702c80cbcd44d84565d7bd6e09a36e30a0f40c8ed842e084894c4d7e76e7203cfd2bc50171d6432577ebeb47f8e05be7250988bfd8e7890f90cc93afd7116b059341c6de57daa") 20:19:20 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000000c0)=@newsa={0x118, 0x10, 0x1, 0x0, 0x0, {{@in6=@remote, @in=@multicast2}, {@in6=@loopback, 0x0, 0x6c}, @in=@private, {}, {}, {}, 0x0, 0x0, 0xa}, [@replay_esn_val={0x2c, 0x17, {0x4, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0]}}]}, 0x118}}, 0x0) 20:19:20 executing program 0: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000080)='./file0\x00', 0x0, 0x3, &(0x7f0000000280)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f00000000c0)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000040)) 20:19:20 executing program 2: clone(0x66100d00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_netdev_private(r0, 0x8947, &(0x7f0000000000)=':') 20:19:20 executing program 4: clone(0x66100d00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_netdev_private(r0, 0x8947, &(0x7f0000000000)=':') 20:19:20 executing program 2: clone(0x66100d00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_netdev_private(r0, 0x8947, &(0x7f0000000000)=':') [ 796.306512][T32449] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.1'. [ 796.315996][T32448] loop0: detected capacity change from 0 to 184 20:19:20 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="66530700ae897094e71b0fa1f147a8378f364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb298802d8f6c1f3b18d6d352507f7018b31a53bad1ec3533c791a753a1fef2c560001000000000000fb8005128e7e4d939955f8ac396203784000400f573fbf000000000000000761f35e959f130dec95128ce7ec033dc0a380543bfc99320be1", 0xa5}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000050}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 20:19:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/206, 0xce}], 0x1, 0x0, 0x0) 20:19:20 executing program 3: prctl$PR_CAPBSET_READ(0x17, 0x24) r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000000c0)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000001c0)={@private0={0xfc, 0x0, '\x00', 0x1}, 0x11, r1}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote, r1}, 0x14) prctl$PR_CAPBSET_READ(0x17, 0x28) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, 0x0, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000010}, 0x4000000) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x1, &(0x7f0000000000)="3edd3b8b9e260e5c4a7b955a4eaeb4faf3e41a222d7e33dec478e696a0c3e554a7d57ce21bb9fa64f79f995245fedc99879af19f80c3e4842702c80cbcd44d84565d7bd6e09a36e30a0f40c8ed842e084894c4d7e76e7203cfd2bc50171d6432577ebeb47f8e05be7250988bfd8e7890f90cc93afd7116b059341c6de57daa") 20:19:20 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, "13396a14d34d76b76dc75116953b93ae63590d"}) epoll_wait(r1, &(0x7f0000000040)=[{}], 0x1, 0x1) 20:19:20 executing program 2: clone(0x66100d00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_netdev_private(r0, 0x8947, &(0x7f0000000000)=':') 20:19:20 executing program 1: r0 = open(&(0x7f0000000280)='./file0\x00', 0x3fc, 0x0) flock(r0, 0x1) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) flock(r1, 0x6) 20:19:20 executing program 3: unshare(0x400) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x0, 0x0, 0x0) 20:19:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/206, 0xce}], 0x1, 0x0, 0x0) 20:19:20 executing program 2: set_mempolicy(0x1, &(0x7f00000000c0)=0x10001, 0x7) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000140)=@v3, 0x18, 0x0) 20:19:20 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCGETS2(r0, 0x40045431, 0xffffffffffffffff) 20:19:20 executing program 4: clone(0x66100d00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_netdev_private(r0, 0x8947, &(0x7f0000000000)=':') 20:19:20 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_int(r0, 0x1, 0x34, &(0x7f0000000080), 0x10) 20:19:20 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=@polexpire={0xd8, 0x1b, 0x1, 0x0, 0x0, {{{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@sec_ctx={0xc, 0x8, {0x8}}, @mark={0xc}]}, 0xd8}}, 0x0) 20:19:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/206, 0xce}], 0x1, 0x0, 0x0) 20:19:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x2f, &(0x7f0000000140)=""/4096, &(0x7f0000000000)=0x1000) 20:19:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x23, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000290000000f000000000000000200000002000000008000000080000020000000d9f4655fd9f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e31313530373134353800"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000708595ab15e94b9c8803908244a41818010000000c00000000000000d8f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="0100000000000500080000000000000000000000040000006e00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000029000f0003000400"/32, 0x20, 0x1000}, {&(0x7f0000010500)="ff3f0c00fc010000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c653300000011000000940f090166696c652e636f6c64000000", 0x1080, 0x2000}, {&(0x7f0000011600)="0b0000000c0001022e00000002000000f40f02022e2e00"/32, 0x20, 0x4000}, {&(0x7f0000011700)="00000000001000"/32, 0x20, 0x5000}, {&(0x7f0000011800)="00000000001000"/32, 0x20, 0x6000}, {&(0x7f0000011900)="00000000001000"/32, 0x20, 0x7000}, {&(0x7f0000011a00)="504d4d00504d4dffd9f4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033310075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/128, 0x80, 0x8000}, {&(0x7f0000011b00)="111fc0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x9000}, {&(0x7f0000011c00)="0200"/32, 0x20, 0x9400}, {&(0x7f0000011d00)="0300"/32, 0x20, 0x9800}, {&(0x7f0000011e00)="0400"/32, 0x20, 0x9c00}, {&(0x7f0000011f00)="0500"/32, 0x20, 0xa000}, {&(0x7f0000012000)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000d000"/96, 0x60, 0xa400}, {&(0x7f0000012100)="2719c0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0xb000}, {&(0x7f0000012200)="0200"/32, 0x20, 0xb400}, {&(0x7f0000012300)="0300"/32, 0x20, 0xb800}, {&(0x7f0000012400)="0400"/32, 0x20, 0xbc00}, {&(0x7f0000012500)="0500"/32, 0x20, 0xc000}, {&(0x7f0000012600)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000d000"/96, 0x60, 0xc400}, {&(0x7f0000012700)="0c0000000c0001022e000000020000000c0002022e2e00000d0000001000050166696c65300000000e000000d80f050766696c653100"/64, 0x40, 0xd000}, {&(0x7f0000012800)="ffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff000002ea0100000001000000270f240c000000000000000000000000000000000601f80f0000000006000000779b539778617474723100000601f00f00000000060000007498539778617474723200"/4192, 0x1060, 0x12000}, {&(0x7f0000013900)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00xattr2\x00\x00xattr1\x00\x00', 0x20, 0x13fe0}, {&(0x7f0000013a00)="0000000000000000d8f4655fd8f4655fd8f4655f00"/32, 0x20, 0x22000}, {&(0x7f0000013b00)="ed41000000100000d8f4655fd9f4655fd9f4655f00000000000004000800000000000800050000000af301000400000000000000000000000100000003000000", 0x40, 0x22080}, {&(0x7f0000013c00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001001000000010000800000000000af301000400000000000000000000000200000009000000", 0x40, 0x22100}, {&(0x7f0000013d00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001001000000010000800000000000af30100040000000000000000000000020000000b000000", 0x40, 0x22180}, {&(0x7f0000013e00)="c041000000400000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800000000000af301000400000000000000000000000400000004000000", 0x40, 0x22500}, {&(0x7f0000013f00)="ed41000000100000d9f4655fd9f4655fd9f4655f00000000000002000800000000000800030000000af30100040000000000000000000000010000000d000000000000000000000000000000000000000000000000000000000000000000000000000000bb23913c000000000000000000000000000000000000000000000000ed8100001a040000d9f4655fd9f4655fd9f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000023000000000000000000000000000000000000000000000000000000000000000000000000000000595fe5e3000000000000000000000000000000000000000000000000ffa1000026000000d9f4655fd9f4655fd9f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3131353037313435382f66696c65302f66696c6530000000000000000000000000000000000000000000003ca5aef1000000000000000000000000000000000000000000000000ed8100000a000000d9f4655fd9f4655fd9f4655f00000000000001001000000000000800010000000af3010004000000000000000000000001000000240000000000000000000000000000000000000000000000000000000000000000000000000000007198d9cb130000000000000000000000000000000000000000000000ed81000028230000d9f4655fd9f4655fd9f4655f00000000000002001800000000000800010000000af3010004000000000000000000000003000000250000000200000001000000270000000200000001800000270000000000000000000000000000008aff1ea9000000000000000000000000000000000000000000000000ed81000064000000d9f4655fd9f4655fd9f4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000028000000000000000000000000000000000000000000000000000000000000000000000000000000867d7a1900"/768, 0x300, 0x22580}, {&(0x7f0000014200)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x23000}, {&(0x7f0000014700)='syzkallers\x00'/32, 0x20, 0x24000}, {&(0x7f0000014800)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x28000}], 0x0, &(0x7f0000014900)) 20:19:20 executing program 4: perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:19:20 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0x0) 20:19:20 executing program 3: kexec_load(0x0, 0x10, &(0x7f00000010c0)=[{0x0, 0x0, 0x0, 0x1000000}], 0x0) 20:19:20 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x3, &(0x7f0000000040)=[{0x15, 0x0, 0x1, 0xaf}, {}, {0x6, 0x0, 0x0, 0x7fff7ffe}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 20:19:20 executing program 5: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x135, &(0x7f0000000300)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96aeeb2aa4c486af9b6df76eb2f08914555acd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x2f) 20:19:20 executing program 4: setresuid(0xee01, 0xee00, 0xffffffffffffffff) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, 0x0, 0x0) [ 796.644944][T32562] loop0: detected capacity change from 0 to 640 20:19:20 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = dup3(r1, r0, 0x0) open_by_handle_at(r3, &(0x7f00000001c0)=@ceph_nfs_confh={0x10, 0x2, {0xc}}, 0x0) 20:19:20 executing program 5: capget(&(0x7f0000000000)={0x20080522}, 0xfffffffffffffffc) [ 796.705735][T32562] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 20:19:20 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e71b0fb1f147a8378f364602812c66538d750f6ee1d001f43f0500bb9fb0", 0x26}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 20:19:20 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x0) msgrcv(r0, &(0x7f0000019300)={0x0, ""/4096}, 0x1008, 0x0, 0x3000) msgsnd(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='M'], 0x2000, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000140)={{0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) msgrcv(0x0, &(0x7f0000000500)={0x0, ""/4096}, 0x1008, 0x0, 0x0) msgctl$IPC_STAT(0x0, 0x2, 0x0) 20:19:20 executing program 5: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) io_setup(0xd, &(0x7f0000000100)=0x0) io_submit(r2, 0x200002f1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x8, 0x1, 0x0, r0, 0x0}]) [ 796.743462][T32562] ext4 filesystem being mounted at /root/syzkaller-testdir663228568/syzkaller.12BizF/1147/file0 supports timestamps until 2038 (0x7fffffff) [ 796.775303][T32589] new mount options do not match the existing superblock, will be ignored [ 796.792524][T32589] new mount options do not match the existing superblock, will be ignored 20:19:20 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='loginuid\x00') lseek(r0, 0x0, 0x4) 20:19:20 executing program 2: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x1) lseek(r0, 0x1200, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000001500)='./bus\x00', 0x0, 0x4) sendfile(r0, r2, 0x0, 0x8400fffffffa) fallocate(r0, 0x3, 0x0, 0x10000101) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000140)={0x0, 0x80000000, 0x0, 0x1}) creat(&(0x7f0000000040)='./bus\x00', 0x80) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000160000000a20000000000a01010000000000000000020000000900010073797a300000000038000000030a01020000000000000000020000000900010073797a30000000000900030073797a32000000000900030073797a310000000014000000020a0900000000"], 0x94}}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000500)={{}, 0x0, 0x8, @inherit={0x60, &(0x7f0000000180)={0x0, 0x3, 0x8, 0x100000000, {0x4, 0x3, 0x1, 0x100, 0x80000001}, [0x4, 0x0, 0x1]}}, @devid}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) 20:19:20 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) write(r0, &(0x7f0000000700)="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", 0x169) 20:19:20 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'sit0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = socket(0x10, 0x3, 0x7) ioctl$sock_ifreq(r1, 0x89f0, &(0x7f0000000080)={'sit0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000040)) r2 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r2, 0x0, 0x8, &(0x7f00000000c0)=ANY=[@ANYBLOB='O'], 0x1) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000140)=0xc) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@ipv4={'\x00', '\xff\xff', @broadcast}, 0x80, r3}) sendmsg$DCCPDIAG_GETSOCK(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x13, 0x200, 0x70bd2d, 0x25dfdbff, {0x4, 0x0, 0x9, 0x5, {0x4e20, 0x4e24, [0x0, 0x6, 0x400, 0xffff], [0x2, 0x4, 0xff, 0x1], r3, [0x0, 0x2]}, 0xe7b1, 0x6}}, 0x4c}, 0x1, 0x0, 0x0, 0x8001}, 0x8000) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 20:19:20 executing program 1: r0 = perf_event_open(&(0x7f0000001a40)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2c103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0xcb7}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 20:19:20 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x10000000) munmap(&(0x7f0000ffa000/0x1000)=nil, 0x1000) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x9) [ 796.916797][T32621] IPv6: sit1: Disabled Multicast RS 20:19:20 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x9) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='fdinfo/4\x00') readv(r3, &(0x7f00000001c0)=[{&(0x7f0000949000)=""/101, 0x65}], 0x1) 20:19:20 executing program 4: r0 = perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2401, 0x7fffffff) 20:19:20 executing program 0: set_mempolicy(0x1, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 20:19:20 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x9) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='fdinfo/4\x00') readv(r3, &(0x7f00000001c0)=[{&(0x7f0000949000)=""/101, 0x65}], 0x1) 20:19:20 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/softnet_stat\x00') pread64(r0, &(0x7f0000000000)=""/107, 0x6b, 0x75) 20:19:21 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000140)={0x0, 0x2, 0x0, 0x7}) 20:19:21 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000240)) 20:19:21 executing program 2: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x1) lseek(r0, 0x1200, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000001500)='./bus\x00', 0x0, 0x4) sendfile(r0, r2, 0x0, 0x8400fffffffa) fallocate(r0, 0x3, 0x0, 0x10000101) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000140)={0x0, 0x80000000, 0x0, 0x1}) creat(&(0x7f0000000040)='./bus\x00', 0x80) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000160000000a20000000000a01010000000000000000020000000900010073797a300000000038000000030a01020000000000000000020000000900010073797a30000000000900030073797a32000000000900030073797a310000000014000000020a0900000000"], 0x94}}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000500)={{}, 0x0, 0x8, @inherit={0x60, &(0x7f0000000180)={0x0, 0x3, 0x8, 0x100000000, {0x4, 0x3, 0x1, 0x100, 0x80000001}, [0x4, 0x0, 0x1]}}, @devid}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) 20:19:21 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x0) syz_io_uring_setup(0x1cb6, &(0x7f0000000100), &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 20:19:21 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x9) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='fdinfo/4\x00') readv(r3, &(0x7f00000001c0)=[{&(0x7f0000949000)=""/101, 0x65}], 0x1) 20:19:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x21, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4, 0x0, @fd=r4}, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r2, r3, &(0x7f0000000340)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, r5, 0x0, &(0x7f0000000280)={0x0, 0x0, 0x0}}, 0x5) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 20:19:21 executing program 0: init_module(0x0, 0x0, 0x0) clone(0x10a1080, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="b5259910407e3f14c98dc3cfcb465e8960ecaa385135a8242a7be228") 20:19:21 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x4, 0x19}]}, 0x18}}, 0x0) 20:19:21 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x9) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='fdinfo/4\x00') readv(r3, &(0x7f00000001c0)=[{&(0x7f0000949000)=""/101, 0x65}], 0x1) 20:19:21 executing program 0: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x1) lseek(r0, 0x1200, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000001500)='./bus\x00', 0x0, 0x4) sendfile(r0, r2, 0x0, 0x8400fffffffa) fallocate(r0, 0x3, 0x0, 0x10000101) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000140)={0x0, 0x80000000, 0x0, 0x1}) creat(&(0x7f0000000040)='./bus\x00', 0x80) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000160000000a20000000000a01010000000000000000020000000900010073797a300000000038000000030a01020000000000000000020000000900010073797a30000000000900030073797a32000000000900030073797a310000000014000000020a0900000000"], 0x94}}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000500)={{}, 0x0, 0x8, @inherit={0x60, &(0x7f0000000180)={0x0, 0x3, 0x8, 0x100000000, {0x4, 0x3, 0x1, 0x100, 0x80000001}, [0x4, 0x0, 0x1]}}, @devid}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) 20:19:21 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = timerfd_create(0x8, 0x0) timerfd_settime(r1, 0x3, &(0x7f0000000140)={{0x4000000000000000}, {0x0, 0x3938700}}, 0x0) dup3(r0, r1, 0x0) 20:19:22 executing program 3: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) r1 = eventfd(0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r0]) write$P9_RWALK(r2, &(0x7f0000000100)={0x9}, 0x9) 20:19:22 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000001180)=[{{&(0x7f00000005c0)={0x2, 0x4e21, @empty}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000600)='o', 0x1}, {&(0x7f0000000640)="c7f1d26eb4b5d6e9d3ff9cf2c1d49e2322296a4308208c77b0f65278a565f222fe3f5ea630c49d131bc6d24c1e8d917faada03c1f47bddade5c594ddbf763dc342bfe9f907a18da1962761e7e954967d85082b476c5dbb9997e8280bd0fee02d5f6c927a6f7491cd7cd3aed4cd45411576e297e4395337440bd7b13768a0", 0x7e}], 0x2}}, {{&(0x7f0000000880)={0x2, 0x4e24, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000ac0)=[@ip_retopts={{0x14, 0x0, 0x7, {[@noop, @generic={0x83, 0x3, '5'}]}}}], 0x18}}], 0x2, 0x20000004) 20:19:22 executing program 4: openat$tcp_mem(0xffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x333, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r2 = syz_open_pts(r1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r3, 0x0) r4 = dup3(r2, r1, 0x0) ioctl$sock_SIOCINQ(r4, 0x541b, &(0x7f0000000040)) 20:19:23 executing program 2: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x1) lseek(r0, 0x1200, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000001500)='./bus\x00', 0x0, 0x4) sendfile(r0, r2, 0x0, 0x8400fffffffa) fallocate(r0, 0x3, 0x0, 0x10000101) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000140)={0x0, 0x80000000, 0x0, 0x1}) creat(&(0x7f0000000040)='./bus\x00', 0x80) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000160000000a20000000000a01010000000000000000020000000900010073797a300000000038000000030a01020000000000000000020000000900010073797a30000000000900030073797a32000000000900030073797a310000000014000000020a0900000000"], 0x94}}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000500)={{}, 0x0, 0x8, @inherit={0x60, &(0x7f0000000180)={0x0, 0x3, 0x8, 0x100000000, {0x4, 0x3, 0x1, 0x100, 0x80000001}, [0x4, 0x0, 0x1]}}, @devid}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) 20:19:23 executing program 3: r0 = memfd_create(&(0x7f0000000140)='sysr\x01\xdf;HX%\x8f\xdd\xff\xff\xffame\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8f{\x85\x19\xe4\xf6n{B\x88\xd6\xacQ\xa9\a\xc9J\x1b\xefT\x9b\xd3\x9e\xe6YX\xb7<@\xdd\xab\x8c\xe5\x82o\xd1lyk\x11\x11\xa4\xff\x92\x04\x15R!\xa0\x17g\xb1\x91\xb6/\x8a\xb18\xa0\xbe\'\xa8$\x03\x9d\x93\xf9\x1a\\\xe2\xa1,\xbe\x01\x8a\xfe4\xa7\xc8\x9eP\xc2\x01\x10\"\x00\x00', 0x0) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x4000051, r0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x40501, 0x0) writev(r1, &(0x7f0000000000)=[{&(0x7f0000001480)="a349b1e15b38cc", 0x7}], 0x1) 20:19:23 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0x404c534a, &(0x7f0000000040)={0x0, 0x0, 0x0, 'queue0\x00'}) 20:19:23 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) tkill(r0, 0x1e) ptrace$cont(0x9, r0, 0x0, 0x0) 20:19:23 executing program 4: mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d032, 0xffffffffffffffff, 0x0) mremap(&(0x7f00001e0000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) 20:19:23 executing program 0: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x1) lseek(r0, 0x1200, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000001500)='./bus\x00', 0x0, 0x4) sendfile(r0, r2, 0x0, 0x8400fffffffa) fallocate(r0, 0x3, 0x0, 0x10000101) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000140)={0x0, 0x80000000, 0x0, 0x1}) creat(&(0x7f0000000040)='./bus\x00', 0x80) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000160000000a20000000000a01010000000000000000020000000900010073797a300000000038000000030a01020000000000000000020000000900010073797a30000000000900030073797a32000000000900030073797a310000000014000000020a0900000000"], 0x94}}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000500)={{}, 0x0, 0x8, @inherit={0x60, &(0x7f0000000180)={0x0, 0x3, 0x8, 0x100000000, {0x4, 0x3, 0x1, 0x100, 0x80000001}, [0x4, 0x0, 0x1]}}, @devid}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) 20:19:23 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r0, 0x4b72, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)="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"}) 20:19:23 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x800000000009031, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x100000003) mbind(&(0x7f0000a92000/0x2000)=nil, 0x2000, 0x1, 0x0, 0x0, 0x1) madvise(&(0x7f00005f3000/0x1000)=nil, 0x1000, 0x0) 20:19:23 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffe}]}) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:19:23 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r0, 0x4b72, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)="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"}) 20:19:23 executing program 3: r0 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB="9c010000", @ANYRES16=r0, @ANYBLOB="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", @ANYRES32], 0x19c}, 0x1, 0x0, 0x0, 0x24000000}, 0x800) sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r0, 0x10, 0x70bd27, 0x25dfdbff, {{}, {@val={0x8}, @void}}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x40008c0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x42) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x2) mount(0x0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000280)='binfmt_misc\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x2200, 0x81) unlink(&(0x7f0000000040)='./file0\x00') 20:19:23 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r0, 0x4b72, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)="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"}) 20:19:25 executing program 2: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x1) lseek(r0, 0x1200, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000001500)='./bus\x00', 0x0, 0x4) sendfile(r0, r2, 0x0, 0x8400fffffffa) fallocate(r0, 0x3, 0x0, 0x10000101) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000140)={0x0, 0x80000000, 0x0, 0x1}) creat(&(0x7f0000000040)='./bus\x00', 0x80) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000160000000a20000000000a01010000000000000000020000000900010073797a300000000038000000030a01020000000000000000020000000900010073797a30000000000900030073797a32000000000900030073797a310000000014000000020a0900000000"], 0x94}}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000500)={{}, 0x0, 0x8, @inherit={0x60, &(0x7f0000000180)={0x0, 0x3, 0x8, 0x100000000, {0x4, 0x3, 0x1, 0x100, 0x80000001}, [0x4, 0x0, 