0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305839, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, 0x0) [ 1793.845096][T21578] I/O error, dev loop7, sector 256 op 0x0:(READ) flags 0x80700 phys_seg 32 prio class 0 05:40:35 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r3, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:40:35 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 05:40:35 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x3) io_setup(0x2e, &(0x7f0000000400)=0x0) io_submit(r1, 0x0, &(0x7f0000000540)) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x7f, 0x9, 0x40, 0x40, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x7ff, 0x0, @perf_config_ext={0x78cb}, 0x4, 0x0, 0x3, 0x0, 0x73f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0x10, 0xffffffffffffffff, 0x1) clone(0x7a900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000388000/0x1000)=nil, 0x1000, 0x65) io_setup(0x7, &(0x7f0000000280)=0x0) io_destroy(r2) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) io_setup(0x7, &(0x7f0000000040)=0x0) io_cancel(r4, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, &(0x7f0000000340)="108f3949c4702de0f8863a7cba657330ed81c628cab8683bc53b3b5e704341b4857f4933f93b1e65be239fc611aaa6743697066c4b4dea636d490c4ccf185cc831854f52941b42666e94b99ab82a1e68437a5fac933bb3", 0x57, 0x1000000000000, 0x0, 0x3}, &(0x7f00000004c0)) r5 = socket(0x10, 0x80002, 0x0) fchown(r5, 0xee00, 0xee00) perf_event_open(&(0x7f0000000440)={0x4, 0x80, 0x0, 0x5, 0x4, 0x3, 0x0, 0x1, 0x4000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xfd0d, 0x101}, 0x0, 0xf6f, 0x7f, 0x0, 0x7, 0x1, 0xfffb, 0x0, 0x0, 0x0, 0x993d}, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, 0x0, 0x40025) 05:40:35 executing program 4: prlimit64(0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0x5e, &(0x7f0000000140)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0xf, 0x2, 0x0, 0x0, 0x0, {[@sack={0x4, 0xa, [0x0, 0x0]}, @sack={0x5, 0xa, [0x0, 0x0]}, @md5sig={0x13, 0x12, "d36d43b30ea346f217a6079d942d51e5"}]}}}}}}}, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) 05:40:35 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./control\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="42b991afa0aa52249ae63a1f6cf3f8dcd56dbc75eac6ec8d12800cdb9f0990fe9091", @ANYRESDEC, @ANYBLOB="63384ff0e8e2f4b0d351f54f6b7acfcd7df526be923ce4d363098ab16fb6ce2797362f703012f5ff3375373d44b17a3ca5c4aadf65b91bde32bd0a155d3b9fa8db4b0a7bd3583cfbd98d19ea20008865357de099bcc47db073bc8c068074f2b1bafca86868d0cb234cea19c7fedc33f59fb3c9dfea28cc6ecb96f51557bcae333441372a534c4741c33f5e8c3072eac5cea5d27ac9a469423f5a2a8e7eb1e62933131205d7e910ee7dfabbc6522c557b49afc115fc", @ANYRESDEC=0x0, @ANYBLOB="2c616c6c6f775f6f746865722c246f6f74636f6e746578743db9a673797374656d63752c00d45511b384ddbcd997d79f0d3bd6ac324820d5ed9011a67a5fdda9a88fa38787b73741acd078d8741a4c7fd2a12bcf711411b62278b20542a42102624a1e860280bdfe10b77382d5a61c0d918b00005b403bdb7ee1f9121000abc5"]) syz_io_uring_complete(0x0) geteuid() r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) syz_io_uring_setup(0x51ec, &(0x7f0000000140)={0x0, 0x9000e26a, 0x2, 0x1, 0xcc}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000040)) 05:40:35 executing program 1: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48000025000505d2", 0x9}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305839, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, 0x0) 05:40:35 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 05:40:35 executing program 1: perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x6, 0x0, 0x0, 0x41ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x391f, 0x0, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, 0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(0x0, r0, 0x0, 0x0) syz_io_uring_setup(0x87, &(0x7f0000000300)={0x0, 0xa344}, &(0x7f0000ee7000/0x3000)=nil, &(0x7f0000ee7000/0x1000)=nil, &(0x7f00000001c0)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x40, &(0x7f0000000140), 