0x1]}}, @devid}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) 20:19:25 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r0, 0x4b72, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)="aaf8006610d17402bf1d69f6f1f85914c79b821888c07dea7f7f12e25b22b0d06faef456a5358908d16464f148606514af3f0ed284a537bdbdb9fc710aca702dd4dfdfe1ed7b0a6f6067b30b169b10db01d7d759b1b11d3442deae6be99948d5055dda483385b921e7a2fc9ecfde9e3214690f79e824dad077252d6b119e74bd5ccd5b85882fdb2f36fd05b82456193092aa58b376e927cc546b33af0aa3c87f555db3d8ce2df9f4fa2e42a208c5ed0002e880c6df35caa9a024926fd2b8e12805249d3cb4bf8586e263ed281935deb6bdcc6afe020f268ab91a0d2b187732b0cb6b374c450cf1a2d3bb57e13e5cca6858e7370952050b0d872162115d987fdd48aa92d34d3d733c8fc5ebfd8d32b74b2c838bde2f561c4ec248056ff76514f7b07d568d641d05dca8570c8f796dad2c3bc9129124c4712287145f5736efaaeafafe9d560a81fc458fafb66d3067731c5da10675679ed4c787db22775e65fdad3d9ce49c5944f8386c2629dbb9bbc2561994c1a5e844dd9bf3c98da423d11e1531182dd1dda17e5cc80abbf19a9d40b516f6c5fcca1df6d9b2ec5bd2c47862ed2621e9626d108904929117e5cfea9a2b94c24e05c416e32e187886376b7b49c186acf3b049a0284b2ec82f45e3dfa5274a7c3ec031677debf1a972468c72343e2ce9f8ac654aa21f007ffc151c25acfd74ffc9b3c701f59165b75fd15da22140c4687b0bea2f2bc91e9fd7d8d083daec977efba7cd431dd93eb59a17cd39f87ef0255a8f333b231c4d80e50fe6b77d66e8cd1b2eeb0db73896505934537fc76d85fa577ca7ebf6eb7f6d9c352ebd290b9dc4fbd00a14bdc59fe21501a567ee1e145d071646dca093e5f1d1136fb77ac548c0b46c5cd62f78b77e0984fe6a8b31040dea66db714caeff58bbd50488e6cd5540eab277145e3b16c57bc5bb0bca1594f6d7b277d48c564165f8716dd55464c5fe7a9a148a44cce240fd017e17bfa0896e0a818b7d37cad01517551609ad5d2a9525dcd424719f705b3440e4579c02f4a602c7ef0d97b3e8f661979ca5a3c7e9849d6e968d17f78a332e06b9e5a4025b28d897e0c1f6efc0a85968964ba22429442f5a40b4d8ccedb00ea991b1abdf1034baaf6653c9003c2cddb44dabefb64b5b235d9e5ac6dd365bacfe87196848d11f1a603addaf8af4ee3297901ee81f54bc03a982b2f97d0ce17ffacdad9b72b52f98480e7d514d8b8adfa3345db31aa1a03c376c622a63dbea60c97984ae2a429f4d198a62b3d7cfc30d83f1ac96c6fb179f0f2b4d94d4c25faff2c5af73e0cbf297f5337359eeebcd33ab2d2f2727b69a6b3f514c9c143263dc56d76b829200a99ad3df0dc2b1f20b1cb7bc406dd9354a14f2c568192b945db93a26341edf755866037d528139aa2c4dcfde250cb3f8baa2cce5e6e649a044c92610ff93c9"}) 20:19:25 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') close(r0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r0, &(0x7f0000000000)) 20:19:26 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae897094e71b0fa1f147a8378f3657cdcf86db93aa6ed9cbc6a9e00b9e626aa995d690c8a2372286677850ab8e9b75839f0715a567dafe", 0x3b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x1e) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0200000001000400", @ANYRES32, @ANYBLOB="040004000000000008000400", @ANYRES32, @ANYBLOB="08000500", @ANYRES32, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0xee00, @ANYBLOB="01000000", @ANYRES32, @ANYBLOB="08000300", @ANYRES32, @ANYBLOB="08000500", @ANYRES32=0xee00, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB="08000400", @ANYRES32=0xee01, @ANYBLOB="08000500", @ANYRES32, @ANYBLOB="100002"], 0x7c, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 20:19:26 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x800000000009031, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x100000003) mbind(&(0x7f0000a92000/0x2000)=nil, 0x2000, 0x1, 0x0, 0x0, 0x1) madvise(&(0x7f00005f3000/0x1000)=nil, 0x1000, 0x0) 20:19:26 executing program 0: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x1) lseek(r0, 0x1200, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000001500)='./bus\x00', 0x0, 0x4) sendfile(r0, r2, 0x0, 0x8400fffffffa) fallocate(r0, 0x3, 0x0, 0x10000101) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000140)={0x0, 0x80000000, 0x0, 0x1}) creat(&(0x7f0000000040)='./bus\x00', 0x80) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000160000000a20000000000a01010000000000000000020000000900010073797a300000000038000000030a01020000000000000000020000000900010073797a30000000000900030073797a32000000000900030073797a310000000014000000020a0900000000"], 0x94}}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000500)={{}, 0x0, 0x8, @inherit={0x60, &(0x7f0000000180)={0x0, 0x3, 0x8, 0x100000000, {0x4, 0x3, 0x1, 0x100, 0x80000001}, [0x4, 0x0, 0x1]}}, @devid}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) 20:19:26 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0), 0x0, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='task\x00') getdents64(r4, &(0x7f0000000280)=""/84, 0x54) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(r4, &(0x7f0000000000)=""/61, 0x3d) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x6}, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/anycast6\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x172, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000540)=ANY=[]) mkdirat(r5, &(0x7f0000000080)='./file0\x00', 0x0) 20:19:26 executing program 4: memfd_create(0xfffffffffffffffe, 0x0) 20:19:26 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x16}, &(0x7f0000000100)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x7, &(0x7f0000002000)) fcntl$lock(r1, 0x26, &(0x7f0000000180)={0x40001, 0x2}) ioctl$BTRFS_IOC_GET_DEV_STATS(0xffffffffffffffff, 0xc4089434, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000240)=ANY=[@ANYRESOCT]) timer_create(0x0, 0x0, &(0x7f00000001c0)) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) 20:19:26 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)={0x74, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0xa, 0x5, 0x0, 0x1, {0x9, 0x1, 'snmp\x00'}}]}, 0x74}}, 0x0) 20:19:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r0, &(0x7f0000002940)={0x0, 0x0, &(0x7f0000002900)={&(0x7f0000000180)={0x9c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x4, 0xe, {@wo_ht={{}, {}, @broadcast, @broadcast}, 0x0, @default, 0x0, @void, @val, @val={0x3, 0x1}, @void, @val={0x6, 0x2}, @void, @val={0x25, 0x3}, @val={0x2a, 0x1}, @val={0x3c, 0x4}, @val={0x2d, 0x1a}, @val={0x72, 0x6}, @val={0x71, 0x7}, @val={0x76, 0x6}}}]]}, 0x9c}}, 0x0) 20:19:26 executing program 4: select(0x98, &(0x7f0000000000)={0x0, 0x0, 0x2}, &(0x7f0000000080), 0x0, &(0x7f0000000140)={0x77359400}) [ 802.586016][ T341] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 802.615601][ T341] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.1'. 20:19:26 executing program 4: r0 = socket(0xa, 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)={0x40002003}) epoll_pwait(r1, &(0x7f0000000100)=[{}], 0x1, 0xdc, &(0x7f0000000180), 0x8) epoll_wait(r1, &(0x7f0000000040)=[{}], 0x1, 0xfffffffffffffef7) r2 = dup3(r0, r1, 0x0) shutdown(r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 20:19:26 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)={0x74, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0xa, 0x5, 0x0, 0x1, {0x9, 0x1, 'snmp\x00'}}]}, 0x74}}, 0x0) 20:19:26 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)={0x74, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0xa, 0x5, 0x0, 0x1, {0x9, 0x1, 'snmp\x00'}}]}, 0x74}}, 0x0) [ 802.716417][ T361] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 802.737454][ T361] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.1'. 20:19:26 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)={0x74, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0xa, 0x5, 0x0, 0x1, {0x9, 0x1, 'snmp\x00'}}]}, 0x74}}, 0x0) [ 802.813455][ T365] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 802.834354][ T365] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.1'. 20:19:26 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x800000000009031, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x100000003) mbind(&(0x7f0000a92000/0x2000)=nil, 0x2000, 0x1, 0x0, 0x0, 0x1) madvise(&(0x7f00005f3000/0x1000)=nil, 0x1000, 0x0) [ 802.895566][ T369] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 802.915504][ T369] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.1'. 20:19:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_io_uring_setup(0x10ea, &(0x7f0000000200)={0x0, 0x0, 0x17, 0x2}, &(0x7f0000706000/0x1000)=nil, &(0x7f00001a7000/0x1000)=nil, &(0x7f0000000280), &(0x7f00000002c0)) 20:19:27 executing program 1: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) write$selinux_attr(r0, 0x0, 0x0) write$selinux_attr(r0, &(0x7f0000000040)='system_u:object_r:systemd_systemctl_exec_t:s0\x00', 0x2e) 20:19:27 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x800000000009031, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x100000003) mbind(&(0x7f0000a92000/0x2000)=nil, 0x2000, 0x1, 0x0, 0x0, 0x1) madvise(&(0x7f00005f3000/0x1000)=nil, 0x1000, 0x0) 20:19:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) semtimedop(0x0, &(0x7f00000001c0)=[{}], 0x1, &(0x7f0000001340)) 20:19:27 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) memfd_create(&(0x7f0000000200)='-&#\'\x00', 0x5) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000080), 0x4) close_range(r0, 0xffffffffffffffff, 0x0) 20:19:27 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xb601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 20:19:27 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./bus\x00', 0x0, &(0x7f0000000100)={'L-', 0x80000000}, 0x16, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000240)) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0, 0x0) timer_create(0x8, &(0x7f00000001c0)={0x0, 0x3e, 0x4}, &(0x7f0000000040)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="0721deef000080f8efcb8bd34c028a0003965f43c4a2fb6d50840620049dada720f897f650b0d13b730f000604aa6cf7f0c2208aee57ca1999dfc1743c7e7f8cf204341d459e4331e96e29e80f5e3d21559ddc574d8d2e4752ea0c2842c3a787004af1ba9aecfd7bb7bb912c15a2fbb240cbaa027b515429529b230b3048199ee8d61a51f58d4e7a4b5e0e3440b77bd3aafe0426867533e0e23258e59193c9764a3e10225c6f419048d99d3e238b057f000000a8d6c27489e7c1b0859773e979f5257d0d542c45b8e7a7d1b26175387ed81e1b1202754cdf726812a6c9192f7d1b000083801fd0963ac0775b4c387b830104000000000000005d920e4cbebe2fd184e7a46a58f38ccf628d674a21d02a2b6065df5d951bb33f1fd541561d3017f12d6083902e3d690800c60200000000000000d6cbe016000001000000a6fd6240000000000000004e98af0362e88851c48bce4cb0e056641afce2b0e6411df2faaa412189df3b3fdbd8ed66522f510300f0e258922dcf41dd93e4e09f185362c173740ec87505462e6f4f8f383ae0e7a044fddb94ba56cadd9e25783c2f1d5cce56defd411dc40421357cdd7f04c801000080000000004e3123b287aabd8c7563ca810f5c172e7712f8bf4e6c14565d7f89c88c8706be7b5f93ae88a7dca1d09bda796b29097edc34254b45a3f7a5630f76308398fbf73da6dea604f27065f8e09d83fa6876bd026b374640dade04c5c3982ff2b2200895dd7afe956b4d8456e55a489fb199b5033bfa10f7590c8a7326a054c44a0d21b3a1cb5bf5b6639b8098c7be45896be745691d27026c08fd9f2e0776156432919f1f0e39c8bd25f3065ad08543eda7a75e439b40d9b4c0e76c39be87184813cf58d12c4cb06ec9f3b1f9c37bfbc75e8d2df8e85b264816ab3dc4f7205f6d001c5ef829d80555edd6cc91d9e48e0e076d55ef4c330dd79e0b45066079568576aee8a58b789e12667b648c8f7f8e9e1fd55e1bc55ee2ca840c2f151780ba7c73637034aa1e0d199e3a351e54"], 0x247) r1 = creat(&(0x7f0000000040)='./bus\x00', 0xa0) fallocate(r1, 0x10, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x8028}) creat(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) 20:19:27 executing program 2: r0 = syz_io_uring_setup(0x2de5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) r3 = socket(0x11, 0x3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, r3, 0x0}, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) 20:19:27 executing program 4: r0 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000240)=' d!A\xfbk\x0e\xa4') 20:19:27 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x1a00, &(0x7f0000ffd000/0x3000)=nil) mlock(&(0x7f0000079000/0x3000)=nil, 0x3000) shmat(r1, &(0x7f0000000000/0x2000)=nil, 0x4000) 20:19:27 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1}, {}, {0x6, 0x0, 0x0, 0x7fff7ffe}]}) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 20:19:27 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x2f802900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x16) 20:19:27 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x1a00, &(0x7f0000ffd000/0x3000)=nil) mlock(&(0x7f0000079000/0x3000)=nil, 0x3000) shmat(r1, &(0x7f0000000000/0x2000)=nil, 0x4000) [ 803.945027][ T399] EXT4-fs error (device sda1): mb_free_blocks:1488: group 7, inode 14169: block 245800:freeing already freed block (bit 16424); block bitmap corrupt. [ 803.960586][ T399] EXT4-fs (sda1): pa ffff888105f55d00: logic 32768, phys. 245760, len 2048 [ 803.969265][ T399] EXT4-fs error (device sda1): ext4_mb_release_inode_pa:4172: group 7, free 2008, pa_free 2007 20:19:27 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x2f802900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x16) 20:19:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x2f802900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x16) 20:19:28 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x1a00, &(0x7f0000ffd000/0x3000)=nil) mlock(&(0x7f0000079000/0x3000)=nil, 0x3000) shmat(r1, &(0x7f0000000000/0x2000)=nil, 0x4000) 20:19:28 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1}, {}, {0x6, 0x0, 0x0, 0x7fff7ffe}]}) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 804.137792][ T399] EXT4-fs error (device sda1): mb_free_blocks:1488: group 9, inode 14169: block 297000:freeing already freed block (bit 2088); block bitmap corrupt. [ 804.152921][ T399] EXT4-fs (sda1): pa ffff888135e0d2d8: logic 32768, phys. 296960, len 2048 [ 804.161586][ T399] EXT4-fs error (device sda1): ext4_mb_release_inode_pa:4172: group 9, free 2008, pa_free 2007 20:19:28 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xb601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 20:19:28 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0x100000110) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000100)='F', 0x1}], 0x1) read(r0, &(0x7f0000000280)=""/4081, 0xff1) fcntl$setpipe(r1, 0x407, 0xe00000) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="1c648078bd793e611b0f2efaf39381", 0xf}], 0x1, 0x2) 20:19:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x2f802900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x16) 20:19:28 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./bus\x00', 0x0, &(0x7f0000000100)={'L-', 0x80000000}, 0x16, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000240)) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0, 0x0) timer_create(0x8, &(0x7f00000001c0)={0x0, 0x3e, 0x4}, &(0x7f0000000040)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x247) r1 = creat(&(0x7f0000000040)='./bus\x00', 0xa0) fallocate(r1, 0x10, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x8028}) creat(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) 20:19:28 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x1a00, &(0x7f0000ffd000/0x3000)=nil) mlock(&(0x7f0000079000/0x3000)=nil, 0x3000) shmat(r1, &(0x7f0000000000/0x2000)=nil, 0x4000) 20:19:28 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1}, {}, {0x6, 0x0, 0x0, 0x7fff7ffe}]}) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 20:19:28 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x1}, {}, {0x6, 0x0, 0x0, 0x7fff7ffe}]}) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 20:19:28 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./bus\x00', 0x0, &(0x7f0000000100)={'L-', 0x80000000}, 0x16, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000240)) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0, 0x0) timer_create(0x8, &(0x7f00000001c0)={0x0, 0x3e, 0x4}, &(0x7f0000000040)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="0721deef000080f8efcb8bd34c028a0003965f43c4a2fb6d50840620049dada720f897f650b0d13b730f000604aa6cf7f0c2208aee57ca1999dfc1743c7e7f8cf204341d459e4331e96e29e80f5e3d21559ddc574d8d2e4752ea0c2842c3a787004af1ba9aecfd7bb7bb912c15a2fbb240cbaa027b515429529b230b3048199ee8d61a51f58d4e7a4b5e0e3440b77bd3aafe0426867533e0e23258e59193c9764a3e10225c6f419048d99d3e238b057f000000a8d6c27489e7c1b0859773e979f5257d0d542c45b8e7a7d1b26175387ed81e1b1202754cdf726812a6c9192f7d1b000083801fd0963ac0775b4c387b830104000000000000005d920e4cbebe2fd184e7a46a58f38ccf628d674a21d02a2b6065df5d951bb33f1fd541561d3017f12d6083902e3d690800c60200000000000000d6cbe016000001000000a6fd6240000000000000004e98af0362e88851c48bce4cb0e056641afce2b0e6411df2faaa412189df3b3fdbd8ed66522f510300f0e258922dcf41dd93e4e09f185362c173740ec87505462e6f4f8f383ae0e7a044fddb94ba56cadd9e25783c2f1d5cce56defd411dc40421357cdd7f04c801000080000000004e3123b287aabd8c7563ca810f5c172e7712f8bf4e6c14565d7f89c88c8706be7b5f93ae88a7dca1d09bda796b29097edc34254b45a3f7a5630f76308398fbf73da6dea604f27065f8e09d83fa6876bd026b374640dade04c5c3982ff2b2200895dd7afe956b4d8456e55a489fb199b5033bfa10f7590c8a7326a054c44a0d21b3a1cb5bf5b6639b8098c7be45896be745691d27026c08fd9f2e0776156432919f1f0e39c8bd25f3065ad08543eda7a75e439b40d9b4c0e76c39be87184813cf58d12c4cb06ec9f3b1f9c37bfbc75e8d2df8e85b264816ab3dc4f7205f6d001c5ef829d80555edd6cc91d9e48e0e076d55ef4c330dd79e0b45066079568576aee8a58b789e12667b648c8f7f8e9e1fd55e1bc55ee2ca840c2f151780ba7c73637034aa1e0d199e3a351e54"], 0x247) r1 = creat(&(0x7f0000000040)='./bus\x00', 0xa0) fallocate(r1, 0x10, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x8028}) creat(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) 20:19:28 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./bus\x00', 0x0, &(0x7f0000000100)={'L-', 0x80000000}, 0x16, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000240)) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0, 0x0) timer_create(0x8, &(0x7f00000001c0)={0x0, 0x3e, 0x4}, &(0x7f0000000040)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x247) r1 = creat(&(0x7f0000000040)='./bus\x00', 0xa0) fallocate(r1, 0x10, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x8028}) creat(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) 20:19:28 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./bus\x00', 0x0, &(0x7f0000000100)={'L-', 0x80000000}, 0x16, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000240)) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0, 0x0) timer_create(0x8, &(0x7f00000001c0)={0x0, 0x3e, 0x4}, &(0x7f0000000040)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x247) r1 = creat(&(0x7f0000000040)='./bus\x00', 0xa0) fallocate(r1, 0x10, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x8028}) creat(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 804.375941][ T458] EXT4-fs error (device sda1): mb_free_blocks:1488: group 11, inode 14641: block 360488:freeing already freed block (bit 40); block bitmap corrupt. [ 804.391188][ T458] EXT4-fs (sda1): pa ffff888105f55bc8: logic 32768, phys. 360448, len 2048 [ 804.399963][ T458] EXT4-fs error (device sda1): ext4_mb_release_inode_pa:4172: group 11, free 2008, pa_free 2007 [ 804.472437][ T477] EXT4-fs error (device sda1): mb_free_blocks:1488: group 13, inode 14673: block 446504:freeing already freed block (bit 20520); block bitmap corrupt. [ 804.488037][ T477] EXT4-fs (sda1): pa ffff888105f55bc8: logic 32768, phys. 446464, len 2048 [ 804.496848][ T477] EXT4-fs error (device sda1): ext4_mb_release_inode_pa:4172: group 13, free 2008, pa_free 2007 [ 804.519284][ T474] EXT4-fs error (device sda1): mb_free_blocks:1488: group 14, inode 14169: block 462888:freeing already freed block (bit 4136); block bitmap corrupt. [ 804.534829][ T474] EXT4-fs (sda1): pa ffff888105f552d8: logic 32768, phys. 462848, len 2048 [ 804.543489][ T474] EXT4-fs error (device sda1): ext4_mb_release_inode_pa:4172: group 14, free 2008, pa_free 2007 20:19:28 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0x100000110) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000100)='F', 0x1}], 0x1) read(r0, &(0x7f0000000280)=""/4081, 0xff1) fcntl$setpipe(r1, 0x407, 0xe00000) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="1c648078bd793e611b0f2efaf39381", 0xf}], 0x1, 0x2) [ 804.589769][ T481] EXT4-fs (sda1): pa ffff888105f551a0: logic 32768, phys. 155648, len 2048 20:19:28 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./bus\x00', 0x0, &(0x7f0000000100)={'L-', 0x80000000}, 0x16, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000240)) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0, 0x0) timer_create(0x8, &(0x7f00000001c0)={0x0, 0x3e, 0x4}, &(0x7f0000000040)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x247) r1 = creat(&(0x7f0000000040)='./bus\x00', 0xa0) fallocate(r1, 0x10, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x8028}) creat(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) 20:19:28 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xb601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 20:19:28 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./bus\x00', 0x0, &(0x7f0000000100)={'L-', 0x80000000}, 0x16, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000240)) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0, 0x0) timer_create(0x8, &(0x7f00000001c0)={0x0, 0x3e, 0x4}, &(0x7f0000000040)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="0721deef000080f8efcb8bd34c028a0003965f43c4a2fb6d50840620049dada720f897f650b0d13b730f000604aa6cf7f0c2208aee57ca1999dfc1743c7e7f8cf204341d459e4331e96e29e80f5e3d21559ddc574d8d2e4752ea0c2842c3a787004af1ba9aecfd7bb7bb912c15a2fbb240cbaa027b515429529b230b3048199ee8d61a51f58d4e7a4b5e0e3440b77bd3aafe0426867533e0e23258e59193c9764a3e10225c6f419048d99d3e238b057f000000a8d6c27489e7c1b0859773e979f5257d0d542c45b8e7a7d1b26175387ed81e1b1202754cdf726812a6c9192f7d1b000083801fd0963ac0775b4c387b830104000000000000005d920e4cbebe2fd184e7a46a58f38ccf628d674a21d02a2b6065df5d951bb33f1fd541561d3017f12d6083902e3d690800c60200000000000000d6cbe016000001000000a6fd6240000000000000004e98af0362e88851c48bce4cb0e056641afce2b0e6411df2faaa412189df3b3fdbd8ed66522f510300f0e258922dcf41dd93e4e09f185362c173740ec87505462e6f4f8f383ae0e7a044fddb94ba56cadd9e25783c2f1d5cce56defd411dc40421357cdd7f04c801000080000000004e3123b287aabd8c7563ca810f5c172e7712f8bf4e6c14565d7f89c88c8706be7b5f93ae88a7dca1d09bda796b29097edc34254b45a3f7a5630f76308398fbf73da6dea604f27065f8e09d83fa6876bd026b374640dade04c5c3982ff2b2200895dd7afe956b4d8456e55a489fb199b5033bfa10f7590c8a7326a054c44a0d21b3a1cb5bf5b6639b8098c7be45896be745691d27026c08fd9f2e0776156432919f1f0e39c8bd25f3065ad08543eda7a75e439b40d9b4c0e76c39be87184813cf58d12c4cb06ec9f3b1f9c37bfbc75e8d2df8e85b264816ab3dc4f7205f6d001c5ef829d80555edd6cc91d9e48e0e076d55ef4c330dd79e0b45066079568576aee8a58b789e12667b648c8f7f8e9e1fd55e1bc55ee2ca840c2f151780ba7c73637034aa1e0d199e3a351e54"], 0x247) r1 = creat(&(0x7f0000000040)='./bus\x00', 0xa0) fallocate(r1, 0x10, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x8028}) creat(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) 20:19:28 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./bus\x00', 0x0, &(0x7f0000000100)={'L-', 0x80000000}, 0x16, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000240)) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0, 0x0) timer_create(0x8, &(0x7f00000001c0)={0x0, 0x3e, 0x4}, &(0x7f0000000040)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x247) r1 = creat(&(0x7f0000000040)='./bus\x00', 0xa0) fallocate(r1, 0x10, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x8028}) creat(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) 20:19:28 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./bus\x00', 0x0, &(0x7f0000000100)={'L-', 0x80000000}, 0x16, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000240)) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0, 0x0) timer_create(0x8, &(0x7f00000001c0)={0x0, 0x3e, 0x4}, &(0x7f0000000040)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x247) r1 = creat(&(0x7f0000000040)='./bus\x00', 0xa0) fallocate(r1, 0x10, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x8028}) creat(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 804.806102][ T490] EXT4-fs (sda1): pa ffff888105f55bc8: logic 32768, phys. 219136, len 2048 [ 804.841561][ T496] EXT4-fs (sda1): pa ffff888105f55958: logic 32768, phys. 282624, len 2048 20:19:28 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0x100000110) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000100)='F', 0x1}], 0x1) read(r0, &(0x7f0000000280)=""/4081, 0xff1) fcntl$setpipe(r1, 0x407, 0xe00000) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="1c648078bd793e611b0f2efaf39381", 0xf}], 0x1, 0x2) [ 804.872482][ T500] EXT4-fs (sda1): pa ffff888105f559c0: logic 32768, phys. 348160, len 2048 [ 804.901321][ T504] EXT4-fs (sda1): pa ffff888105fac9c0: logic 32768, phys. 409600, len 2048 20:19:28 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xb601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 20:19:28 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./bus\x00', 0x0, &(0x7f0000000100)={'L-', 0x80000000}, 0x16, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000240)) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0, 0x0) timer_create(0x8, &(0x7f00000001c0)={0x0, 0x3e, 0x4}, &(0x7f0000000040)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x247) r1 = creat(&(0x7f0000000040)='./bus\x00', 0xa0) fallocate(r1, 0x10, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x8028}) creat(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) 20:19:28 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./bus\x00', 0x0, &(0x7f0000000100)={'L-', 0x80000000}, 0x16, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000240)) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0, 0x0) timer_create(0x8, &(0x7f00000001c0)={0x0, 0x3e, 0x4}, &(0x7f0000000040)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x247) r1 = creat(&(0x7f0000000040)='./bus\x00', 0xa0) fallocate(r1, 0x10, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x8028}) creat(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) 20:19:28 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./bus\x00', 0x0, &(0x7f0000000100)={'L-', 0x80000000}, 0x16, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000240)) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0, 0x0) timer_create(0x8, &(0x7f00000001c0)={0x0, 0x3e, 0x4}, &(0x7f0000000040)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x247) r1 = creat(&(0x7f0000000040)='./bus\x00', 0xa0) fallocate(r1, 0x10, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x8028}) creat(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) 20:19:28 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./bus\x00', 0x0, &(0x7f0000000100)={'L-', 0x80000000}, 0x16, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000240)) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0, 0x0) timer_create(0x8, &(0x7f00000001c0)={0x0, 0x3e, 0x4}, &(0x7f0000000040)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x247) r1 = creat(&(0x7f0000000040)='./bus\x00', 0xa0) fallocate(r1, 0x10, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x8028}) creat(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) 20:19:29 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0x100000110) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000100)='F', 0x1}], 0x1) read(r0, &(0x7f0000000280)=""/4081, 0xff1) fcntl$setpipe(r1, 0x407, 0xe00000) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="1c648078bd793e611b0f2efaf39381", 0xf}], 0x1, 0x2) 20:19:29 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0x100000110) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000100)='F', 0x1}], 0x1) read(r0, &(0x7f0000000280)=""/4081, 0xff1) fcntl$setpipe(r1, 0x407, 0xe00000) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="1c648078bd793e611b0f2efaf39381", 0xf}], 0x1, 0x2) 20:19:29 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./bus\x00', 0x0, &(0x7f0000000100)={'L-', 0x80000000}, 0x16, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000240)) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0, 0x0) timer_create(0x8, &(0x7f00000001c0)={0x0, 0x3e, 0x4}, &(0x7f0000000040)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x247) r1 = creat(&(0x7f0000000040)='./bus\x00', 0xa0) fallocate(r1, 0x10, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x8028}) creat(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) 20:19:29 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./bus\x00', 0x0, &(0x7f0000000100)={'L-', 0x80000000}, 0x16, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000240)) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0, 0x0) timer_create(0x8, &(0x7f00000001c0)={0x0, 0x3e, 0x4}, &(0x7f0000000040)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="0721deef000080f8efcb8bd34c028a0003965f43c4a2fb6d50840620049dada720f897f650b0d13b730f000604aa6cf7f0c2208aee57ca1999dfc1743c7e7f8cf204341d459e4331e96e29e80f5e3d21559ddc574d8d2e4752ea0c2842c3a787004af1ba9aecfd7bb7bb912c15a2fbb240cbaa027b515429529b230b3048199ee8d61a51f58d4e7a4b5e0e3440b77bd3aafe0426867533e0e23258e59193c9764a3e10225c6f419048d99d3e238b057f000000a8d6c27489e7c1b0859773e979f5257d0d542c45b8e7a7d1b26175387ed81e1b1202754cdf726812a6c9192f7d1b000083801fd0963ac0775b4c387b830104000000000000005d920e4cbebe2fd184e7a46a58f38ccf628d674a21d02a2b6065df5d951bb33f1fd541561d3017f12d6083902e3d690800c60200000000000000d6cbe016000001000000a6fd6240000000000000004e98af0362e88851c48bce4cb0e056641afce2b0e6411df2faaa412189df3b3fdbd8ed66522f510300f0e258922dcf41dd93e4e09f185362c173740ec87505462e6f4f8f383ae0e7a044fddb94ba56cadd9e25783c2f1d5cce56defd411dc40421357cdd7f04c801000080000000004e3123b287aabd8c7563ca810f5c172e7712f8bf4e6c14565d7f89c88c8706be7b5f93ae88a7dca1d09bda796b29097edc34254b45a3f7a5630f76308398fbf73da6dea604f27065f8e09d83fa6876bd026b374640dade04c5c3982ff2b2200895dd7afe956b4d8456e55a489fb199b5033bfa10f7590c8a7326a054c44a0d21b3a1cb5bf5b6639b8098c7be45896be745691d27026c08fd9f2e0776156432919f1f0e39c8bd25f3065ad08543eda7a75e439b40d9b4c0e76c39be87184813cf58d12c4cb06ec9f3b1f9c37bfbc75e8d2df8e85b264816ab3dc4f7205f6d001c5ef829d80555edd6cc91d9e48e0e076d55ef4c330dd79e0b45066079568576aee8a58b789e12667b648c8f7f8e9e1fd55e1bc55ee2ca840c2f151780ba7c73637034aa1e0d199e3a351e54"], 0x247) r1 = creat(&(0x7f0000000040)='./bus\x00', 0xa0) fallocate(r1, 0x10, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x8028}) creat(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) 20:19:29 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./bus\x00', 0x0, &(0x7f0000000100)={'L-', 0x80000000}, 0x16, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000240)) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0, 0x0) timer_create(0x8, &(0x7f00000001c0)={0x0, 0x3e, 0x4}, &(0x7f0000000040)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x247) r1 = creat(&(0x7f0000000040)='./bus\x00', 0xa0) fallocate(r1, 0x10, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x8028}) creat(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) 20:19:29 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) fchdir(0xffffffffffffffff) 20:19:29 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./bus\x00', 0x0, &(0x7f0000000100)={'L-', 0x80000000}, 0x16, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000240)) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0, 0x0) timer_create(0x8, &(0x7f00000001c0)={0x0, 0x3e, 0x4}, &(0x7f0000000040)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="0721deef000080f8efcb8bd34c028a0003965f43c4a2fb6d50840620049dada720f897f650b0d13b730f000604aa6cf7f0c2208aee57ca1999dfc1743c7e7f8cf204341d459e4331e96e29e80f5e3d21559ddc574d8d2e4752ea0c2842c3a787004af1ba9aecfd7bb7bb912c15a2fbb240cbaa027b515429529b230b3048199ee8d61a51f58d4e7a4b5e0e3440b77bd3aafe0426867533e0e23258e59193c9764a3e10225c6f419048d99d3e238b057f000000a8d6c27489e7c1b0859773e979f5257d0d542c45b8e7a7d1b26175387ed81e1b1202754cdf726812a6c9192f7d1b000083801fd0963ac0775b4c387b830104000000000000005d920e4cbebe2fd184e7a46a58f38ccf628d674a21d02a2b6065df5d951bb33f1fd541561d3017f12d6083902e3d690800c60200000000000000d6cbe016000001000000a6fd6240000000000000004e98af0362e88851c48bce4cb0e056641afce2b0e6411df2faaa412189df3b3fdbd8ed66522f510300f0e258922dcf41dd93e4e09f185362c173740ec87505462e6f4f8f383ae0e7a044fddb94ba56cadd9e25783c2f1d5cce56defd411dc40421357cdd7f04c801000080000000004e3123b287aabd8c7563ca810f5c172e7712f8bf4e6c14565d7f89c88c8706be7b5f93ae88a7dca1d09bda796b29097edc34254b45a3f7a5630f76308398fbf73da6dea604f27065f8e09d83fa6876bd026b374640dade04c5c3982ff2b2200895dd7afe956b4d8456e55a489fb199b5033bfa10f7590c8a7326a054c44a0d21b3a1cb5bf5b6639b8098c7be45896be745691d27026c08fd9f2e0776156432919f1f0e39c8bd25f3065ad08543eda7a75e439b40d9b4c0e76c39be87184813cf58d12c4cb06ec9f3b1f9c37bfbc75e8d2df8e85b264816ab3dc4f7205f6d001c5ef829d80555edd6cc91d9e48e0e076d55ef4c330dd79e0b45066079568576aee8a58b789e12667b648c8f7f8e9e1fd55e1bc55ee2ca840c2f151780ba7c73637034aa1e0d199e3a351e54"], 0x247) r1 = creat(&(0x7f0000000040)='./bus\x00', 0xa0) fallocate(r1, 0x10, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x8028}) creat(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) 20:19:29 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./bus\x00', 0x0, &(0x7f0000000100)={'L-', 0x80000000}, 0x16, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000240)) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0, 0x0) timer_create(0x8, &(0x7f00000001c0)={0x0, 0x3e, 0x4}, &(0x7f0000000040)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="0721deef000080f8efcb8bd34c028a0003965f43c4a2fb6d50840620049dada720f897f650b0d13b730f000604aa6cf7f0c2208aee57ca1999dfc1743c7e7f8cf204341d459e4331e96e29e80f5e3d21559ddc574d8d2e4752ea0c2842c3a787004af1ba9aecfd7bb7bb912c15a2fbb240cbaa027b515429529b230b3048199ee8d61a51f58d4e7a4b5e0e3440b77bd3aafe0426867533e0e23258e59193c9764a3e10225c6f419048d99d3e238b057f000000a8d6c27489e7c1b0859773e979f5257d0d542c45b8e7a7d1b26175387ed81e1b1202754cdf726812a6c9192f7d1b000083801fd0963ac0775b4c387b830104000000000000005d920e4cbebe2fd184e7a46a58f38ccf628d674a21d02a2b6065df5d951bb33f1fd541561d3017f12d6083902e3d690800c60200000000000000d6cbe016000001000000a6fd6240000000000000004e98af0362e88851c48bce4cb0e056641afce2b0e6411df2faaa412189df3b3fdbd8ed66522f510300f0e258922dcf41dd93e4e09f185362c173740ec87505462e6f4f8f383ae0e7a044fddb94ba56cadd9e25783c2f1d5cce56defd411dc40421357cdd7f04c801000080000000004e3123b287aabd8c7563ca810f5c172e7712f8bf4e6c14565d7f89c88c8706be7b5f93ae88a7dca1d09bda796b29097edc34254b45a3f7a5630f76308398fbf73da6dea604f27065f8e09d83fa6876bd026b374640dade04c5c3982ff2b2200895dd7afe956b4d8456e55a489fb199b5033bfa10f7590c8a7326a054c44a0d21b3a1cb5bf5b6639b8098c7be45896be745691d27026c08fd9f2e0776156432919f1f0e39c8bd25f3065ad08543eda7a75e439b40d9b4c0e76c39be87184813cf58d12c4cb06ec9f3b1f9c37bfbc75e8d2df8e85b264816ab3dc4f7205f6d001c5ef829d80555edd6cc91d9e48e0e076d55ef4c330dd79e0b45066079568576aee8a58b789e12667b648c8f7f8e9e1fd55e1bc55ee2ca840c2f151780ba7c73637034aa1e0d199e3a351e54"], 0x247) r1 = creat(&(0x7f0000000040)='./bus\x00', 0xa0) fallocate(r1, 0x10, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x8028}) creat(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) 20:19:29 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./bus\x00', 0x0, &(0x7f0000000100)={'L-', 0x80000000}, 0x16, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000240)) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0, 0x0) timer_create(0x8, &(0x7f00000001c0)={0x0, 0x3e, 0x4}, &(0x7f0000000040)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="0721deef000080f8efcb8bd34c028a0003965f43c4a2fb6d50840620049dada720f897f650b0d13b730f000604aa6cf7f0c2208aee57ca1999dfc1743c7e7f8cf204341d459e4331e96e29e80f5e3d21559ddc574d8d2e4752ea0c2842c3a787004af1ba9aecfd7bb7bb912c15a2fbb240cbaa027b515429529b230b3048199ee8d61a51f58d4e7a4b5e0e3440b77bd3aafe0426867533e0e23258e59193c9764a3e10225c6f419048d99d3e238b057f000000a8d6c27489e7c1b0859773e979f5257d0d542c45b8e7a7d1b26175387ed81e1b1202754cdf726812a6c9192f7d1b000083801fd0963ac0775b4c387b830104000000000000005d920e4cbebe2fd184e7a46a58f38ccf628d674a21d02a2b6065df5d951bb33f1fd541561d3017f12d6083902e3d690800c60200000000000000d6cbe016000001000000a6fd6240000000000000004e98af0362e88851c48bce4cb0e056641afce2b0e6411df2faaa412189df3b3fdbd8ed66522f510300f0e258922dcf41dd93e4e09f185362c173740ec87505462e6f4f8f383ae0e7a044fddb94ba56cadd9e25783c2f1d5cce56defd411dc40421357cdd7f04c801000080000000004e3123b287aabd8c7563ca810f5c172e7712f8bf4e6c14565d7f89c88c8706be7b5f93ae88a7dca1d09bda796b29097edc34254b45a3f7a5630f76308398fbf73da6dea604f27065f8e09d83fa6876bd026b374640dade04c5c3982ff2b2200895dd7afe956b4d8456e55a489fb199b5033bfa10f7590c8a7326a054c44a0d21b3a1cb5bf5b6639b8098c7be45896be745691d27026c08fd9f2e0776156432919f1f0e39c8bd25f3065ad08543eda7a75e439b40d9b4c0e76c39be87184813cf58d12c4cb06ec9f3b1f9c37bfbc75e8d2df8e85b264816ab3dc4f7205f6d001c5ef829d80555edd6cc91d9e48e0e076d55ef4c330dd79e0b45066079568576aee8a58b789e12667b648c8f7f8e9e1fd55e1bc55ee2ca840c2f151780ba7c73637034aa1e0d199e3a351e54"], 0x247) r1 = creat(&(0x7f0000000040)='./bus\x00', 0xa0) fallocate(r1, 0x10, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x8028}) creat(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) 20:19:29 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0x100000110) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000100)='F', 0x1}], 0x1) read(r0, &(0x7f0000000280)=""/4081, 0xff1) fcntl$setpipe(r1, 0x407, 0xe00000) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="1c648078bd793e611b0f2efaf39381", 0xf}], 0x1, 0x2) 20:19:29 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = syz_io_uring_setup(0x2de5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000040)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4, 0x0, @fd_index}, 0x1f) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r2, r3, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x2, 0x0, @fd_index, 0x0, 0x0}, 0x0) io_uring_enter(r1, 0x302, 0x0, 0x0, 0x0, 0x0) 20:19:29 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./bus\x00', 0x0, &(0x7f0000000100)={'L-', 0x80000000}, 0x16, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000240)) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0, 0x0) timer_create(0x8, &(0x7f00000001c0)={0x0, 0x3e, 0x4}, &(0x7f0000000040)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x247) r1 = creat(&(0x7f0000000040)='./bus\x00', 0xa0) fallocate(r1, 0x10, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x8028}) creat(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) 20:19:29 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x4) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000100), 0x8) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000001140)=""/4110, &(0x7f0000000000)=0x100e) 20:19:29 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x33}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0xdda, 0x4) sendmmsg(r0, &(0x7f00000038c0), 0x4000000000000a8, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x2102, 0x0, 0x0) 20:19:29 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./bus\x00', 0x0, &(0x7f0000000100)={'L-', 0x80000000}, 0x16, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000240)) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0, 0x0) timer_create(0x8, &(0x7f00000001c0)={0x0, 0x3e, 0x4}, &(0x7f0000000040)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x247) r1 = creat(&(0x7f0000000040)='./bus\x00', 0xa0) fallocate(r1, 0x10, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x8028}) creat(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) 20:19:29 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./bus\x00', 0x0, &(0x7f0000000100)={'L-', 0x80000000}, 0x16, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000240)) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0, 0x0) timer_create(0x8, &(0x7f00000001c0)={0x0, 0x3e, 0x4}, &(0x7f0000000040)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x247) r1 = creat(&(0x7f0000000040)='./bus\x00', 0xa0) fallocate(r1, 0x10, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x8028}) creat(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) 20:19:29 executing program 5: futex(0x0, 0x8c, 0x0, 0x0, &(0x7f00000000c0), 0x0) futex(&(0x7f0000000000)=0x1, 0xc, 0x1, &(0x7f0000000040), &(0x7f0000000080), 0x1) 20:19:30 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0x4142, 0x0) copy_file_range(r0, 0x0, r0, 0x0, 0x0, 0x8008) 20:19:30 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time={0xdc}, {}, {}, @time}, {0x0, 0x72, 0x0, 0x0, @time={0xfffffff8}}], 0x38) 20:19:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="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", 0x130}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x36) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 20:19:30 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0x100000110) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000100)='F', 0x1}], 0x1) read(r0, &(0x7f0000000280)=""/4081, 0xff1) fcntl$setpipe(r1, 0x407, 0xe00000) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="1c648078bd793e611b0f2efaf39381", 0xf}], 0x1, 0x2) 20:19:30 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05ecd0363e5d749dd9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a631aa9999d0a961bfde5800c0f5989b496fc2f54a05ac20a06f35517e1b6469a7808efb503f2a6abf100788210c48d3d1c2e5cb058dd8b5871872094e5552a3420b88da519401e36470a70e1af5f902599c5e318ffc6846375a36695839c2e7e07d17ae", 0xa3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 20:19:30 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f00000003c0)=ANY=[], 0x8) recvmmsg(r0, &(0x7f0000002500)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000001080)=[{0xfffffffffffffffe}], 0x1}}], 0x2, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 20:19:30 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c0000002400010000000000000000ff0000000006000400008e"], 0x1c}}, 0x0) 20:19:30 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time={0xdc}, {}, {}, @time}, {0x0, 0x72, 0x0, 0x0, @time={0xfffffff8}}], 0x38) 20:19:30 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f00000000c0)='asymmetric\x00', &(0x7f00000001c0)=@chain) 20:19:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) timer_create(0x2, &(0x7f0000000180)={0x0, 0x17, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x1b3b18) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x3938700}, {0x77359400}}, &(0x7f0000000100)) 20:19:30 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05ecd0363e5d749dd9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a631aa9999d0a961bfde5800c0f5989b496fc2f54a05ac20a06f35517e1b6469a7808efb503f2a6abf100788210c48d3d1c2e5cb058dd8b5871872094e5552a3420b88da519401e36470a70e1af5f902599c5e318ffc6846375a36695839c2e7e07d17ae", 0xa3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 20:19:30 executing program 5: r0 = syz_io_uring_setup(0x75cf, &(0x7f0000000300), &(0x7f00003b2000/0x1000)=nil, &(0x7f00006d6000/0x2000)=nil, &(0x7f0000000180), &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r0) r3 = syz_io_uring_setup(0x15b4, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) read(r1, &(0x7f0000000580)=""/154, 0x9a) io_uring_enter(r3, 0x4b32, 0x0, 0x0, 0x0, 0x0) write$nbd(r2, &(0x7f00000001c0)=ANY=[], 0x10) 20:19:30 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time={0xdc}, {}, {}, @time}, {0x0, 0x72, 0x0, 0x0, @time={0xfffffff8}}], 0x38) 20:19:30 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time={0xdc}, {}, {}, @time}, {0x0, 0x72, 0x0, 0x0, @time={0xfffffff8}}], 0x38) 20:19:30 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000001600), 0x0, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r0, 0x5382, &(0x7f0000000040)) 20:19:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="290000001900190f41f4cbace7f9a7df02c12b0000e80001e11200040d000d00ea110000000500fd00", 0x29}], 0x1) 20:19:30 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f00000003c0)=ANY=[], 0x8) recvmmsg(r0, &(0x7f0000002500)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000001080)=[{0xfffffffffffffffe}], 0x1}}], 0x2, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 20:19:30 executing program 0: mkdir(&(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') link(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000040)='./bus\x00') unlink(&(0x7f0000000300)='./bus\x00') 20:19:30 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x1f, 0x0, &(0x7f0000000040)=0x18) 20:19:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="390000002900034700bb65e1c3e4ffff06000000010000004500000025000300180013c00003000007fd17e5ffff0606040000000000000000", 0x39}], 0x1) 20:19:30 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000600), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000640)={0x18, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_EEE_HEADER={0x4}]}, 0x18}}, 0x0) 20:19:30 executing program 0: r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f00000000c0)={0x10, 0x0, 0x1}, 0xc) write(r0, &(0x7f0000000040)="260000002200473b77f8d20f58207a163dc6ef446fd46501050000000000000005006d20002b", 0x26) connect$netlink(r0, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) timer_create(0x0, &(0x7f0000000440)={0x0, 0x12}, &(0x7f0000044000)) r1 = getpid() sendmmsg(r0, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) connect$netlink(r0, &(0x7f0000000080)=@unspec, 0xc) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x800000015) [ 806.521747][ T690] netlink: 21 bytes leftover after parsing attributes in process `syz-executor.2'. 20:19:33 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05ecd0363e5d749dd9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a631aa9999d0a961bfde5800c0f5989b496fc2f54a05ac20a06f35517e1b6469a7808efb503f2a6abf100788210c48d3d1c2e5cb058dd8b5871872094e5552a3420b88da519401e36470a70e1af5f902599c5e318ffc6846375a36695839c2e7e07d17ae", 0xa3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 20:19:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="390000002900034700bb65e1c3e4ffff06000000010000004500000025000300180013c00003000007fd17e5ffff0606040000000000000000", 0x39}], 0x1) 20:19:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000080)=0xa, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001300110468fe0700000000000000ff3f020000003b0a00010000000004002b000a00020014a4ee1ee438d2fd000000000000007200", 0x39}], 0x1) 20:19:33 executing program 1: unshare(0x4040680) r0 = open(&(0x7f0000000280)='./file0\x00', 0x3fc, 0x0) flock(r0, 0x1) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) flock(r1, 0x2) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) flock(r0, 0x1) flock(r0, 0xff24ec31e700caad) 20:19:33 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f00000003c0)=ANY=[], 0x8) recvmmsg(r0, &(0x7f0000002500)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000001080)=[{0xfffffffffffffffe}], 0x1}}], 0x2, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 20:19:33 executing program 0: r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f00000000c0)={0x10, 0x0, 0x1}, 0xc) write(r0, &(0x7f0000000040)="260000002200473b77f8d20f58207a163dc6ef446fd46501050000000000000005006d20002b", 0x26) connect$netlink(r0, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) timer_create(0x0, &(0x7f0000000440)={0x0, 0x12}, &(0x7f0000044000)) r1 = getpid() sendmmsg(r0, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) connect$netlink(r0, &(0x7f0000000080)=@unspec, 0xc) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x800000015) 20:19:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="390000002900034700bb65e1c3e4ffff06000000010000004500000025000300180013c00003000007fd17e5ffff0606040000000000000000", 0x39}], 0x1) 20:19:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000080)=0xa, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001300110468fe0700000000000000ff3f020000003b0a00010000000004002b000a00020014a4ee1ee438d2fd000000000000007200", 0x39}], 0x1) [ 809.390261][ T721] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.5'. [ 809.403384][ T721] device sit0 left promiscuous mode [ 809.409390][ T724] netlink: 21 bytes leftover after parsing attributes in process `syz-executor.2'. [ 809.419358][ T728] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.5'. 20:19:33 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f00000003c0)=ANY=[], 0x8) recvmmsg(r0, &(0x7f0000002500)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000001080)=[{0xfffffffffffffffe}], 0x1}}], 0x2, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 20:19:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="390000002900034700bb65e1c3e4ffff06000000010000004500000025000300180013c00003000007fd17e5ffff0606040000000000000000", 0x39}], 0x1) 20:19:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000080)=0xa, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001300110468fe0700000000000000ff3f020000003b0a00010000000004002b000a00020014a4ee1ee438d2fd000000000000007200", 0x39}], 0x1) [ 809.452412][ T736] netlink: 21 bytes leftover after parsing attributes in process `syz-executor.2'. [ 809.468233][ T738] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.5'. 20:19:33 executing program 0: r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f00000000c0)={0x10, 0x0, 0x1}, 0xc) write(r0, &(0x7f0000000040)="260000002200473b77f8d20f58207a163dc6ef446fd46501050000000000000005006d20002b", 0x26) connect$netlink(r0, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) timer_create(0x0, &(0x7f0000000440)={0x0, 0x12}, &(0x7f0000044000)) r1 = getpid() sendmmsg(r0, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) connect$netlink(r0, &(0x7f0000000080)=@unspec, 0xc) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x800000015) [ 809.506601][ T745] netlink: 21 bytes leftover after parsing attributes in process `syz-executor.2'. [ 809.535685][ T750] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.5'. 