0x0, 0x4) syz_io_uring_submit(0x0, 0x0, 0x0, 0x6) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001440)=@IORING_OP_STATX={0x15, 0x3, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000001400)='./file0\x00', 0x0, 0x0, 0x0, {0x0, r3}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd, 0xa774, 0x0, 0xe4d, 0x0, 0x1, {0x0, r3}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, {0x0, r3}}, 0x9) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f00000002c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x7fbd60b2f35bd77f}, 0x0) ioctl$sock_SIOCGIFCONF(r4, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'syz_tun\x00', @ifru_map}}) io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 05:40:35 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./control\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="42b991afa0aa52249ae63a1f6cf3f8dcd56dbc75eac6ec8d12800cdb9f0990fe9091", @ANYRESDEC, @ANYBLOB="63384ff0e8e2f4b0d351f54f6b7acfcd7df526be923ce4d363098ab16fb6ce2797362f703012f5ff3375373d44b17a3ca5c4aadf65b91bde32bd0a155d3b9fa8db4b0a7bd3583cfbd98d19ea20008865357de099bcc47db073bc8c068074f2b1bafca86868d0cb234cea19c7fedc33f59fb3c9dfea28cc6ecb96f51557bcae333441372a534c4741c33f5e8c3072eac5cea5d27ac9a469423f5a2a8e7eb1e62933131205d7e910ee7dfabbc6522c557b49afc115fc", @ANYRESDEC=0x0, @ANYBLOB="2c616c6c6f775f6f746865722c246f6f74636f6e746578743db9a673797374656d63752c00d45511b384ddbcd997d79f0d3bd6ac324820d5ed9011a67a5fdda9a88fa38787b73741acd078d8741a4c7fd2a12bcf711411b62278b20542a42102624a1e860280bdfe10b77382d5a61c0d918b00005b403bdb7ee1f9121000abc5"]) syz_io_uring_complete(0x0) geteuid() r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) syz_io_uring_setup(0x51ec, &(0x7f0000000140)={0x0, 0x9000e26a, 0x2, 0x1, 0xcc}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000040)) 05:40:35 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 05:40:35 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x1, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xa1828, 0x0) 05:40:35 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') creat(&(0x7f0000000300)='./file1\x00', 0x0) chmod(&(0x7f0000000400)='./file1\x00', 0x0) [ 1795.022307][T21632] loop1: detected capacity change from 0 to 264192 05:40:36 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r3, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:40:36 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./control\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="42b991afa0aa52249ae63a1f6cf3f8dcd56dbc75eac6ec8d12800cdb9f0990fe9091", @ANYRESDEC, @ANYBLOB="63384ff0e8e2f4b0d351f54f6b7acfcd7df526be923ce4d363098ab16fb6ce2797362f703012f5ff3375373d44b17a3ca5c4aadf65b91bde32bd0a155d3b9fa8db4b0a7bd3583cfbd98d19ea20008865357de099bcc47db073bc8c068074f2b1bafca86868d0cb234cea19c7fedc33f59fb3c9dfea28cc6ecb96f51557bcae333441372a534c4741c33f5e8c3072eac5cea5d27ac9a469423f5a2a8e7eb1e62933131205d7e910ee7dfabbc6522c557b49afc115fc", @ANYRESDEC=0x0, @ANYBLOB="2c616c6c6f775f6f746865722c246f6f74636f6e746578743db9a673797374656d63752c00d45511b384ddbcd997d79f0d3bd6ac324820d5ed9011a67a5fdda9a88fa38787b73741acd078d8741a4c7fd2a12bcf711411b62278b20542a42102624a1e860280bdfe10b77382d5a61c0d918b00005b403bdb7ee1f9121000abc5"]) syz_io_uring_complete(0x0) geteuid() r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 05:40:36 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 05:40:36 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x1, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xa1828, 0x0) 05:40:36 executing program 4: prlimit64(0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0x5e, &(0x7f0000000140)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0xf, 0x2, 0x0, 0x0, 0x0, {[@sack={0x4, 0xa, [0x0, 0x0]}, @sack={0x5, 0xa, [0x0, 0x0]}, @md5sig={0x13, 0x12, "d36d43b30ea346f217a6079d942d51e5"}]}}}}}}}, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 