20:19:36 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05ecd0363e5d749dd9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a631aa9999d0a961bfde5800c0f5989b496fc2f54a05ac20a06f35517e1b6469a7808efb503f2a6abf100788210c48d3d1c2e5cb058dd8b5871872094e5552a3420b88da519401e36470a70e1af5f902599c5e318ffc6846375a36695839c2e7e07d17ae", 0xa3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 20:19:36 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x1b, 0x5b, 0x7, 0x7, 0x34, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x6d, 0x40}, [{}]}, 0x78) 20:19:36 executing program 3: r0 = perf_event_open$cgroup(&(0x7f0000000140)={0x1, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x80082407, 0xffffffffffffffff) 20:19:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000080)=0xa, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001300110468fe0700000000000000ff3f020000003b0a00010000000004002b000a00020014a4ee1ee438d2fd000000000000007200", 0x39}], 0x1) 20:19:36 executing program 0: r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f00000000c0)={0x10, 0x0, 0x1}, 0xc) write(r0, &(0x7f0000000040)="260000002200473b77f8d20f58207a163dc6ef446fd46501050000000000000005006d20002b", 0x26) connect$netlink(r0, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) timer_create(0x0, &(0x7f0000000440)={0x0, 0x12}, &(0x7f0000044000)) r1 = getpid() sendmmsg(r0, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) connect$netlink(r0, &(0x7f0000000080)=@unspec, 0xc) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x77359400}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x800000015) 20:19:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x2, 0x11, r1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='devpts\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000380)=@filename='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0xd000, 0x0) clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 20:19:36 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80b6, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, r0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') 20:19:36 executing program 3: r0 = perf_event_open$cgroup(&(0x7f0000000140)={0x1, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x80082407, 0xffffffffffffffff) 20:19:36 executing program 1: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x43, &(0x7f0000000640)="f47970da7c2fd541e0656c5762306aa606a0c2a76e59b65fa78fb184da006cabbd58564cf09dcac5456d212e05d23391ff083d78ff122a776e08af2025580c72249ad2"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:19:36 executing program 2: r0 = perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) [ 812.417745][ T767] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.5'. [ 812.446270][ T773] Process accounting paused 20:19:36 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80b6, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, r0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') 20:19:36 executing program 3: r0 = perf_event_open$cgroup(&(0x7f0000000140)={0x1, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x80082407, 0xffffffffffffffff) 20:19:39 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x101}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@local, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x32}, 0x0, @in6=@private0, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) 20:19:39 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r2, 0x0) preadv(r1, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) open_tree(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1900) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000014c0), 0x4a0001, 0x0) ioctl$GIO_CMAP(r3, 0x4b70, &(0x7f0000001500)) r4 = dup2(r0, r0) ioctl$TCXONC(r4, 0x4b44, 0x0) 20:19:39 executing program 3: r0 = perf_event_open$cgroup(&(0x7f0000000140)={0x1, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x80082407, 0xffffffffffffffff) 20:19:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r1, &(0x7f0000000000)='+\x00', 0x5c8, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 20:19:39 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80b6, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, r0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') 20:19:39 executing program 4: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x80}}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x0, @in6=@mcast1}}, 0xe4) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup2(r1, r0) 20:19:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r1, &(0x7f0000000000)='+\x00', 0x5c8, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 20:19:39 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000ac0)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x0) 20:19:39 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80b6, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, r0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') 20:19:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r1, &(0x7f0000000000)='+\x00', 0x5c8, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 20:19:39 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000a, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f00000004c0)={{0x3}}) 20:19:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x100000003, 0x3c) sendto$inet6(r1, &(0x7f0000000000)='+\x00', 0x5c8, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 20:19:40 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x101}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@local, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x32}, 0x0, @in6=@private0, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) 20:19:40 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r2, 0x0) preadv(r1, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) open_tree(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1900) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000014c0), 0x4a0001, 0x0) ioctl$GIO_CMAP(r3, 0x4b70, &(0x7f0000001500)) r4 = dup2(r0, r0) ioctl$TCXONC(r4, 0x4b44, 0x0) 20:19:40 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6}]}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f00000000c0)={0x0, 0xfe7}) 20:19:40 executing program 3: unlink(&(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') 20:19:40 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x6, 0x0, &(0x7f0000000080)) 20:19:40 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r2, 0x0) preadv(r1, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000280)={0x20, r3, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4}]}, 0x20}}, 0x0) 20:19:40 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r2, 0x0) preadv(r1, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) open_tree(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1900) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000014c0), 0x4a0001, 0x0) ioctl$GIO_CMAP(r3, 0x4b70, &(0x7f0000001500)) r4 = dup2(r0, r0) ioctl$TCXONC(r4, 0x4b44, 0x0) [ 816.309537][ T25] audit: type=1326 audit(1619381980.206:5881): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=858 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 20:19:40 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r2, 0x0) preadv(r1, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) open_tree(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1900) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000014c0), 0x4a0001, 0x0) ioctl$GIO_CMAP(r3, 0x4b70, &(0x7f0000001500)) r4 = dup2(r0, r0) ioctl$TCXONC(r4, 0x4b44, 0x0) 20:19:40 executing program 3: prctl$PR_SET_NAME(0x8, &(0x7f0000000000)='/dev/rtc0\x00') 20:19:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000004300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x3) write(r1, &(0x7f00000001c0)="01", 0xfdef) 20:19:40 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240)={0x0, 0x2}, 0x4) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20}, 0x10) 20:19:40 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 816.555129][ T25] audit: type=1326 audit(1619381980.456:5882): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=886 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 816.643002][ T25] audit: type=1326 audit(1619381980.486:5883): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=886 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=438 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 816.667219][ T25] audit: type=1326 audit(1619381980.486:5884): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=886 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 816.691198][ T25] audit: type=1326 audit(1619381980.486:5885): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=886 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=157 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 816.715268][ T25] audit: type=1326 audit(1619381980.486:5886): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=886 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 20:19:41 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x101}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@local, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x32}, 0x0, @in6=@private0, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) 20:19:41 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="66530700ae897094e71b0fa1f147a8378f364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e", 0x3d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x1e) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="02000000010004000000000002000100", @ANYRES32, @ANYBLOB="040004000000000008000400", @ANYRES32, @ANYBLOB="08000500", @ANYRES32, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0xee00, @ANYBLOB="01000000", @ANYRES32, @ANYBLOB="08000300", @ANYRES32, @ANYBLOB="08000500", @ANYRES32=0xee00, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB="080004", @ANYRES32=0xee01], 0x7c, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 20:19:41 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)={0x18, 0x0, 0x2, 0x301, 0x0, 0x0, {}, [@generic='2']}, 0x18}}, 0x0) 20:19:41 executing program 0: r0 = getpid() r1 = fork() kcmp(r0, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 20:19:41 executing program 5: unshare(0x400) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000640)) 20:19:41 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r3 = socket(0x400000000000010, 0x3, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r2, 0x0, 0x6, 0x0, 0x0) [ 817.143849][ T25] audit: type=1326 audit(1619381981.036:5887): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=858 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 20:19:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/241, 0xf1) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000180)={0x1d3}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f0000000300)={0x80, 0x1, 'client1\x00', 0x0, "3f5ac29df43e8d7f", "f1520b1b5492c66dea258adfddf281cda740ad5f71139be35580178517d85eb6"}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) tkill(r1, 0x1004000000016) 20:19:41 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = socket$unix(0x1, 0x5, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r0, &(0x7f0000000000)={0x80000001}) 20:19:41 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x81ff, 0x0) r0 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) open(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) close(r0) [ 817.236406][ T921] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 20:19:41 executing program 4: r0 = creat(&(0x7f0000000280)='./file1\x00', 0x0) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x191) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) symlinkat(&(0x7f00000000c0)='/', r1, &(0x7f0000d06ff8)='./file0\x00') renameat(r1, &(0x7f0000000140)='./file1\x00', r0, &(0x7f0000000180)='./file0\x00') 20:19:41 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r3 = socket(0x400000000000010, 0x3, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r2, 0x0, 0x6, 0x0, 0x0) 20:19:41 executing program 4: setpgid(0xffffffffffffffff, 0x0) 20:19:41 executing program 4: mlock(&(0x7f0000bff000/0x400000)=nil, 0x400000) mremap(&(0x7f0000e95000/0x1000)=nil, 0x1000, 0x1000, 0x7, &(0x7f0000ffc000/0x1000)=nil) mremap(&(0x7f00005d9000/0x4000)=nil, 0x4000, 0x4000, 0x7, &(0x7f0000ffc000/0x4000)=nil) madvise(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x15) 20:19:41 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x101}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@local, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x32}, 0x0, @in6=@private0, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) 20:19:41 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r3 = socket(0x400000000000010, 0x3, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r2, 0x0, 0x6, 0x0, 0x0) 20:19:41 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) writev(r1, &(0x7f0000000580)=[{&(0x7f0000000340)="ac1bd94ea710066f9bd775d83d395465b1c386aca1a5a65b5d4606ab7ce83a57a18659ba0bff12278e45a6c745f66e7daa99a70f645a0f407595dbaad2931beffdd9fd83f9900d9cbd03c7a1fb84e1f41c0c4f", 0x53}, {&(0x7f00000003c0)="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", 0xfd}, {&(0x7f0000000680)="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", 0x6e6}], 0x3) recvfrom(r0, 0x0, 0xf0ff7f, 0x0, 0x0, 0x0) 20:19:41 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="240000001e005f0014f9f40700090400020000000100000000000000080001", 0x1f) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0xac95, 0x0) 20:19:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) unshare(0x26040400) getpeername(r0, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000000)=0xfffffe5e) 20:19:42 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r3 = socket(0x400000000000010, 0x3, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r2, 0x0, 0x6, 0x0, 0x0) 20:19:42 executing program 0: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x421}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x53, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x8000000000001f0, 0x0, 0x0) r2 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0xea) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 20:19:42 executing program 4: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f00000000c0)=[{}, {0x6}]}) close(0xffffffffffffffff) write$selinux_attr(r0, 0x0, 0x0) [ 818.164470][ T25] audit: type=1326 audit(1619381982.036:5888): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=976 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 20:19:42 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/netstat\x00') set_mempolicy(0x3, &(0x7f0000000040)=0x1, 0x101) fsetxattr$security_capability(r0, &(0x7f0000000000), &(0x7f00000000c0)=@v3, 0x18, 0x0) 20:19:42 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/netstat\x00') set_mempolicy(0x3, &(0x7f0000000040)=0x1, 0x101) fsetxattr$security_capability(r0, &(0x7f0000000000), &(0x7f00000000c0)=@v3, 0x18, 0x0) 20:19:42 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/netstat\x00') set_mempolicy(0x3, &(0x7f0000000040)=0x1, 0x101) fsetxattr$security_capability(r0, &(0x7f0000000000), &(0x7f00000000c0)=@v3, 0x18, 0x0) 20:19:42 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/netstat\x00') set_mempolicy(0x3, &(0x7f0000000040)=0x1, 0x101) fsetxattr$security_capability(r0, &(0x7f0000000000), &(0x7f00000000c0)=@v3, 0x18, 0x0) 20:19:42 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a4, &(0x7f0000000480)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 20:19:42 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x202, &(0x7f0000000200)=0x0) ftruncate(r0, 0x81fd) io_submit(r1, 0x3b, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x4000}]) ioctl$FS_IOC_RESVSP(r0, 0x40305829, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x81fd}) 20:19:42 executing program 0: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x421}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x53, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x8000000000001f0, 0x0, 0x0) r2 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0xea) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 20:19:42 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="240000001e005f0014f9f40700090400020000000100000000000000080001", 0x1f) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0xac95, 0x0) 20:19:42 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_linger(r0, 0x1, 0x26, &(0x7f0000000180), 0x8) 20:19:42 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_linger(r0, 0x1, 0x26, &(0x7f0000000180), 0x8) 20:19:42 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x227d, &(0x7f00000000c0)) 20:19:42 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000140), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000000100000008000200030000000c0004800500030080ffffff0800010003"], 0x30}}, 0x0) 20:19:42 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x45}, {0x6}]}) [ 818.971512][ T25] audit: type=1326 audit(1619381982.866:5889): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=976 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 20:19:42 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x202, &(0x7f0000000200)=0x0) ftruncate(r0, 0x81fd) io_submit(r1, 0x3b, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x4000}]) ioctl$FS_IOC_RESVSP(r0, 0x40305829, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x81fd}) 20:19:42 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_linger(r0, 0x1, 0x26, &(0x7f0000000180), 0x8) 20:19:42 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000140), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000000100000008000200030000000c0004800500030080ffffff0800010003"], 0x30}}, 0x0) 20:19:43 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000140), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000000100000008000200030000000c0004800500030080ffffff0800010003"], 0x30}}, 0x0) [ 819.065154][ T25] audit: type=1326 audit(1619381982.966:5890): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1025 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 20:19:43 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_linger(r0, 0x1, 0x26, &(0x7f0000000180), 0x8) 20:19:43 executing program 0: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x421}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x53, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x8000000000001f0, 0x0, 0x0) r2 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0xea) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 20:19:43 executing program 2: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x202, &(0x7f0000000200)=0x0) ftruncate(r0, 0x81fd) io_submit(r1, 0x3b, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x4000}]) ioctl$FS_IOC_RESVSP(r0, 0x40305829, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x81fd}) 20:19:43 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000140), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000000100000008000200030000000c0004800500030080ffffff0800010003"], 0x30}}, 0x0) 20:19:43 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg$sock(r0, &(0x7f0000000fc0)=[{{&(0x7f0000000bc0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc, 0x80, 0x0}}], 0x2, 0x0) 20:19:43 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x202, &(0x7f0000000200)=0x0) ftruncate(r0, 0x81fd) io_submit(r1, 0x3b, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x4000}]) ioctl$FS_IOC_RESVSP(r0, 0x40305829, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x81fd}) 20:19:43 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="240000001e005f0014f9f40700090400020000000100000000000000080001", 0x1f) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0xac95, 0x0) 20:19:43 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg$sock(r0, &(0x7f0000000fc0)=[{{&(0x7f0000000bc0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc, 0x80, 0x0}}], 0x2, 0x0) 20:19:43 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000002c0), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000300)={0x3c, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x10, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x4}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}]}, 0x3c}}, 0x0) 20:19:43 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg$sock(r0, &(0x7f0000000fc0)=[{{&(0x7f0000000bc0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc, 0x80, 0x0}}], 0x2, 0x0) 20:19:43 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0xb3, 0x5) syz_read_part_table(0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="020181ffffff0a000000ff45ac0080ffffff0500e931190000000000000680000000630000000900000087771f7200300700a5ffffff00000000008000ca55aa", 0x40, 0x1c0}]) 20:19:43 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg$sock(r0, &(0x7f0000000fc0)=[{{&(0x7f0000000bc0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000180)=@nfc, 0x80, 0x0}}], 0x2, 0x0) 20:19:43 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x202, &(0x7f0000000200)=0x0) ftruncate(r0, 0x81fd) io_submit(r1, 0x3b, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x4000}]) ioctl$FS_IOC_RESVSP(r0, 0x40305829, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x81fd}) [ 819.860640][ T1068] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 20:19:43 executing program 0: socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x421}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x53, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x8000000000001f0, 0x0, 0x0) r2 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0xea) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 20:19:43 executing program 2: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x202, &(0x7f0000000200)=0x0) ftruncate(r0, 0x81fd) io_submit(r1, 0x3b, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x4000}]) ioctl$FS_IOC_RESVSP(r0, 0x40305829, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x81fd}) 20:19:43 executing program 1: r0 = socket$inet(0x2, 0x2000000000003, 0x6) setsockopt$inet_int(r0, 0x1f00000000000000, 0xd2, 0x0, 0x0) [ 819.921349][ T1076] loop4: detected capacity change from 0 to 1 20:19:43 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$loop(&(0x7f0000000100), 0x3, 0x0) r1 = socket(0x2, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) r4 = fcntl$dupfd(r0, 0x0, r1) ioctl$LOOP_SET_STATUS(r4, 0x4c02, 0x0) [ 819.968523][ T1076] loop4: p1 p2 < > p3 p4 [ 819.972888][ T1076] loop4: partition table partially beyond EOD, truncated [ 819.993495][ T1076] loop4: p1 start 10 is beyond EOD, truncated [ 819.999660][ T1076] loop4: p2 start 25 is beyond EOD, truncated [ 820.005768][ T1076] loop4: p3 start 9 is beyond EOD, truncated [ 820.011763][ T1076] loop4: p4 size 3389030400 extends beyond EOD, truncated 20:19:43 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0xb3, 0x5) syz_read_part_table(0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="020181ffffff0a000000ff45ac0080ffffff0500e931190000000000000680000000630000000900000087771f7200300700a5ffffff00000000008000ca55aa", 0x40, 0x1c0}]) [ 820.082325][ T1101] loop4: detected capacity change from 0 to 1 [ 820.140809][ T1101] loop4: p1 p2 < > p3 p4 [ 820.145270][ T1101] loop4: partition table partially beyond EOD, truncated [ 820.152496][ T1101] loop4: p1 start 10 is beyond EOD, truncated [ 820.158799][ T1101] loop4: p2 start 25 is beyond EOD, truncated [ 820.164974][ T1101] loop4: p3 start 9 is beyond EOD, truncated [ 820.171019][ T1101] loop4: p4 size 3389030400 extends beyond EOD, truncated 20:19:44 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="240000001e005f0014f9f40700090400020000000100000000000000080001", 0x1f) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0xac95, 0x0) 20:19:44 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) pkey_mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0xffffffffffffffff) futex(&(0x7f0000000040), 0x1, 0x0, 0x0, 0x0, 0x0) 20:19:44 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() poll(0x0, 0x0, 0xfffffffffffffff8) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000600)="66530700ae897094e7b126b097", 0xd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2a) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 20:19:44 executing program 2: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x202, &(0x7f0000000200)=0x0) ftruncate(r0, 0x81fd) io_submit(r1, 0x3b, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x4000}]) ioctl$FS_IOC_RESVSP(r0, 0x40305829, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x81fd}) 20:19:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22, @dev}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) listen(r0, 0x0) 20:19:44 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0xb3, 0x5) syz_read_part_table(0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="020181ffffff0a000000ff45ac0080ffffff0500e931190000000000000680000000630000000900000087771f7200300700a5ffffff00000000008000ca55aa", 0x40, 0x1c0}]) 20:19:44 executing program 3: clock_gettime(0x6, &(0x7f0000001640)) 20:19:44 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7) 20:19:44 executing program 3: keyctl$join(0x1, &(0x7f0000001200)={'syz', 0x0}) r0 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f00000009c0)={'syz', 0x0}, 0x0, 0x0) keyctl$invalidate(0x15, r0) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0x6, r1, 0x0, 0x0, 0xfffffffffffffffc) 20:19:44 executing program 3: keyctl$join(0x1, &(0x7f0000001200)={'syz', 0x0}) r0 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f00000009c0)={'syz', 0x0}, 0x0, 0x0) keyctl$invalidate(0x15, r0) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0x6, r1, 0x0, 0x0, 0xfffffffffffffffc) [ 820.676406][ T1130] loop4: detected capacity change from 0 to 1 20:19:44 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000080), 0x8, 0x0) fallocate(r0, 0x60, 0x0, 0x101) 20:19:44 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) getxattr(0x0, 0x0, 0x0, 0x0) [ 820.735371][ T1130] loop4: p1 p2 < > p3 p4 [ 820.739735][ T1130] loop4: partition table partially beyond EOD, truncated [ 820.775292][ T1130] loop4: p1 start 10 is beyond EOD, truncated [ 820.781411][ T1130] loop4: p2 start 25 is beyond EOD, truncated [ 820.787527][ T1130] loop4: p3 start 9 is beyond EOD, truncated [ 820.793634][ T1130] loop4: p4 size 3389030400 extends beyond EOD, truncated 20:19:45 executing program 3: keyctl$join(0x1, &(0x7f0000001200)={'syz', 0x0}) r0 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f00000009c0)={'syz', 0x0}, 0x0, 0x0) keyctl$invalidate(0x15, r0) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0x6, r1, 0x0, 0x0, 0xfffffffffffffffc) 20:19:45 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10643, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000006, 0x800000000009031, 0xffffffffffffffff, 0x0) 20:19:45 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644", 0x54}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 20:19:45 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x29, 0x9, 0x5, 0x7, 0xc, @private0={0xfc, 0x0, '\x00', 0x1}, @private2, 0x8000, 0x700, 0x8001}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace(0x4207, r1) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:19:45 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0xb3, 0x5) syz_read_part_table(0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="020181ffffff0a000000ff45ac0080ffffff0500e931190000000000000680000000630000000900000087771f7200300700a5ffffff00000000008000ca55aa", 0x40, 0x1c0}]) 20:19:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001300110468fe0700000000000000ff3f020000003b0a00010000000019002b001500040014a4ee1ee438d2fd000000000000007200", 0x39}], 0x1) 20:19:45 executing program 3: keyctl$join(0x1, &(0x7f0000001200)={'syz', 0x0}) r0 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f00000009c0)={'syz', 0x0}, 0x0, 0x0) keyctl$invalidate(0x15, r0) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0x6, r1, 0x0, 0x0, 0xfffffffffffffffc) 20:19:45 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000002240)=[{{&(0x7f0000000240)={0x2, 0x4e20, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000d80)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ssrr={0x89, 0x7, 0x4, [@rand_addr]}]}}}], 0x18}}], 0x1, 0x0) 20:19:45 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="24000000120007031dfffd946fa2830004000a0009000000741d8568201ba3a20400ff7e280000002500ff1803abf53e21bca91d5384d97f9d22a839ddb89e4b34947fd7cb91d34e2009a05f", 0x4c}], 0x1}, 0x0) 20:19:45 executing program 1: pipe2(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) io_uring_enter(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 821.526617][ T1170] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 821.551668][ T1172] loop4: detected capacity change from 0 to 1 20:19:45 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r1) sendmsg$NLBL_CALIPSO_C_LIST(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r2, 0x1, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 20:19:45 executing program 5: syz_io_uring_setup(0x0, 0xfffffffffffffffe, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) [ 821.590174][ T1187] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 821.605923][ T1172] loop4: p1 p2 < > p3 p4 [ 821.610372][ T1172] loop4: partition table partially beyond EOD, truncated 20:19:45 executing program 2: unshare(0x24000400) r0 = syz_open_dev$evdev(&(0x7f0000000280), 0x0, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000000c0)=""/147) [ 821.645827][ T1172] loop4: p1 start 10 is beyond EOD, truncated [ 821.652177][ T1172] loop4: p2 start 25 is beyond EOD, truncated [ 821.656172][ T1190] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 821.658284][ T1172] loop4: p3 start 9 is beyond EOD, truncated [ 821.673677][ T1172] loop4: p4 size 3389030400 extends beyond EOD, truncated 20:19:45 executing program 0: r0 = syz_io_uring_setup(0x6b50, &(0x7f0000000080)={0x0, 0x0, 0x2}, &(0x7f0000000000/0x11000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000040)) io_uring_enter(r0, 0x3f3, 0x0, 0x9, 0x0, 0x0) 20:19:45 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x88880, &(0x7f00000000c0)={0xa, 0x4e1d, 0x0, @remote}, 0x1c) sendto$inet6(r0, &(0x7f00000009c0)="c7cfcaaa22e10542fca5c0195350f15147657e0bfc59d383a47190db88690e6fedc3040ab5809ae02a54cd429cc3338c5afa0c9dce3f91950d1f567f358ac21154159130e88cbb6c43197813b2f23f3e442f80877490b393408142ebcfea6821f543e5ee9e27032e2b75d78f1b79f5a6bb6f0645e267770ef7e8f3a92148091217450ce8581e54223eeb6486205a209bf1fe854d211c03f8c3140fc3979d824082990d119473d20e94f253c9621fac339560ae46cb24b88bf2d01559bb658e343257b90f233b81bc5c398be3bbddb23a1e", 0xffd6, 0xc001, 0x0, 0xffffffffffffff0c) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000040)=0x3, 0x4) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote}, 0x14) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000080), 0x4) 20:19:45 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000000)='e', 0x1}, {&(0x7f0000000280)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2fc903c2b54706c05e4cb2e2875107608f9143f299d8e3f78f4bf076484885fd4089cb084607435b77c7f44cf0783279a494c8e4eba955b16e77f57966d4ba7560f29500352543b498fccba20bcae2b6f573b36b79f72062825eb55e4fa6ad43af0d450a8f2c60baabf84ab4350874b05f4635c7449bac4383622ae4da09326e51bc3130b44a9df8704c9656b60912fa31e99a40704547a3679b11375aa43f5087ecc53a6da3f181f579667653327f1ab491fd4df7a89c140b2e3d27372aa1c8bf1fb3a927c87513fc9bf9a11b0bb8cb13c372bce441427a5ac16ac1fbac4638b9386f2c807d3ec6beb58a33560ff0750149c33ed3e459575e45a0e8f531d70d159f49723ae6c1a997416af0965b9653a348da12be36b91622e574421aa7b8957fc4f4e5a4a7e771a61cb8cd3e86af73484306665141af91a55c68418a4d19eeab8410597e3e2c9f72f76461b453a886f438a42f4d3eb50fadbc4aac9d76279f55666c4259416bda757e27ce3e0b40f201d5056c4110b3b", 0x1b2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 20:19:45 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000100)={[0xfffffffffffe]}, 0x0, 0x8) r0 = gettid() timer_create(0x3, &(0x7f0000000180)={0x0, 0x17, 0x4, @tid=r0}, &(0x7f0000000080)) timer_settime(0x0, 0x236bd4336e4642df, &(0x7f0000000300)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) ppoll(0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x8) 20:19:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'lo\x00', &(0x7f0000000080)=@ethtool_per_queue_op={0x4b, 0xe}}) 20:19:45 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x218}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:19:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() poll(0x0, 0x0, 0xfffffffffffffff8) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126b097eaa769be6d05c41bd36ab95156e9962f38ee9611b9774e677d114b65c44f7b7d9ce4231ef99f34a159590c8b456ec22f46958dc387a323aa893a8cf41753ba5dcf4c2e1fea4b7a3dfc8ea6a7efef7990d00d51feaa24440d21e48dd9e054a3b4ff95f715134d", 0x73}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 20:19:45 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x21, 0x0, &(0x7f00000006c0)) 20:19:45 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000380), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)={0x58, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x34, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x58}}, 0x0) 20:19:45 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000000)='e', 0x1}, {&(0x7f0000000280)="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", 0x1b2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 20:19:45 executing program 5: add_key(&(0x7f0000000000)='.request_key_auth\x00', 0x0, 0x0, 0x0, 0x0) 20:19:45 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) 20:19:45 executing program 4: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180), 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r0, 0x0, 0x0) r1 = gettid() readv(r0, 0x0, 0xffffffffffffff0d) ptrace$setopts(0x4206, r1, 0x0, 0x0) 20:19:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x48, &(0x7f0000000040)="cd3eab24", 0x4) 20:19:45 executing program 5: unshare(0x24000400) r0 = socket$inet6(0xa, 0x803, 0x6) connect(r0, &(0x7f0000000000)=@tipc=@id, 0x80) 20:19:45 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000000)='e', 0x1}, {&(0x7f0000000280)="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", 0x1b2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 20:19:45 executing program 1: mlockall(0x3) mlockall(0x0) setuid(0xee01) io_setup(0x8, &(0x7f0000000040)) 20:19:45 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000100)={0x2, 0x0, {0x0, 0x0, 0x0, 0x18, 0x9, 0x60}}) 20:19:46 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000700)=ANY=[@ANYBLOB="cc0e1a0007b65cab0965500000dc97914ae113"], 0x41) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSW2(r2, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x7300, 0x0, 0x0, "37d12a7e65fd96c6e1845d8b707354f7b630d7"}) 20:19:46 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001200)={0x0, 0x0, &(0x7f00000011c0)={&(0x7f0000000640)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_TID_CONFIG={0x8, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6}]}]}]}, 0x2c}}, 0x0) 20:19:46 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000000)='e', 0x1}, {&(0x7f0000000280)="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", 0x1b2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 20:19:46 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x1, 0x0, 0x3, 0xffffffffffffffff}) 20:19:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x60, 0x0, 0x2, 0x401, 0x0, 0x0, {0x2}, [@CTA_EXPECT_TUPLE={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x24, 0x3, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}]}, @CTA_EXPECT_MASTER={0x4}]}, 0x60}}, 0x0) 20:19:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000bc0)) 20:19:46 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000005c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) setfsgid(0x0) 20:19:46 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040), 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000011c0)={0x0, 0x6}, 0x4) 20:19:46 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r1, 0x0, 0x0, 0x400c0c0, &(0x7f00000000c0)={0x2, 0x0, @rand_addr=0x64010100}, 0x10) sendto$inet(r1, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) [ 822.819617][ T1289] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 822.831840][ T1298] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 20:19:46 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_misc(r0, &(0x7f0000000180)={'syz0', '6'}, 0x5) r1 = perf_event_open(&(0x7f0000000080)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000100)='syz0') 20:19:46 executing program 5: perf_event_open(&(0x7f000025c000)={0x400000001, 0x80, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x400000001, 0x80, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:19:46 executing program 2: mq_open(&(0x7f0000000600)='K&+@\x12@\x1b\x86\xed\xc69\xc9\xff\xff\xff\xffX~x\xe3\xb0%\x00\x1f\xb8\x92@\xab3\x1b\xc5E\xfdo\xbf,\xe1C~\xaa\xbbf\xd4\"\xe6\t\nK\x01\xc6\xcd\x03\xe9sU*\x97\xd4Q\b\xe5&|\x96NF\xb6+p\xc5\x9f/\xf7B\xe5\x8a\x91\xbcZ\x1f\xf8\xff\xacfIx \x85\xc2><\xb1\xda\x9a\xfb\xa9nQ\x8e\xdd>\x13\xaa*\x1f\x85\x9aw0\x02v\xa3\x14oG;\xfb\x12(Y\xef\xc9\x8e9f\xcd&\x9d\xc5Q\xc1\x03\xfbXq\xb8', 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000005c0)) 20:19:46 executing program 4: socketpair(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000000)=0x0) r3 = eventfd(0x0) io_submit(r2, 0x2, &(0x7f0000000100)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x3, 0x0, r0, 0x0, 0x0, 0x3, 0x0, 0x1, r3}]) [ 822.907304][ T25] kauditd_printk_skb: 5 callbacks suppressed [ 822.907317][ T25] audit: type=1326 audit(1619381986.806:5896): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1299 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 20:19:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x50, 0x12, 0x729, 0x0, 0x0, {0x7, 0x0, 0x0, 0x0, {0x0, 0x0, [0x0, 0x0, 0x2c]}}, [@INET_DIAG_REQ_BYTECODE={0x4, 0x37}]}, 0x50}}, 0x0) 20:19:46 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r1, r0) 20:19:46 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000200)=@ethtool_per_queue_op={0x4b, 0x1d}}) 20:19:46 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r1, 0x0, 0x0, 0x400c0c0, &(0x7f00000000c0)={0x2, 0x0, @rand_addr=0x64010100}, 0x10) sendto$inet(r1, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) 20:19:46 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:19:46 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030006, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000020000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="00eb00f2a8b808cb774a6d04983c1bd8d8cecc883dc5cd635290c6b0165abde600a6c571e5cce5838ab53d3f403de6ada68f0af23540313b8cbcb2db42743a53ae5f9a4afe6690dc23e748781265f7de7772e712bcc95e0365965b430fd6b1219a01b7270c26c4a3d0b1fe6bb021fa095e4e3a8ed51cdb0f23ea55f464ba0870897ef57a91"]) 20:19:46 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) set_mempolicy(0x1, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) [ 823.028474][ T25] audit: type=1326 audit(1619381986.836:5897): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1299 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=123 compat=0 ip=0x4665f9 code=0x7ffc0000 20:19:47 executing program 2: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)={0x40000007}) epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, 0x0, 0x0) 20:19:47 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000200)=@ethtool_per_queue_op={0x4b, 0x1d}}) 20:19:47 executing program 1: creat(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000001c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@privport}], [{@context={'context', 0x3d, 'system_u'}, 0x22}], 0x22}}) [ 823.107659][ T25] audit: type=1326 audit(1619381986.836:5898): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1299 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 20:19:47 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6641db6e0551832d303744e57e897094b15ba5d9e70400b1f14712d8ebca47f8b25e7717fd68a8378f362fbf30b8a40a525b7be87baeb12d8e440a49eb252ea2f7fc05d7e532e1a906abffff030000000000008bc3b53e32de099dfacfa185d9db0f28c68d7ca23f367c17e5acd738ce9402dd4e9ee9ff9f24c87f26a0eab2127582afac1db1fd4960508c0da3cb7bd821a0c392a71e2cec3bb49c3f7b7d1d2a40677caf1539f7ce61bcee", 0xab}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x4a}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 20:19:47 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r1, 0x0, 0x0, 0x400c0c0, &(0x7f00000000c0)={0x2, 0x0, @rand_addr=0x64010100}, 0x10) sendto$inet(r1, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) 20:19:47 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000200)=@ethtool_per_queue_op={0x4b, 0x1d}}) 20:19:47 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r0, 0x29, 0x13, &(0x7f0000000000)=0x9, 0x4) [ 823.204886][ T1343] loop5: detected capacity change from 0 to 131456 20:19:47 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000200)=@ethtool_per_queue_op={0x4b, 0x1d}}) [ 823.247128][ T25] audit: type=1326 audit(1619381986.836:5899): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1299 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=157 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 823.268933][ T1358] 9pnet: Insufficient options for proto=fd 20:19:47 executing program 4: clone3(&(0x7f0000000440)={0xe300100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socket$inet(0x2, 0x1, 0x45) 20:19:47 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x8000}, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r1, 0x0, 0x0, 0x400c0c0, &(0x7f00000000c0)={0x2, 0x0, @rand_addr=0x64010100}, 0x10) sendto$inet(r1, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) [ 823.271401][ T25] audit: type=1326 audit(1619381986.836:5900): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1299 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 823.301185][ T1343] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e002c01c, mo2=0006] [ 823.314241][ T1376] 9pnet: Insufficient options for proto=fd [ 823.324690][ T1343] System zones: 2-3, 19-19, 35-38, 46-46 [ 823.342255][ T1343] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 20:19:47 executing program 5: syz_io_uring_setup(0x14c1, &(0x7f0000000000)={0x0, 0x2000000, 0x8}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000080), &(0x7f00000005c0)) 20:19:47 executing program 2: r0 = fsopen(&(0x7f0000000140)='cgroup\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x4, &(0x7f00000002c0)='source', &(0x7f0000000300)='\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000080)='source', &(0x7f00000000c0)='source', 0x0) 20:19:47 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f000000d000/0x2000)=nil, 0xfffffffffffffe74, 0x1000, 0x0, &(0x7f0000007000/0x1000)=nil) 20:19:47 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = dup2(r0, r0) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000100)=0x22) 20:19:47 executing program 4: r0 = epoll_create1(0x0) epoll_wait(r0, &(0x7f0000000780)=[{}], 0x1, 0x0) 20:19:47 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) inotify_init1(0x0) syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x1000014, &(0x7f0000000100)={[{@dots}]}) [ 823.376077][ T1343] ext4 filesystem being mounted at /root/syzkaller-testdir212847498/syzkaller.SpRDhL/1219/file0 supports timestamps until 2038 (0x7fffffff) 20:19:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_misc(r1, &(0x7f00000000c0)=ANY=[], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) fcntl$addseals(r1, 0x409, 0x8) fremovexattr(r1, &(0x7f0000000180)=@known='trusted.overlay.nlink\x00') dup3(r0, r1, 0x0) 20:19:47 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='ns\x00') pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RCLUNK(r1, &(0x7f00000000c0)={0x7}, 0xffffff25) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='ns\x00') renameat(r0, &(0x7f0000000140)='./cgroup\x00', r2, &(0x7f0000000100)='./cgroup\x00') 20:19:47 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000900), 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, 0x0, 0x0, 0x0) 20:19:47 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000001780)=[{0x0, 0x0, 0x3a97}, {&(0x7f00000012c0)="858b68e746fa1884ae", 0x9, 0x6}], 0x8000, &(0x7f0000000000)={[{@fat=@dos1xfloppy}]}) 20:19:47 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 20:19:47 executing program 3: r0 = syz_io_uring_setup(0x3830, &(0x7f0000000200), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000280), &(0x7f00000002c0)) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x100010, r0, 0x10000000) 20:19:47 executing program 4: futex(&(0x7f0000000000), 0x5, 0x0, 0x0, &(0x7f0000000040), 0x80000003) 20:19:47 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) syncfs(r0) [ 823.555714][ T1425] loop5: detected capacity change from 0 to 58 20:19:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000280)='./file0/bus\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f001", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000100)) 20:19:47 executing program 3: r0 = socket$inet(0x10, 0x80003, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000002, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000200030a1f0000080c100800080007400a000000", 0x24}], 0x1}, 0x0) 20:19:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x29, 0x0, 0xc04a01) 20:19:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) r1 = socket(0x10, 0x803, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x45, &(0x7f0000000000), 0x20a154cc) [ 823.660303][ T25] audit: type=1326 audit(1619381987.556:5901): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1440 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 823.692818][ T25] audit: type=1326 audit(1619381987.556:5902): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1440 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 20:19:47 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r1, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000000}) [ 823.754777][ T25] audit: type=1326 audit(1619381987.556:5903): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1440 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=306 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 823.780013][ T25] audit: type=1326 audit(1619381987.616:5904): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1440 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 823.806157][ T25] audit: type=1326 audit(1619381987.616:5905): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1440 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 20:19:48 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000340)) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000180)='./file0\x00', 0x0) 20:19:48 executing program 2: set_mempolicy(0x1, 0x0, 0x0) set_mempolicy(0x6003, &(0x7f0000000080)=0x8, 0xfff) 20:19:48 executing program 5: syz_read_part_table(0xff0f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201a5ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000500000000000000008000ca55aa", 0x40, 0x1c0}]) 20:19:48 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@private1, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x3c}, 0x0, @in=@multicast2, 0x0, 0x0, 0x0, 0x81}}, 0xe8) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 20:19:48 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d509b00000000003f000000000000370000000000000000000000000000003b0000000000000000000000000000380068"], 0x320) 20:19:48 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x2200056, 0x0) r0 = creat(&(0x7f00000000c0)='./file0/file0\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r0, 0x7, &(0x7f00000003c0)={0x1}) unshare(0x40600) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x24011, r0, 0x0) 20:19:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000340)={[{@commit}]}) 20:19:48 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) fstat(r1, &(0x7f00000024c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, r2) ioctl$GIO_UNIMAP(r0, 0x4b67, &(0x7f0000000240)={0x0, 0x0}) 20:19:48 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x2200056, 0x0) r0 = creat(&(0x7f00000000c0)='./file0/file0\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r0, 0x7, &(0x7f00000003c0)={0x1}) unshare(0x40600) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x24011, r0, 0x0) 20:19:48 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000340)) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000180)='./file0\x00', 0x0) [ 824.411731][ T1474] loop0: detected capacity change from 0 to 2224 [ 824.441044][ T1483] loop5: detected capacity change from 0 to 127 20:19:48 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) fstat(r1, &(0x7f00000024c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, r2) ioctl$GIO_UNIMAP(r0, 0x4b67, &(0x7f0000000240)={0x0, 0x0}) 20:19:48 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x2200056, 0x0) r0 = creat(&(0x7f00000000c0)='./file0/file0\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r0, 0x7, &(0x7f00000003c0)={0x1}) unshare(0x40600) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x24011, r0, 0x0) 20:19:48 executing program 3: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') sendfile(r0, r1, 0x0, 0x80000b) 20:19:48 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@private1, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x3c}, 0x0, @in=@multicast2, 0x0, 0x0, 0x0, 0x81}}, 0xe8) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 824.539347][ T1483] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 824.548361][ T1483] loop5: p1 size 11290111 extends beyond EOD, truncated [ 824.558552][ T1483] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 824.567145][ T1515] loop0: detected capacity change from 0 to 2224 [ 824.596694][ T1483] loop5: p5 size 11290111 extends beyond EOD, truncated [ 824.614481][ T1483] loop5: p6 size 1914664839 extends beyond EOD, truncated 20:19:48 executing program 5: syz_read_part_table(0xff0f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201a5ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000500000000000000008000ca55aa", 0x40, 0x1c0}]) 20:19:48 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@private1, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x3c}, 0x0, @in=@multicast2, 0x0, 0x0, 0x0, 0x81}}, 0xe8) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 20:19:48 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x2200056, 0x0) r0 = creat(&(0x7f00000000c0)='./file0/file0\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r0, 0x7, &(0x7f00000003c0)={0x1}) unshare(0x40600) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x24011, r0, 0x0) 20:19:48 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) fstat(r1, &(0x7f00000024c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, r2) ioctl$GIO_UNIMAP(r0, 0x4b67, &(0x7f0000000240)={0x0, 0x0}) 20:19:48 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000340)) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000180)='./file0\x00', 0x0) 20:19:48 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@private1, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x3c}, 0x0, @in=@multicast2, 0x0, 0x0, 0x0, 0x81}}, 0xe8) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 20:19:48 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) fstat(r1, &(0x7f00000024c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, r2) ioctl$GIO_UNIMAP(r0, 0x4b67, &(0x7f0000000240)={0x0, 0x0}) 20:19:48 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r2) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) preadv(r3, &(0x7f0000003500)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) close(r3) socket(0x10, 0x80002, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="240000001e0007041dfffd946f610500070000001f0000000000", 0x1a}], 0x1}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfcfa) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 824.722417][ T1544] loop0: detected capacity change from 0 to 2224 20:19:48 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000340)) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000180)='./file0\x00', 0x0) 20:19:48 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@private1, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x3c}, 0x0, @in=@multicast2, 0x0, 0x0, 0x0, 0x81}}, 0xe8) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 20:19:48 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f00000002c0)=[{{&(0x7f0000000100)={0x2, 0x4e24, @loopback}, 0x10, 0x0}}, {{&(0x7f0000000000), 0x10, 0x0}}], 0x2, 0x0) [ 824.762992][ T1561] loop5: detected capacity change from 0 to 127 [ 824.796458][ T1568] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 824.821461][ T1573] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 824.840271][ T1561] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 824.846562][ T1561] loop5: p1 size 11290111 extends beyond EOD, truncated [ 824.854575][ T1561] loop5: p3 size 1914664839 extends beyond EOD, truncated [ 824.862598][ T1561] loop5: p5 size 11290111 extends beyond EOD, truncated 20:19:48 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 824.870340][ T1561] loop5: p6 size 1914664839 extends beyond EOD, truncated 20:19:48 executing program 5: syz_read_part_table(0xff0f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201a5ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000500000000000000008000ca55aa", 0x40, 0x1c0}]) 20:19:48 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@private1, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x3c}, 0x0, @in=@multicast2, 0x0, 0x0, 0x0, 0x81}}, 0xe8) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 20:19:48 executing program 1: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000019840)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xa, &(0x7f0000000640)="f47970da7c2fd541e065"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:19:48 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 20:19:48 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@private1, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x3c}, 0x0, @in=@multicast2, 0x0, 0x0, 0x0, 0x81}}, 0xe8) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 824.930653][ T1584] loop0: detected capacity change from 0 to 2224 20:19:48 executing program 0: openat$tcp_mem(0xffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x333, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$sock_SIOCINQ(r3, 0x541b, &(0x7f0000000040)) 20:19:48 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 825.039126][ T1619] loop5: detected capacity change from 0 to 127 20:19:49 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 20:19:49 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbee2, 0x8031, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) futex(&(0x7f0000000200)=0x40000001, 0x86, 0x0, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x9) [ 825.114837][ T1619] loop5: p1 p2 < > p3 p4 < p5 p6 > [ 825.120756][ T1619] loop5: p1 size 11290111 extends beyond EOD, truncated [ 825.139785][ T1619] loop5: p3 size 1914664839 extends beyond EOD, truncated 20:19:49 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000180)={0x10, 0x3f4, 0x0, 0x0, 0x0, {0x10, 0x3ea}}, 0x420}}, 0x0) 20:19:49 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xde9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x4008054, &(0x7f0000000340)={0x2, 0x4e22, @loopback}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0xda6, 0x4) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x0) writev(r1, &(0x7f0000000780)=[{&(0x7f0000000100)="dff548771d77ce8786aca76dda6fb054ab8ea73799d7293eda90ba41a2db81fab55b5415692300a8e64bca2f60e1717f85f06a6bbca90f392b04f34940db7ffccc33ed6ea82296de9683c9e360cd1c477304bd8f9bd74d44a4c7d1c7e625a86cd54b72c5745f475a772b84977a6b05381dbe6259bc510f0f70c3e9946a78c7b5a19e97447799d930f9", 0x89}, {&(0x7f00000001c0)="96431fb1cb119741590ad657dc5e5ce3e5fe9f1f639e6a18bc7b6c1d0b424eb306f34cf2429c62c0fdefbae36740a7169721af852826d7f14b6cae8af86507ff78a1dda991aea5952f43e7e0146a3c035f0113d617240e8940c60cdf3400193bbe3a0c0b1eae5799db27b4ee9c13475210defa4dac9d784e0c89135b82b321f8e43d7a5db9ab1bfd319f472a", 0x8c}, {&(0x7f0000001340)="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", 0x1b9}], 0x3) sendto$inet(r1, &(0x7f00000012c0)="1a268a927f1f6588b967480241ba78600453f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) bind(r1, 0x0, 0x0) socketpair(0x1a, 0x1, 0x7e, 0x0) setresuid(0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f00000002c0)='./bus\x00', 0xc6, 0x4, &(0x7f0000000a00)=[{&(0x7f0000000680)="189231d81c9d19aba29016d0194d659bdbffc93ba4480639dcaced4045c453d7b5d4d6c5a8c6f5bf45eee299c79978df56cbcc", 0x33, 0x400}, {&(0x7f00000007c0), 0x0, 0x1}, {&(0x7f0000000300)="761e44668536a92f85", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000000ac0)={[{@dots}], [{@smackfsfloor={'smackfsfloor', 0x3d, '\x00'}}, {@smackfshat={'smackfshat', 0x3d, 'NETMAP\x00'}}, {@hash}, {@uid_eq}, {@uid_lt={'uid<', 0xee00}}]}) 20:19:49 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x4) sendto(r0, 0x0, 0x0, 0xf0ff7f, 0x0, 0x0) [ 825.158718][ T1619] loop5: p5 size 11290111 extends beyond EOD, truncated [ 825.169883][ T1619] loop5: p6 size 1914664839 extends beyond EOD, truncated [ 825.248448][ T1531] print_req_error: 25 callbacks suppressed [ 825.248462][ T1531] blk_update_request: I/O error, dev loop5, sector 25 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 825.252621][ T1611] blk_update_request: I/O error, dev loop5, sector 17 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 825.256258][ T1500] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 825.268057][ T1503] blk_update_request: I/O error, dev loop5, sector 18 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 825.278660][ T1616] blk_update_request: I/O error, dev loop5, sector 17 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 825.289265][ T703] blk_update_request: I/O error, dev loop5, sector 25 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 825.301345][ T1479] blk_update_request: I/O error, dev loop5, sector 18 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 825.311158][ T703] buffer_io_error: 20 callbacks suppressed [ 825.311173][ T703] Buffer I/O error on dev loop5p2, logical block 0, async page read 20:19:49 executing program 5: syz_read_part_table(0xff0f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="0201a5ffffff0a000000ff45ac0080ffffff0500e931190000000000000680ffffffa90000000900000087771f72003007000500000000000000008000ca55aa", 0x40, 0x1c0}]) 20:19:49 executing program 3: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000080)) [ 825.311325][ T703] blk_update_request: I/O error, dev loop5, sector 25 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 825.322326][ T1619] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 825.333502][ T703] Buffer I/O error on dev loop5p2, logical block 0, async page read [ 825.373570][ T703] blk_update_request: I/O error, dev loop5, sector 17 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 825.384570][ T703] Buffer I/O error on dev loop5p3, logical block 4, async page read [ 825.392786][ T703] blk_update_request: I/O error, dev loop5, sector 17 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 825.403838][ T703] Buffer I/O error on dev loop5p6, logical block 4, async page read [ 825.411872][ T703] Buffer I/O error on dev loop5p5, logical block 8, async page read [ 825.419907][ T703] Buffer I/O error on dev loop5p1, logical block 8, async page read [ 825.428117][ T703] Buffer I/O error on dev loop5p3, logical block 5, async page read [ 825.436147][ T703] Buffer I/O error on dev loop5p5, logical block 9, async page read [ 825.444213][ T703] Buffer I/O error on dev loop5p1, logical block 9, async page read [ 825.452234][ T703] Buffer I/O error on dev loop5p6, logical block 5, async page read [ 825.464442][ T1668] loop5: detected capacity change from 0 to 127 [ 825.515570][ T1668] loop_reread_partitions: partition scan of loop5 () failed (rc=-16) 20:19:51 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0x80c5, 0x3ce47c9a4b8a4c9e) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setresuid(0x0, 0xfffe, 0x0) write$9p(r0, &(0x7f0000001400)=';', 0x1) 20:19:51 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x1b) ioctl$KDGKBTYPE(r0, 0x4b33, 0x0) 20:19:51 executing program 5: setresuid(0x0, 0xee01, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan0\x00'}) 20:19:51 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)) mknodat(r0, &(0x7f0000000100)='./file0\x00', 0xc000, 0x0) 20:19:51 executing program 4: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) read(r0, &(0x7f0000000740)=""/384, 0x200008c0) signalfd(r0, &(0x7f00000000c0)={[0xfff]}, 0x8) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:19:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000004c0)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}]}, 0x3c}}, 0x0) 20:19:51 executing program 3: r0 = getpid() sched_setaffinity(r0, 0x8, &(0x7f0000000500)=0x9) r1 = gettid() r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r2, 0xc0305302, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r2, 0xc04c5349, &(0x7f00000003c0)) tkill(r1, 0x7) 20:19:51 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@broadcast, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x23}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in6}}, 0xe4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) 20:19:51 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000000)=0x8, 0x4) 20:19:51 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x88880, &(0x7f00000000c0)={0xa, 0x4e1f, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f00000009c0)="c7cfcaaa22e10542fca5c0195350f15147657e0bfc59d383a47190db88690e6fedc3040ab5809ae02a54cd429cc3338c5afa0c9dce3f91950d1f567f358ac21154159130e88cbb6c43197813b2f23f3e442f80877490b393408142ebcfea6821f543e5ee9e27032e2b75d78f1b79f5a6bb6f0645e267770ef7e8f3a92148091217450ce8581e54223eeb6486205a209bf1fe854d211c03f8c3140fc3979d824082990d119473d20e94f253c9621fac339560ae46cb24b88bf2d01559bb658e343257b90f233b81bc5c398be3bbddb23a1e", 0xffd6, 0xc001, 0x0, 0xffffffffffffff0c) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000040)=0x3, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x24044010, 0x0, 0x0) 20:19:51 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f00000000c0)="240000001e005f0814fffffffffffff8070000000000000000000200080005000d000000", 0x24) 20:19:51 executing program 4: r0 = syz_io_uring_setup(0x87, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_STATX={0x15, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x3) io_uring_enter(r0, 0x560c, 0x0, 0x0, 0x0, 0x0) 20:19:51 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x800000000009031, 0xffffffffffffffff, 0x0) clock_gettime(0xfffffffffffffffc, &(0x7f0000000000)) 20:19:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)) fcntl$notify(r0, 0x402, 0xb1c661d318500c51) r1 = syz_open_procfs(0x0, &(0x7f0000000040)) dup3(r0, r1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)) fcntl$notify(r2, 0x402, 0xb1c661d318500c51) fcntl$notify(r1, 0x402, 0x0) 20:19:52 executing program 1: perf_event_open(&(0x7f0000001540)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@empty, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local, 0x4d3, 0x3c}, 0x0, @in=@multicast2, 0x0, 0x0, 0x2, 0x6, 0x0, 0xfffffffc}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xfe80) 20:19:52 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x0, 0x0) syz_io_uring_setup(0x2de4, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f00004f5000/0x2000)=nil, &(0x7f0000000100), &(0x7f0000001700)) [ 828.071072][ T1743] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 20:19:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000000680)={&(0x7f0000000140)={0x2, 0x4e21, @local}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x1c, 0x15, 0x3, 0x0, [{@multicast2}, {@loopback}, {@broadcast}]}]}}}], 0x30}, 0x0) 20:19:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$SOCK_DESTROY(r0, &(0x7f00000022c0)={0x0, 0x0, &(0x7f0000002300)={&(0x7f0000000080)={0x20, 0x11, 0x11, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x9, 0x1, "a3617eb1e9"}]}, 0x20}}, 0x0) 20:19:52 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f00000006c0)=@acquire={0x214, 0x17, 0x1, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', {@in=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {{@in=@loopback, @in6=@empty}}}, [@sa={0xe4, 0x6, {{@in=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@mcast1}, @in=@empty}}, @XFRMA_SET_MARK_MASK={0x8}]}, 0x214}}, 0x0) 20:19:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000000680)={&(0x7f0000000140)={0x2, 0x4e21, @local}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x1c, 0x15, 0x3, 0x0, [{@multicast2}, {@loopback}, {@broadcast}]}]}}}], 0x30}, 0x0) 20:19:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl(r2, 0x80009374, 0x0) 20:19:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000000680)={&(0x7f0000000140)={0x2, 0x4e21, @local}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x1c, 0x15, 0x3, 0x0, [{@multicast2}, {@loopback}, {@broadcast}]}]}}}], 0x30}, 0x0) 20:19:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x2de5, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000400000/0xc00000)=nil, &(0x7f0000000700)=0x0, &(0x7f0000000a00)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x0, 0x4}, 0x40) syz_io_uring_submit(r2, r3, &(0x7f0000000040)=@IORING_OP_CLOSE, 0x0) io_uring_enter(r1, 0x2c16, 0x0, 0x0, 0x0, 0x0) 20:19:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x38, 0x0, 0x0) 20:19:52 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000380)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_elf64(r1, &(0x7f0000001700)=ANY=[], 0xfd14) fallocate(r0, 0x100000003, 0xff0f, 0x28120001) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'io'}]}, 0x4) 20:19:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000000680)={&(0x7f0000000140)={0x2, 0x4e21, @local}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x1c, 0x15, 0x3, 0x0, [{@multicast2}, {@loopback}, {@broadcast}]}]}}}], 0x30}, 0x0) 20:19:52 executing program 1: perf_event_open(&(0x7f0000001540)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@empty, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local, 0x4d3, 0x3c}, 0x0, @in=@multicast2, 0x0, 0x0, 0x2, 0x6, 0x0, 0xfffffffc}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xfe80) 20:19:52 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/241, 0xf1) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000180)={0x1d3}) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r1, 0xc0105303, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r0, 0x1004000000016) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 20:19:52 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x106}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:19:52 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/tty/drivers\x00', 0x0, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) sendfile(r1, r0, &(0x7f0000000300)=0xd7, 0x4) 20:19:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) rmdir(&(0x7f0000000200)='./file0\x00') mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) 20:19:52 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000380)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_elf64(r1, &(0x7f0000001700)=ANY=[], 0xfd14) fallocate(r0, 0x100000003, 0xff0f, 0x28120001) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'io'}]}, 0x4) 20:19:52 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000380)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_elf64(r1, &(0x7f0000001700)=ANY=[], 0xfd14) fallocate(r0, 0x100000003, 0xff0f, 0x28120001) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'io'}]}, 0x4) 20:19:52 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/tty/drivers\x00', 0x0, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) sendfile(r1, r0, &(0x7f0000000300)=0xd7, 0x4) 20:19:52 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x400002200006007, 0x1) unshare(0x600) r0 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x1261, 0x0) 20:19:52 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="82bb217e00e3a45c000000000000006f57bc49e397ad702deca4322fbe811046c19041c316de41fb1f7531c53abb4f2a8ce9003ee3e0b1b0b5133b07e999aa1cc669f0ca8afcbbfc5b6ad84462ae37c9962387110a79d824054c029e7049257931cef4bd8d46711caa86fb122887b70ccbf7b7caebeb896b04000000c85fcb3961f1d12791c364bcee9f80a5b2e228b11bebbf997c8e6a6723bdd1b6005f4fa82689da02daaef3d7e2ccaa7d37919d000000c76427c554dad01aac9eef731226ffc8e2d059849f76a560d675f3888cf779766509a54d075ebed1b1a86097e3301c91d1321c99207e1a547cd35382bbba312bf2c5a526c721a3790311f48c27df03ece66ee428", 0x106}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:19:52 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/tty/drivers\x00', 0x0, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) sendfile(r1, r0, &(0x7f0000000300)=0xd7, 0x4) 20:19:52 executing program 4: clone(0x26100d00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_netdev_private(r0, 0x8994, &(0x7f0000000000)) 20:19:52 executing program 1: perf_event_open(&(0x7f0000001540)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@empty, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local, 0x4d3, 0x3c}, 0x0, @in=@multicast2, 0x0, 0x0, 0x2, 0x6, 0x0, 0xfffffffc}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xfe80) 20:19:53 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) fremovexattr(r0, &(0x7f0000000080)=@known='system.sockprotoname\x00') 20:19:53 executing program 4: symlink(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000280)='./file0\x00') acct(&(0x7f0000000000)='./file0/file0\x00') 20:19:53 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000380)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_elf64(r1, &(0x7f0000001700)=ANY=[], 0xfd14) fallocate(r0, 0x100000003, 0xff0f, 0x28120001) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'io'}]}, 0x4) 20:19:53 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/tty/drivers\x00', 0x0, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) sendfile(r1, r0, &(0x7f0000000300)=0xd7, 0x4) 20:19:53 executing program 1: perf_event_open(&(0x7f0000001540)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@empty, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local, 0x4d3, 0x3c}, 0x0, @in=@multicast2, 0x0, 0x0, 0x2, 0x6, 0x0, 0xfffffffc}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xfe80) 20:19:53 executing program 2: prctl$PR_SET_MM_MAP(0x21, 0xe, &(0x7f0000000100)={&(0x7f0000515000/0x3000)=nil, &(0x7f0000515000/0x4000)=nil, &(0x7f0000515000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000516000/0x4000)=nil, &(0x7f0000519000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000515000/0x2000)=nil, &(0x7f0000519000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000518000/0x4000)=nil, 0x0}, 0x68) 20:19:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="390000006400034700bb65e1c3e4ffff06000000010000004500000025000000190013c04800000007fd17e5ffff0606040000000000000000", 0x39}], 0x1) 20:19:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='sockfs\x00', 0x0, 0x0) [ 829.578492][ T1912] netlink: 21 bytes leftover after parsing attributes in process `syz-executor.5'. 20:19:55 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x106}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:19:55 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./bus\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='./file1\x00', &(0x7f0000000200)='./bus\x00') 20:19:55 executing program 2: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000400)=ANY=[], 0x208e24b) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff000}], 0x1}, 0x3f00) 20:19:55 executing program 5: clone(0x0, &(0x7f0000000340), 0x0, 0x0, 0x0) r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) fcntl$setownex(r1, 0xf, &(0x7f0000704000)={0x2, r0}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000040)=0x0) wait4(r3, 0x0, 0x80000000, 0x0) 20:19:55 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 20:19:55 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) fdatasync(r0) 20:19:55 executing program 4: r0 = syz_io_uring_setup(0x159f, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000002000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000400)) close(r0) syz_io_uring_setup(0x2de5, &(0x7f0000000200), &(0x7f0000002000/0x2000)=nil, &(0x7f00009b3000/0x3000)=nil, 0x0, 0x0) r1 = epoll_create1(0x0) epoll_pwait(r1, &(0x7f0000000180)=[{}], 0x1, 0xfffff37a, 0x0, 0x0) syz_io_uring_setup(0x15a7, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) 20:19:55 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0x0, 0x5}}, 0x1c) [ 831.711630][ T25] kauditd_printk_skb: 6 callbacks suppressed [ 831.711642][ T25] audit: type=1326 audit(1619381995.606:5912): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1931 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 20:19:55 executing program 1: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x4d00, 0x0) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) io_setup(0x202, &(0x7f0000000200)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x15, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x1a00001a}]) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r4, 0x0) io_setup(0x3ff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) llistxattr(&(0x7f0000000080)='./bus\x00', &(0x7f0000000280)=""/207, 0xcf) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) dup3(r1, r0, 0x0) io_setup(0x40000000008, &(0x7f0000000240)=0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r6, &(0x7f0000000200)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) io_submit(r5, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x4, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) [ 831.750313][ T25] audit: type=1326 audit(1619381995.626:5913): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1931 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=257 compat=0 ip=0x4665f9 code=0x7ffc0000 20:19:55 executing program 0: r0 = epoll_create1(0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000340), 0xa2142) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)={0x201c}) write$sndseq(r1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f00000000c0)) epoll_wait(r0, &(0x7f0000000100)=[{}], 0x1, 0x0) 20:19:55 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x80045440, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "15056a074b789a2f5fd1aae6e2d76f9084746a"}) [ 831.809074][ T25] audit: type=1326 audit(1619381995.626:5914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1931 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 831.879392][ T25] audit: type=1326 audit(1619381995.626:5915): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1931 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=75 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 831.904213][ T25] audit: type=1326 audit(1619381995.626:5916): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1931 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 20:19:55 executing program 5: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000280)={0x6}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000001a00010000000000000000000aa0"], 0x1c}}, 0x0) [ 831.944325][ T25] audit: type=1326 audit(1619381995.626:5917): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1931 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=157 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 832.034189][ T25] audit: type=1326 audit(1619381995.666:5918): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1931 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 832.101056][ T25] audit: type=1326 audit(1619381995.666:5919): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1931 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=257 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 832.152858][ T25] audit: type=1326 audit(1619381995.676:5920): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1931 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 832.240753][ T25] audit: type=1326 audit(1619381995.676:5921): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=1931 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 20:19:58 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x106}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:19:58 executing program 0: r0 = socket(0x2, 0xa, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bind(r0, 0x0, 0x0) 20:19:58 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = socket$unix(0x1, 0x1, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) bind$unix(r2, &(0x7f0000003000)=@abs={0x1}, 0x6e) listen(r2, 0x0) shutdown(r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) shutdown(r2, 0x1) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 20:19:58 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:19:58 executing program 1: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x4d00, 0x0) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) io_setup(0x202, &(0x7f0000000200)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x15, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x1a00001a}]) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r4, 0x0) io_setup(0x3ff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) llistxattr(&(0x7f0000000080)='./bus\x00', &(0x7f0000000280)=""/207, 0xcf) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) dup3(r1, r0, 0x0) io_setup(0x40000000008, &(0x7f0000000240)=0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r6, &(0x7f0000000200)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) io_submit(r5, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x4, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 20:19:58 executing program 2: mlockall(0x1) mprotect(&(0x7f0000621000/0x800000)=nil, 0x800000, 0x0) mbind(&(0x7f00003b5000/0x800000)=nil, 0x801100, 0x0, 0x0, 0x0, 0x2) 20:19:58 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0x1f, 0x6) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x35}, {0x6}]}) 20:19:58 executing program 5: ioctl$CHAR_RAW_BSZSET(0xffffffffffffffff, 0x40081271, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) finit_module(r0, &(0x7f0000000180)='/dev/vcsu#\x00', 0x2) syz_open_dev$vcsu(&(0x7f0000000140), 0x0, 0x40200) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) fchown(r1, 0xee01, 0x0) pipe(&(0x7f00000000c0)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r2, 0x8982, &(0x7f00000001c0)={0x7, 'veth0_vlan\x00', {}, 0x80}) write(0xffffffffffffffff, &(0x7f00000002c0)="333cff53ace17f130e52c1becec0873defbbe42a38a2f685a435c22600912afba148a4cadde31a899567f363afbc353a41ad533dde023bec75955e37be1bfd8c089bcf59adfd2d610cd1ff126a4f0f61e17d1000e6d4a4f2abac9f09bd2c118cd7d368f5c538b7b2fc4e9a5dd53732e57d857435fe506fd7adc710592c143ad023f0f7f9762f67ddefdfe4bfeb0566867f7265d1ddc0a600d3be783603ea3d3a3744a63a7dd8e060a4e497892b07943f654e96d5053669f1ce86ecf66d9e9be51190083edc90e9001196d64fdb10caecb3857b0635e0b7fad37f5303359cca647f924b6781a51dc167f7021c4b22488c6037165f", 0xf4) fcntl$setpipe(r3, 0x407, 0x8001) finit_module(0xffffffffffffffff, &(0x7f0000000600)='/dev/loop-control\x00', 0x0) chdir(0x0) 20:19:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae897094e71b0fa1f147a8378f3657cdcf86db93aa6ed9cbc6a9e00b9e626aa995d690c8a2372286677850ab8e9b75839f0715a567dafe306f0818fd861ff11495d58553d8c11c606e13da9b8d26a566833fe1f9c73899301d879b51848164e7b988889c753ba801e8", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x1e) ptrace$cont(0x18, r1, 0x0, 0x0) syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f00006d8000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000040), 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 834.743736][ T1991] Process accounting paused 20:19:58 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f67fe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000f67fe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) 20:19:58 executing program 0: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r1 = openat(0xffffffffffffffff, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) keyctl$clear(0x7, r0) [ 834.867812][ T2005] loop5: detected capacity change from 0 to 4096 [ 834.905667][ T2005] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 20:19:58 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) pipe(&(0x7f0000000240)) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open_tree(r1, &(0x7f0000000080)='./file0\x00', 0x80000) sendmsg$nl_xfrm(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=@delsa={0xac, 0x11, 0x100, 0x70bd28, 0x25dfdbfc, {@in6=@ipv4={'\x00', '\xff\xff', @empty}, 0x4d3, 0x2, 0x32}, [@replay_esn_val={0x3c, 0x17, {0x8, 0x70bd28, 0x70bd25, 0x70bd2d, 0x70bd2a, 0xbda, [0x9, 0x9c39, 0x6, 0x5, 0x4ca, 0x2a7, 0x0, 0x5271]}}, @encap={0x1c, 0x4, {0x2, 0x4e21, 0x4e22, @in=@loopback}}, @tfcpad={0x8, 0x16, 0x800}, @lifetime_val={0x24, 0x9, {0x1, 0x2, 0x4, 0x6}}]}, 0xac}, 0x1, 0x0, 0x0, 0x4800}, 0x4008054) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in=@dev}, {@in6=@mcast2, 0x0, 0x32}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) 20:20:01 executing program 1: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x4d00, 0x0) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) io_setup(0x202, &(0x7f0000000200)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x15, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x1a00001a}]) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r4, 0x0) io_setup(0x3ff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) llistxattr(&(0x7f0000000080)='./bus\x00', &(0x7f0000000280)=""/207, 0xcf) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) dup3(r1, r0, 0x0) io_setup(0x40000000008, &(0x7f0000000240)=0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r6, &(0x7f0000000200)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) io_submit(r5, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x4, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 20:20:01 executing program 0: set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x7) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='pagemap\x00') pread64(r0, &(0x7f0000000040)=""/40, 0x28, 0x0) 20:20:01 executing program 5: ioctl$CHAR_RAW_BSZSET(0xffffffffffffffff, 0x40081271, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) finit_module(r0, &(0x7f0000000180)='/dev/vcsu#\x00', 0x2) syz_open_dev$vcsu(&(0x7f0000000140), 0x0, 0x40200) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) fchown(r1, 0xee01, 0x0) pipe(&(0x7f00000000c0)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r2, 0x8982, &(0x7f00000001c0)={0x7, 'veth0_vlan\x00', {}, 0x80}) write(0xffffffffffffffff, &(0x7f00000002c0)="333cff53ace17f130e52c1becec0873defbbe42a38a2f685a435c22600912afba148a4cadde31a899567f363afbc353a41ad533dde023bec75955e37be1bfd8c089bcf59adfd2d610cd1ff126a4f0f61e17d1000e6d4a4f2abac9f09bd2c118cd7d368f5c538b7b2fc4e9a5dd53732e57d857435fe506fd7adc710592c143ad023f0f7f9762f67ddefdfe4bfeb0566867f7265d1ddc0a600d3be783603ea3d3a3744a63a7dd8e060a4e497892b07943f654e96d5053669f1ce86ecf66d9e9be51190083edc90e9001196d64fdb10caecb3857b0635e0b7fad37f5303359cca647f924b6781a51dc167f7021c4b22488c6037165f", 0xf4) fcntl$setpipe(r3, 0x407, 0x8001) finit_module(0xffffffffffffffff, &(0x7f0000000600)='/dev/loop-control\x00', 0x0) chdir(0x0) 20:20:01 executing program 4: ioctl$CHAR_RAW_BSZSET(0xffffffffffffffff, 0x40081271, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) finit_module(r0, &(0x7f0000000180)='/dev/vcsu#\x00', 0x2) syz_open_dev$vcsu(&(0x7f0000000140), 0x0, 0x40200) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) fchown(r1, 0xee01, 0x0) pipe(&(0x7f00000000c0)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r2, 0x8982, &(0x7f00000001c0)={0x7, 'veth0_vlan\x00', {}, 0x80}) write(0xffffffffffffffff, &(0x7f00000002c0)="333cff53ace17f130e52c1becec0873defbbe42a38a2f685a435c22600912afba148a4cadde31a899567f363afbc353a41ad533dde023bec75955e37be1bfd8c089bcf59adfd2d610cd1ff126a4f0f61e17d1000e6d4a4f2abac9f09bd2c118cd7d368f5c538b7b2fc4e9a5dd53732e57d857435fe506fd7adc710592c143ad023f0f7f9762f67ddefdfe4bfeb0566867f7265d1ddc0a600d3be783603ea3d3a3744a63a7dd8e060a4e497892b07943f654e96d5053669f1ce86ecf66d9e9be51190083edc90e9001196d64fdb10caecb3857b0635e0b7fad37f5303359cca647f924b6781a51dc167f7021c4b22488c6037165f", 0xf4) fcntl$setpipe(r3, 0x407, 0x8001) finit_module(0xffffffffffffffff, &(0x7f0000000600)='/dev/loop-control\x00', 0x0) chdir(0x0) 20:20:01 executing program 2: ioctl$CHAR_RAW_BSZSET(0xffffffffffffffff, 0x40081271, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) finit_module(r0, &(0x7f0000000180)='/dev/vcsu#\x00', 0x2) syz_open_dev$vcsu(&(0x7f0000000140), 0x0, 0x40200) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) fchown(r1, 0xee01, 0x0) pipe(&(0x7f00000000c0)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r2, 0x8982, &(0x7f00000001c0)={0x7, 'veth0_vlan\x00', {}, 0x80}) write(0xffffffffffffffff, &(0x7f00000002c0)="333cff53ace17f130e52c1becec0873defbbe42a38a2f685a435c22600912afba148a4cadde31a899567f363afbc353a41ad533dde023bec75955e37be1bfd8c089bcf59adfd2d610cd1ff126a4f0f61e17d1000e6d4a4f2abac9f09bd2c118cd7d368f5c538b7b2fc4e9a5dd53732e57d857435fe506fd7adc710592c143ad023f0f7f9762f67ddefdfe4bfeb0566867f7265d1ddc0a600d3be783603ea3d3a3744a63a7dd8e060a4e497892b07943f654e96d5053669f1ce86ecf66d9e9be51190083edc90e9001196d64fdb10caecb3857b0635e0b7fad37f5303359cca647f924b6781a51dc167f7021c4b22488c6037165f", 0xf4) fcntl$setpipe(r3, 0x407, 0x8001) finit_module(0xffffffffffffffff, &(0x7f0000000600)='/dev/loop-control\x00', 0x0) chdir(0x0) 20:20:01 executing program 3: r0 = memfd_create(&(0x7f0000000280)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x12) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5, 0x12, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xa5ff) rename(&(0x7f0000000140)='./file1\x00', 0x0) 20:20:01 executing program 0: rseq(&(0x7f00000000c0), 0x20, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000016c0)) 20:20:01 executing program 0: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000500)={&(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_retopts={{0x10}}], 0x10}, 0x0) [ 837.868225][ T2061] loop4: detected capacity change from 0 to 4096 [ 837.884349][ T2062] loop5: detected capacity change from 0 to 4096 20:20:01 executing program 2: ioctl$CHAR_RAW_BSZSET(0xffffffffffffffff, 0x40081271, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) finit_module(r0, &(0x7f0000000180)='/dev/vcsu#\x00', 0x2) syz_open_dev$vcsu(&(0x7f0000000140), 0x0, 0x40200) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) fchown(r1, 0xee01, 0x0) pipe(&(0x7f00000000c0)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r2, 0x8982, &(0x7f00000001c0)={0x7, 'veth0_vlan\x00', {}, 0x80}) write(0xffffffffffffffff, &(0x7f00000002c0)="333cff53ace17f130e52c1becec0873defbbe42a38a2f685a435c22600912afba148a4cadde31a899567f363afbc353a41ad533dde023bec75955e37be1bfd8c089bcf59adfd2d610cd1ff126a4f0f61e17d1000e6d4a4f2abac9f09bd2c118cd7d368f5c538b7b2fc4e9a5dd53732e57d857435fe506fd7adc710592c143ad023f0f7f9762f67ddefdfe4bfeb0566867f7265d1ddc0a600d3be783603ea3d3a3744a63a7dd8e060a4e497892b07943f654e96d5053669f1ce86ecf66d9e9be51190083edc90e9001196d64fdb10caecb3857b0635e0b7fad37f5303359cca647f924b6781a51dc167f7021c4b22488c6037165f", 0xf4) fcntl$setpipe(r3, 0x407, 0x8001) finit_module(0xffffffffffffffff, &(0x7f0000000600)='/dev/loop-control\x00', 0x0) chdir(0x0) [ 837.945376][ T2061] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 20:20:01 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x109c01) write$sndseq(r0, &(0x7f0000000040)=[{0xff, 0x0, 0x0, 0x0, @tick, {}, {}, @queue}, {0x5, 0x0, 0x0, 0xfd, @tick, {}, {}, @ext={0x0, 0x0}}], 0x38) 20:20:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400009) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x50, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) [ 838.000769][ T2062] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 20:20:01 executing program 4: ioctl$CHAR_RAW_BSZSET(0xffffffffffffffff, 0x40081271, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) finit_module(r0, &(0x7f0000000180)='/dev/vcsu#\x00', 0x2) syz_open_dev$vcsu(&(0x7f0000000140), 0x0, 0x40200) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) fchown(r1, 0xee01, 0x0) pipe(&(0x7f00000000c0)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r2, 0x8982, &(0x7f00000001c0)={0x7, 'veth0_vlan\x00', {}, 0x80}) write(0xffffffffffffffff, &(0x7f00000002c0)="333cff53ace17f130e52c1becec0873defbbe42a38a2f685a435c22600912afba148a4cadde31a899567f363afbc353a41ad533dde023bec75955e37be1bfd8c089bcf59adfd2d610cd1ff126a4f0f61e17d1000e6d4a4f2abac9f09bd2c118cd7d368f5c538b7b2fc4e9a5dd53732e57d857435fe506fd7adc710592c143ad023f0f7f9762f67ddefdfe4bfeb0566867f7265d1ddc0a600d3be783603ea3d3a3744a63a7dd8e060a4e497892b07943f654e96d5053669f1ce86ecf66d9e9be51190083edc90e9001196d64fdb10caecb3857b0635e0b7fad37f5303359cca647f924b6781a51dc167f7021c4b22488c6037165f", 0xf4) fcntl$setpipe(r3, 0x407, 0x8001) finit_module(0xffffffffffffffff, &(0x7f0000000600)='/dev/loop-control\x00', 0x0) chdir(0x0) 20:20:02 executing program 1: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x4d00, 0x0) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) io_setup(0x202, &(0x7f0000000200)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x15, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x1a00001a}]) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r4, 0x0) io_setup(0x3ff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) llistxattr(&(0x7f0000000080)='./bus\x00', &(0x7f0000000280)=""/207, 0xcf) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) dup3(r1, r0, 0x0) io_setup(0x40000000008, &(0x7f0000000240)=0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r6, &(0x7f0000000200)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) io_submit(r5, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x4, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 20:20:02 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b00)={[{@size={'size', 0x3d, [0x47]}}]}) 20:20:02 executing program 5: ioctl$CHAR_RAW_BSZSET(0xffffffffffffffff, 0x40081271, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) finit_module(r0, &(0x7f0000000180)='/dev/vcsu#\x00', 0x2) syz_open_dev$vcsu(&(0x7f0000000140), 0x0, 0x40200) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) fchown(r1, 0xee01, 0x0) pipe(&(0x7f00000000c0)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r2, 0x8982, &(0x7f00000001c0)={0x7, 'veth0_vlan\x00', {}, 0x80}) write(0xffffffffffffffff, &(0x7f00000002c0)="333cff53ace17f130e52c1becec0873defbbe42a38a2f685a435c22600912afba148a4cadde31a899567f363afbc353a41ad533dde023bec75955e37be1bfd8c089bcf59adfd2d610cd1ff126a4f0f61e17d1000e6d4a4f2abac9f09bd2c118cd7d368f5c538b7b2fc4e9a5dd53732e57d857435fe506fd7adc710592c143ad023f0f7f9762f67ddefdfe4bfeb0566867f7265d1ddc0a600d3be783603ea3d3a3744a63a7dd8e060a4e497892b07943f654e96d5053669f1ce86ecf66d9e9be51190083edc90e9001196d64fdb10caecb3857b0635e0b7fad37f5303359cca647f924b6781a51dc167f7021c4b22488c6037165f", 0xf4) fcntl$setpipe(r3, 0x407, 0x8001) finit_module(0xffffffffffffffff, &(0x7f0000000600)='/dev/loop-control\x00', 0x0) chdir(0x0) 20:20:02 executing program 2: ioctl$CHAR_RAW_BSZSET(0xffffffffffffffff, 0x40081271, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) finit_module(r0, &(0x7f0000000180)='/dev/vcsu#\x00', 0x2) syz_open_dev$vcsu(&(0x7f0000000140), 0x0, 0x40200) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) fchown(r1, 0xee01, 0x0) pipe(&(0x7f00000000c0)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r2, 0x8982, &(0x7f00000001c0)={0x7, 'veth0_vlan\x00', {}, 0x80}) write(0xffffffffffffffff, &(0x7f00000002c0)="333cff53ace17f130e52c1becec0873defbbe42a38a2f685a435c22600912afba148a4cadde31a899567f363afbc353a41ad533dde023bec75955e37be1bfd8c089bcf59adfd2d610cd1ff126a4f0f61e17d1000e6d4a4f2abac9f09bd2c118cd7d368f5c538b7b2fc4e9a5dd53732e57d857435fe506fd7adc710592c143ad023f0f7f9762f67ddefdfe4bfeb0566867f7265d1ddc0a600d3be783603ea3d3a3744a63a7dd8e060a4e497892b07943f654e96d5053669f1ce86ecf66d9e9be51190083edc90e9001196d64fdb10caecb3857b0635e0b7fad37f5303359cca647f924b6781a51dc167f7021c4b22488c6037165f", 0xf4) fcntl$setpipe(r3, 0x407, 0x8001) finit_module(0xffffffffffffffff, &(0x7f0000000600)='/dev/loop-control\x00', 0x0) chdir(0x0) 20:20:02 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400009) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x50, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) 20:20:02 executing program 4: ioctl$CHAR_RAW_BSZSET(0xffffffffffffffff, 0x40081271, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) finit_module(r0, &(0x7f0000000180)='/dev/vcsu#\x00', 0x2) syz_open_dev$vcsu(&(0x7f0000000140), 0x0, 0x40200) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) fchown(r1, 0xee01, 0x0) pipe(&(0x7f00000000c0)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r2, 0x8982, &(0x7f00000001c0)={0x7, 'veth0_vlan\x00', {}, 0x80}) write(0xffffffffffffffff, &(0x7f00000002c0)="333cff53ace17f130e52c1becec0873defbbe42a38a2f685a435c22600912afba148a4cadde31a899567f363afbc353a41ad533dde023bec75955e37be1bfd8c089bcf59adfd2d610cd1ff126a4f0f61e17d1000e6d4a4f2abac9f09bd2c118cd7d368f5c538b7b2fc4e9a5dd53732e57d857435fe506fd7adc710592c143ad023f0f7f9762f67ddefdfe4bfeb0566867f7265d1ddc0a600d3be783603ea3d3a3744a63a7dd8e060a4e497892b07943f654e96d5053669f1ce86ecf66d9e9be51190083edc90e9001196d64fdb10caecb3857b0635e0b7fad37f5303359cca647f924b6781a51dc167f7021c4b22488c6037165f", 0xf4) fcntl$setpipe(r3, 0x407, 0x8001) finit_module(0xffffffffffffffff, &(0x7f0000000600)='/dev/loop-control\x00', 0x0) chdir(0x0) [ 838.281488][ T2123] loop4: detected capacity change from 0 to 4096 [ 838.297533][ T2123] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 20:20:02 executing program 0: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x14b042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000001c0)) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000140)={0x0, r0}) 20:20:02 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400009) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x50, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) 20:20:02 executing program 0: r0 = memfd_create(&(0x7f0000000780)='\x02', 0x0) write(r0, &(0x7f00000000c0)='i', 0x1) pipe(0x0) socket$nl_netfilter(0x10, 0x3, 0xc) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) clone(0x2000000000200500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x20000080000000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00') r2 = gettid() rt_sigqueueinfo(r2, 0x3b, &(0x7f0000000040)) getdents64(r1, 0x0, 0x0) 20:20:02 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400009) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x50, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) 20:20:02 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) fstat(r1, &(0x7f00000024c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, r2) ioctl$GIO_UNIMAP(r0, 0x4b44, &(0x7f0000000240)={0x0, 0x0}) [ 838.522288][ T2147] debugfs: Directory 'loop0' with parent 'block' already present! [ 838.553636][ T2155] loop5: detected capacity change from 0 to 4096 [ 838.564910][ T2152] loop4: detected capacity change from 0 to 4096 20:20:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) keyctl$set_reqkey_keyring(0xd, 0x0) [ 838.598039][ T2155] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 838.642738][ T2152] EXT4-fs (loop4): Unrecognized mount option "" or missing value 20:20:02 executing program 4: r0 = getpgid(0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x2, 0xff, 0x5, 0x4, 0x0, 0x180, 0x39008, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x81, 0xffff, 0x9, 0x26, 0x10000, 0x7ba6}, r0, 0xb, r1, 0x19) r3 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r3, &(0x7f0000004c40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write(r5, &(0x7f0000000340), 0x41395527) r6 = fspick(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x1) preadv(r6, &(0x7f0000001780)=[{&(0x7f00000005c0)=""/78, 0x4e}, {&(0x7f0000000640)=""/39, 0x27}, {&(0x7f0000000680)=""/122, 0x7a}], 0x3, 0x5, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x90000, 0x189) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x2, 0x0, 0x0, 0x6}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r7, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 20:20:02 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000340)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380000, @empty}, 0x1c) 20:20:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae897094e71b0fa1f147a8378f3657cdcf86db93aa6ed9cbc6a9e00b9e626aa995d690c8a2372286677850ab8e9b75839f0715a567dafe306f0818fd861ff11495d58553d8c11c606e13da9b8d26a566833fe1f9c73899301d879b51848164e7b988889c753ba801e880c49a91e7b9486916ea7a348947d85d038e1ac9522c11a448eb497c", 0x89}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x1e) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 20:20:02 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001640)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2fc903c2b54706c05e4cbb157391ac736adf5c5575cefc1172a9a2e2875107608f9143f299d8e3f78f4bf076484885fd4089cb084607435b77c7f44cf0783279a494c8e4eba955b16e77f57966d4ba7560f29500352543b498fccba20bcae2b6f577b36b79f72f77e153f55e4fa6ad43af0d450a8f2c60baabf84ab4350874b05f4635c7449bac4383622ae4da09326e51bc3130b44a9df8704c9656b60912ff6bdb6fb1f138ece7e020fc235330fb8f4e6ad5d", 0xee}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 20:20:02 executing program 5: ioctl$CHAR_RAW_BSZSET(0xffffffffffffffff, 0x40081271, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) finit_module(r0, &(0x7f0000000180)='/dev/vcsu#\x00', 0x2) syz_open_dev$vcsu(&(0x7f0000000140), 0x0, 0x40200) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) fchown(r1, 0xee01, 0x0) pipe(&(0x7f00000000c0)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r2, 0x8982, &(0x7f00000001c0)={0x7, 'veth0_vlan\x00', {}, 0x80}) write(0xffffffffffffffff, &(0x7f00000002c0)="333cff53ace17f130e52c1becec0873defbbe42a38a2f685a435c22600912afba148a4cadde31a899567f363afbc353a41ad533dde023bec75955e37be1bfd8c089bcf59adfd2d610cd1ff126a4f0f61e17d1000e6d4a4f2abac9f09bd2c118cd7d368f5c538b7b2fc4e9a5dd53732e57d857435fe506fd7adc710592c143ad023f0f7f9762f67ddefdfe4bfeb0566867f7265d1ddc0a600d3be783603ea3d3a3744a63a7dd8e060a4e497892b07943f654e96d5053669f1ce86ecf66d9e9be51190083edc90e9001196d64fdb10caecb3857b0635e0b7fad37f5303359cca647f924b6781a51dc167f7021c4b22488c6037165f", 0xf4) fcntl$setpipe(r3, 0x407, 0x8001) finit_module(0xffffffffffffffff, &(0x7f0000000600)='/dev/loop-control\x00', 0x0) chdir(0x0) 20:20:02 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x1, 0x804b0}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x32c33dcab5f5a1b9, &(0x7f0000000740), 0x0, 0x0) 20:20:02 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee00) preadv(r0, &(0x7f0000000280)=[{0x0, 0xfffffeb5}], 0x1, 0x0, 0x0) flistxattr(r0, &(0x7f0000000040)=""/76, 0x4c) 20:20:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x6, 0x0, 0xc04a01) 20:20:03 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6600000000000001601b05b1f147a8378f364602812c66d3f335066ee1d05ecd0363e5d749dd9ab4fc194174b8e7aeee3fec208876a2f2a8384f05553e9ae7a631aa9999d0a961bfde5800c0f5989b496fc2f54a05ac20a06f", 0x59}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 20:20:03 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001640)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2fc903c2b54706c05e4cbb157391ac736adf5c5575cefc1172a9a2e2875107608f9143f299d8e3f78f4bf076484885fd4089cb084607435b77c7f44cf0783279a494c8e4eba955b16e77f57966d4ba7560f29500352543b498fccba20bcae2b6f577b36b79f72f77e153f55e4fa6ad43af0d450a8f2c60baabf84ab4350874b05f4635c7449bac4383622ae4da09326e51bc3130b44a9df8704c9656b60912ff6bdb6fb1f138ece7e020fc235330fb8f4e6ad5d", 0xee}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 20:20:03 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0xfffffffffffffe3b, &(0x7f0000000000)=[{&(0x7f00000000c0)="7fff000019007f5f14fe01b2a4a290930a0604dffffffe010405040504001200350006080102000019000b40060c1001020022dc1338d54404139b84136ef75afb83de4411000500", 0xff72}, {&(0x7f0000000040)="73005000d612110000ff0ea988", 0xd}], 0x2}, 0x0) [ 839.125016][ T2218] loop5: detected capacity change from 0 to 4096 [ 839.135859][ T2247] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 839.156897][ T2247] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 20:20:03 executing program 5: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)) [ 839.190493][ T2218] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 839.241909][ T2261] netlink: 65319 bytes leftover after parsing attributes in process `syz-executor.3'. 20:20:03 executing program 4: r0 = getpgid(0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x2, 0xff, 0x5, 0x4, 0x0, 0x180, 0x39008, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x81, 0xffff, 0x9, 0x26, 0x10000, 0x7ba6}, r0, 0xb, r1, 0x19) r3 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r3, &(0x7f0000004c40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write(r5, &(0x7f0000000340), 0x41395527) r6 = fspick(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x1) preadv(r6, &(0x7f0000001780)=[{&(0x7f00000005c0)=""/78, 0x4e}, {&(0x7f0000000640)=""/39, 0x27}, {&(0x7f0000000680)=""/122, 0x7a}], 0x3, 0x5, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x90000, 0x189) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x2, 0x0, 0x0, 0x6}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r7, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 20:20:03 executing program 0: r0 = fsopen(&(0x7f0000000140)='nfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x4, &(0x7f00000002c0)='source', &(0x7f0000000300)='\x00', 0x0) 20:20:03 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7a}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x122, &(0x7f0000000180)="c4c691019919da078a0098d1e0a593b040f762910000000000000022addee07bee0d6333b5cacd893169b618322ff6602022511253508b5a4496728c2a46e1bc340e29b9ab9b7136283e350808ffdb2dbea7410b363de4fb357baa16dacdcfac32957dc8bb44e203c4b1bc83d8c0b29f75bcf2e3482945fef116371f8c8c0c4db583a208718e3cccd9dd3bf7a0b9daf36c29d2d3e73af34a91a4a8844ee497e66452419a30843900bb4ff9a7df5ee0fdbb6e3a288594f90399ef71d1fa7b32513f49d5135aea235f800059995d267e04f4579298cddd604f5f3bcdc9ded4aad49dc3d25b919b831d2c8e6845a80deedf485234af0e7317f1ec9f9a795c21f38b00907bac0a7553cf257c7f2b292f726533865cbf11c2e5537877b9c935d3cc6e1cfb"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x1a) 20:20:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='lp\x00', 0x3) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000140)=[@mss, @sack_perm, @window, @mss, @window, @timestamp, @timestamp, @sack_perm], 0x20000000000002c2) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f0000000040), 0xffffffffffffff94, 0x58, 0x0, 0x21) 20:20:03 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x21, 0xd9f, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x80081270, &(0x7f00000006c0)) [ 839.984683][ T2234] ================================================================== [ 839.992797][ T2234] BUG: KCSAN: data-race in file_remove_privs / selinux_file_permission [ 840.001066][ T2234] [ 840.003385][ T2234] write to 0xffff8881352f0b1c of 4 bytes by task 2281 on cpu 1: [ 840.011005][ T2234] file_remove_privs+0x312/0x3a0 [ 840.015949][ T2234] __generic_file_write_iter+0xdd/0x300 [ 840.021500][ T2234] generic_file_write_iter+0x75/0x130 [ 840.026878][ T2234] vfs_write+0x69d/0x770 [ 840.031123][ T2234] __x64_sys_pwrite64+0xf5/0x150 [ 840.036064][ T2234] do_syscall_64+0x34/0x50 [ 840.040508][ T2234] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 840.046409][ T2234] [ 840.048729][ T2234] read to 0xffff8881352f0b1c of 4 bytes by task 2234 on cpu 0: [ 840.056265][ T2234] selinux_file_permission+0x41b/0x530 [ 840.061997][ T2234] security_file_permission+0x42/0xa0 [ 840.067370][ T2234] rw_verify_area+0x136/0x250 [ 840.072049][ T2234] vfs_write+0xe2/0x770 [ 840.076215][ T2234] __x64_sys_pwrite64+0xf5/0x150 [ 840.081168][ T2234] do_syscall_64+0x34/0x50 [ 840.085583][ T2234] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 840.091476][ T2234] [ 840.093787][ T2234] Reported by Kernel Concurrency Sanitizer on: [ 840.099923][ T2234] CPU: 0 PID: 2234 Comm: syz-executor.1 Tainted: G W 5.12.0-rc8-syzkaller #0 [ 840.109994][ T2234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 840.120067][ T2234] ================================================================== 20:20:04 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x1, 0x804b0}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x32c33dcab5f5a1b9, &(0x7f0000000740), 0x0, 0x0) 20:20:04 executing program 3: pipe2(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) close_range(r0, 0xffffffffffffffff, 0x2) r2 = memfd_create(&(0x7f00000000c0)='#\'%nod%v\x00\x7f\xe5\xd0ql\x86\xbc\xb3g\x9f\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x00\x14}\n\x81\x17\xd4|oC\xca\v\xe3\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xab\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF\x13\x9f\xc2\xb7/1\xb9V\xf0*\xcb\xdc\x05n<\xcfi\x02=1\xda\"\xb3\xfe\xf3\x97\xd9\xa5b\xd4\x00Q$\xb2v\\\xa9\xcf*tw\x8a\n_)\x89A\x8f`R\x12zM\a\xc23\xd0d\xee\x13Q', 0x0) sendfile(r1, r2, 0x0, 0x0) 20:20:04 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='lp\x00', 0x3) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000140)=[@mss, @sack_perm, @window, @mss, @window, @timestamp, @timestamp, @sack_perm], 0x20000000000002c2) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f0000000040), 0xffffffffffffff94, 0x58, 0x0, 0x21) 20:20:04 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000000)={0x9, 0x100000001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0xfffffe58) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file1\x00') ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000180)) [ 840.135358][ T2294] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 840.153073][ T2294] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 20:20:06 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001640)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2fc903c2b54706c05e4cbb157391ac736adf5c5575cefc1172a9a2e2875107608f9143f299d8e3f78f4bf076484885fd4089cb084607435b77c7f44cf0783279a494c8e4eba955b16e77f57966d4ba7560f29500352543b498fccba20bcae2b6f577b36b79f72f77e153f55e4fa6ad43af0d450a8f2c60baabf84ab4350874b05f4635c7449bac4383622ae4da09326e51bc3130b44a9df8704c9656b60912ff6bdb6fb1f138ece7e020fc235330fb8f4e6ad5d", 0xee}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 20:20:06 executing program 3: set_mempolicy(0x3, &(0x7f00000000c0)=0x1, 0x3) msgget$private(0x0, 0x0) 20:20:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='lp\x00', 0x3) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000140)=[@mss, @sack_perm, @window, @mss, @window, @timestamp, @timestamp, @sack_perm], 0x20000000000002c2) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f0000000040), 0xffffffffffffff94, 0x58, 0x0, 0x21) 20:20:06 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000000)={0x9, 0x100000001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0xfffffe58) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file1\x00') ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000180)) 20:20:06 executing program 4: r0 = getpgid(0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x2, 0xff, 0x5, 0x4, 0x0, 0x180, 0x39008, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x81, 0xffff, 0x9, 0x26, 0x10000, 0x7ba6}, r0, 0xb, r1, 0x19) r3 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r3, &(0x7f0000004c40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write(r5, &(0x7f0000000340), 0x41395527) r6 = fspick(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x1) preadv(r6, &(0x7f0000001780)=[{&(0x7f00000005c0)=""/78, 0x4e}, {&(0x7f0000000640)=""/39, 0x27}, {&(0x7f0000000680)=""/122, 0x7a}], 0x3, 0x5, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x90000, 0x189) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x2, 0x0, 0x0, 0x6}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r7, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 20:20:06 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x1, 0x804b0}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x32c33dcab5f5a1b9, &(0x7f0000000740), 0x0, 0x0) 20:20:06 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x41c28506bb7926c9) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ftruncate(r0, 0x0) 20:20:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='lp\x00', 0x3) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000140)=[@mss, @sack_perm, @window, @mss, @window, @timestamp, @timestamp, @sack_perm], 0x20000000000002c2) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f0000000040), 0xffffffffffffff94, 0x58, 0x0, 0x21) 20:20:06 executing program 3: mknod$loop(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@noextend}], [], 0xf}}) 20:20:06 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendto$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x11, 0x806, r3, 0x1, 0x0, 0x6, @dev}, 0x14) [ 842.284565][ T2344] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 842.306260][ T2344] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 20:20:06 executing program 3: r0 = epoll_create1(0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) setsockopt$inet_tcp_int(r1, 0x6, 0x19, &(0x7f0000000040), 0x4) 20:20:06 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip6_tables_names\x00') preadv(r0, &(0x7f0000001380)=[{&(0x7f0000000100)=""/101, 0x65}], 0x1, 0x9, 0x0) 20:20:09 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001640)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2fc903c2b54706c05e4cbb157391ac736adf5c5575cefc1172a9a2e2875107608f9143f299d8e3f78f4bf076484885fd4089cb084607435b77c7f44cf0783279a494c8e4eba955b16e77f57966d4ba7560f29500352543b498fccba20bcae2b6f577b36b79f72f77e153f55e4fa6ad43af0d450a8f2c60baabf84ab4350874b05f4635c7449bac4383622ae4da09326e51bc3130b44a9df8704c9656b60912ff6bdb6fb1f138ece7e020fc235330fb8f4e6ad5d", 0xee}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 20:20:09 executing program 3: prlimit64(0x0, 0x7, &(0x7f0000000340), 0x0) timerfd_create(0x0, 0x0) 20:20:09 executing program 5: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r1, 0x0) 20:20:09 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000000)={0x9, 0x100000001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0xfffffe58) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file1\x00') ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000180)) 20:20:09 executing program 4: r0 = getpgid(0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x2, 0xff, 0x5, 0x4, 0x0, 0x180, 0x39008, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x81, 0xffff, 0x9, 0x26, 0x10000, 0x7ba6}, r0, 0xb, r1, 0x19) r3 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r3, &(0x7f0000004c40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write(r5, &(0x7f0000000340), 0x41395527) r6 = fspick(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x1) preadv(r6, &(0x7f0000001780)=[{&(0x7f00000005c0)=""/78, 0x4e}, {&(0x7f0000000640)=""/39, 0x27}, {&(0x7f0000000680)=""/122, 0x7a}], 0x3, 0x5, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x90000, 0x189) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x2, 0x0, 0x0, 0x6}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r7, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 20:20:09 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x1, 0x804b0}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x32c33dcab5f5a1b9, &(0x7f0000000740), 0x0, 0x0) 20:20:09 executing program 3: r0 = perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x5}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) dup2(r1, r0) 20:20:09 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r0, 0x107, 0x0, 0x0, &(0x7f0000000000)=0xfffffffffffffe10) 20:20:09 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000000580)=[{{&(0x7f0000000100)={0x2, 0x6e23, @loopback}, 0x10, 0x0}}, {{&(0x7f0000000040)={0x2, 0x4e20, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_retopts={{0x14, 0x0, 0x7, {[@generic={0x7, 0x4, "049f"}]}}}], 0x18}}], 0x2, 0x0) 20:20:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket(0x11, 0x800000003, 0x0) sendmsg(r2, &(0x7f0000000340)={&(0x7f0000000180)=@qipcrtr={0x2a, 0x2}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000200)='n', 0x1}], 0x1}, 0x0) close(r1) 20:20:09 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1600}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) sched_setattr(0xffffffffffffffff, &(0x7f0000000100)={0x38, 0x1, 0x10000008, 0x0, 0x9, 0x0, 0x0, 0xfffffffffffffffc}, 0x0) perf_event_open(0x0, 0x0, 0xc, r0, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, &(0x7f0000000080), 0x0, 0x0) getpid() r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000001400)="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", 0x2b0) sendfile(r1, r2, 0x0, 0x1c50f) [ 845.302321][ T2395] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 845.322460][ T2395] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 20:20:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x14812, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$sock_int(r1, 0x1, 0x45, &(0x7f0000000080), 0x4) [ 845.392972][ T2403] loop5: detected capacity change from 0 to 264192 20:20:12 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1600}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) sched_setattr(0xffffffffffffffff, &(0x7f0000000100)={0x38, 0x1, 0x10000008, 0x0, 0x9, 0x0, 0x0, 0xfffffffffffffffc}, 0x0) perf_event_open(0x0, 0x0, 0xc, r0, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, &(0x7f0000000080), 0x0, 0x0) getpid() r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000001400)="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", 0x2b0) sendfile(r1, r2, 0x0, 0x1c50f) 20:20:12 executing program 3: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000010001000001010000010008080018000000000000181400000021000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000300)="88001c0000000000001c000800000000088a3055160c3faeb1c2a900781c09140b2a3a0870c76e90847f86721902ab4101500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809144b2a3a0843451c0120000000002b98e715d7ae460ec6f8472178a279a6", 0x93, 0xe000}], 0x0, &(0x7f0000000040)=ANY=[]) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getdents64(r0, 0x0, 0x0) 20:20:12 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000000)={0x9, 0x100000001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0xfffffe58) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file1\x00') ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000180)) 20:20:12 executing program 4: r0 = getpid() sched_setaffinity(r0, 0x8, &(0x7f0000000500)=0x9) r1 = gettid() r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r2, 0x80045301, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r2, 0xc04c5349, &(0x7f00000003c0)) tkill(r1, 0x7) 20:20:12 executing program 1: r0 = epoll_create1(0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x1a3142) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000100)={0x20000005}) write$sndseq(r1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000080)={0x2000001c}) 20:20:12 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1600}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) sched_setattr(0xffffffffffffffff, &(0x7f0000000100)={0x38, 0x1, 0x10000008, 0x0, 0x9, 0x0, 0x0, 0xfffffffffffffffc}, 0x0) perf_event_open(0x0, 0x0, 0xc, r0, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, &(0x7f0000000080), 0x0, 0x0) getpid() r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000001400)="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", 0x2b0) sendfile(r1, r2, 0x0, 0x1c50f) 20:20:12 executing program 3: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x1}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="200000002200010a00000000008008000000", @ANYRES64], 0x20}}, 0x0) [ 848.233096][ T2433] loop5: detected capacity change from 0 to 264192 20:20:12 executing program 1: unshare(0x40000400) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000140)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000080)=0x54) 20:20:12 executing program 3: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x1}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="200000002200010a00000000008008000000", @ANYRES64], 0x20}}, 0x0) 20:20:12 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(r2) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=@newsa={0x140, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@loopback}, {@in6=@ipv4={'\x00', '\xff\xff', @broadcast}, 0x0, 0x32}, @in6=@dev, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @XFRMA_SET_MARK={0x8, 0x1d, 0x4}]}, 0x140}, 0x1, 0x1400000000000000}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 20:20:12 executing program 1: unshare(0x40000400) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000140)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000080)=0x54) 20:20:12 executing program 3: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x1}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="200000002200010a00000000008008000000", @ANYRES64], 0x20}}, 0x0) 20:20:12 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1600}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) sched_setattr(0xffffffffffffffff, &(0x7f0000000100)={0x38, 0x1, 0x10000008, 0x0, 0x9, 0x0, 0x0, 0xfffffffffffffffc}, 0x0) perf_event_open(0x0, 0x0, 0xc, r0, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, &(0x7f0000000080), 0x0, 0x0) getpid() r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822", 0x2b0) sendfile(r1, r2, 0x0, 0x1c50f) 20:20:12 executing program 1: unshare(0x40000400) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000140)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000080)=0x54) 20:20:12 executing program 3: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x1}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="200000002200010a00000000008008000000", @ANYRES64], 0x20}}, 0x0) 20:20:12 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1600}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) sched_setattr(0xffffffffffffffff, &(0x7f0000000100)={0x38, 0x1, 0x10000008, 0x0, 0x9, 0x0, 0x0, 0xfffffffffffffffc}, 0x0) perf_event_open(0x0, 0x0, 0xc, r0, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, &(0x7f0000000080), 0x0, 0x0) getpid() r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000001400)="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", 0x2b0) sendfile(r1, r2, 0x0, 0x1c50f) 20:20:12 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7ffffffb}]}) dup2(r0, r0) 20:20:12 executing program 1: unshare(0x40000400) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000140)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000080)=0x54) 20:20:12 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/mcfilter6\x00') preadv(r0, &(0x7f00000005c0)=[{&(0x7f0000000300)=""/75, 0x4b}], 0x1, 0x0, 0x0) lseek(r0, 0x401, 0x0) 20:20:12 executing program 0: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0xef85) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f00000003c0)=0x3) 20:20:13 executing program 3: r0 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) lseek(r0, 0x0, 0x4) [ 849.109469][ T2504] loop5: detected capacity change from 0 to 264192 20:20:13 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000980)="66530700ae897094e71b0fb1f147a8378f364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308", 0x32}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 20:20:13 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clock_gettime(0xfffffffffffffff0, &(0x7f0000000000)) 20:20:13 executing program 3: r0 = syz_io_uring_setup(0x7467, &(0x7f0000000180), &(0x7f00003b2000/0x800000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000140), &(0x7f0000000000)) close_range(r0, 0xffffffffffffffff, 0x2) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080), 0x60c482, 0x0) io_uring_enter(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:20:13 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1600}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) sched_setattr(0xffffffffffffffff, &(0x7f0000000100)={0x38, 0x1, 0x10000008, 0x0, 0x9, 0x0, 0x0, 0xfffffffffffffffc}, 0x0) perf_event_open(0x0, 0x0, 0xc, r0, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, &(0x7f0000000080), 0x0, 0x0) getpid() r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000001400)="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", 0x2b0) sendfile(r1, r2, 0x0, 0x1c50f) 20:20:13 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0x7040, 0x0) 20:20:13 executing program 1: r0 = syz_io_uring_setup(0x75cf, &(0x7f0000000300), &(0x7f00003b2000/0x1000)=nil, &(0x7f00006d6000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000000)=0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000002c0)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r3}}, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ee8000/0x4000)=nil, &(0x7f00006d3000/0x2000)=nil, 0x0, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) setreuid(0x0, 0x0) io_uring_enter(r0, 0x4ab0, 0x0, 0x0, 0x0, 0x0) 20:20:13 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000043001f0014f9740701094400020007100400010001000000080080e20000000b", 0x24) 20:20:13 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1600}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) sched_setattr(0xffffffffffffffff, &(0x7f0000000100)={0x38, 0x1, 0x10000008, 0x0, 0x9, 0x0, 0x0, 0xfffffffffffffffc}, 0x0) perf_event_open(0x0, 0x0, 0xc, r0, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, &(0x7f0000000080), 0x0, 0x0) getpid() r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822", 0x2b0) sendfile(r1, r2, 0x0, 0x1c50f) 20:20:13 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x800000000009031, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000c00), 0xffffffffffffffff) mmap(&(0x7f000000c000/0x3000)=nil, 0x3000, 0x3, 0x31, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000048000/0x1000)=nil, 0x1000, 0x6, 0x31, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0xb, 0x4, 0x0, &(0x7f0000048000), 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x16) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) 20:20:13 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = epoll_create1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f000086fff4)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x2, r1, 0x0) 20:20:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000240), 0x4) 20:20:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6641db6e0551832d303744e57e897094b15ba5d9e70400b1f14712d8ebca47f8b25e7717fd68a8378f362fbf30b8a40a525b7be87baeb12d8e440a49eb252ea2f7fc05d7e532e1a906abffff030000000000008bc3b53e32de099dfacfa185d9db0f28c68d7ca23f367c17e5acd738ce9402dd4e9ee9ff9f24c87f26a0eab2127582afac1db1fd4960508c0da3cb7bd821a0c392a71e2cec3bb49c3f7b7d1d2a40677caf1539f7ce61bcee999919c208a34addaf85731e35a5acfec4474eb8debd9ee422804a7c1ef627", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 20:20:13 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) close(0xffffffffffffffff) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) poll(&(0x7f00000002c0)=[{r1}, {r2}, {r2}], 0x3, 0x8000) 20:20:13 executing program 4: ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000001080)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x53, 0x2}}) r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x2, 0x822b01) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) [ 849.841544][ T2557] loop5: detected capacity change from 0 to 264192 20:20:13 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000000e00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[@rthdr={{0x18}}], 0x28}}], 0x2, 0x0) [ 849.953830][ T25] kauditd_printk_skb: 1 callbacks suppressed [ 849.953843][ T25] audit: type=1326 audit(1619382013.846:5923): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=2562 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0