05:40:36 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x0, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./control\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="42b991afa0aa52249ae63a1f6cf3f8dcd56dbc75eac6ec8d12800cdb9f0990fe9091", @ANYRESDEC, @ANYBLOB="63384ff0e8e2f4b0d351f54f6b7acfcd7df526be923ce4d363098ab16fb6ce2797362f703012f5ff3375373d44b17a3ca5c4aadf65b91bde32bd0a155d3b9fa8db4b0a7bd3583cfbd98d19ea20008865357de099bcc47db073bc8c068074f2b1bafca86868d0cb234cea19c7fedc33f59fb3c9dfea28cc6ecb96f51557bcae333441372a534c4741c33f5e8c3072eac5cea5d27ac9a469423f5a2a8e7eb1e62933131205d7e910ee7dfabbc6522c557b49afc115fc", @ANYRESDEC=0x0, @ANYBLOB="2c616c6c6f775f6f746865722c246f6f74636f6e746578743db9a673797374656d63752c00d45511b384ddbcd997d79f0d3bd6ac324820d5ed9011a67a5fdda9a88fa38787b73741acd078d8741a4c7fd2a12bcf711411b62278b20542a42102624a1e860280bdfe10b77382d5a61c0d918b00005b403bdb7ee1f9121000abc5"]) syz_io_uring_complete(0x0) geteuid() r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:40:36 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) [ 1795.470766][T21647] loop7: detected capacity change from 0 to 1036 05:40:36 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 05:40:36 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./control\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="42b991afa0aa52249ae63a1f6cf3f8dcd56dbc75eac6ec8d12800cdb9f0990fe9091", @ANYRESDEC, @ANYBLOB="63384ff0e8e2f4b0d351f54f6b7acfcd7df526be923ce4d363098ab16fb6ce2797362f703012f5ff3375373d44b17a3ca5c4aadf65b91bde32bd0a155d3b9fa8db4b0a7bd3583cfbd98d19ea20008865357de099bcc47db073bc8c068074f2b1bafca86868d0cb234cea19c7fedc33f59fb3c9dfea28cc6ecb96f51557bcae333441372a534c4741c33f5e8c3072eac5cea5d27ac9a469423f5a2a8e7eb1e62933131205d7e910ee7dfabbc6522c557b49afc115fc", @ANYRESDEC=0x0, @ANYBLOB="2c616c6c6f775f6f746865722c246f6f74636f6e746578743db9a673797374656d63752c00d45511b384ddbcd997d79f0d3bd6ac324820d5ed9011a67a5fdda9a88fa38787b73741acd078d8741a4c7fd2a12bcf711411b62278b20542a42102624a1e860280bdfe10b77382d5a61c0d918b00005b403bdb7ee1f9121000abc5"]) syz_io_uring_complete(0x0) geteuid() r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 05:40:36 executing program 2: r0 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000000)) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x5450, 0x0) [ 1795.746568][T21665] loop7: detected capacity change from 0 to 1036 05:40:36 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x0, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./control\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="42b991afa0aa52249ae63a1f6cf3f8dcd56dbc75eac6ec8d12800cdb9f0990fe9091", @ANYRESDEC, @ANYBLOB="63384ff0e8e2f4b0d351f54f6b7acfcd7df526be923ce4d363098ab16fb6ce2797362f703012f5ff3375373d44b17a3ca5c4aadf65b91bde32bd0a155d3b9fa8db4b0a7bd3583cfbd98d19ea20008865357de099bcc47db073bc8c068074f2b1bafca86868d0cb234cea19c7fedc33f59fb3c9dfea28cc6ecb96f51557bcae333441372a534c4741c33f5e8c3072eac5cea5d27ac9a469423f5a2a8e7eb1e62933131205d7e910ee7dfabbc6522c557b49afc115fc", @ANYRESDEC=0x0, @ANYBLOB="2c616c6c6f775f6f746865722c246f6f74636f6e746578743db9a673797374656d63752c00d45511b384ddbcd997d79f0d3bd6ac324820d5ed9011a67a5fdda9a88fa38787b73741acd078d8741a4c7fd2a12bcf711411b62278b20542a42102624a1e860280bdfe10b77382d5a61c0d918b00005b403bdb7ee1f9121000abc5"]) syz_io_uring_complete(0x0) geteuid() r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:40:37 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x0, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./control\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="42b991afa0aa52249ae63a1f6cf3f8dcd56dbc75eac6ec8d12800cdb9f0990fe9091", @ANYRESDEC, @ANYBLOB="63384ff0e8e2f4b0d351f54f6b7acfcd7df526be923ce4d363098ab16fb6ce2797362f703012f5ff3375373d44b17a3ca5c4aadf65b91bde32bd0a155d3b9fa8db4b0a7bd3583cfbd98d19ea20008865357de099bcc47db073bc8c068074f2b1bafca86868d0cb234cea19c7fedc33f59fb3c9dfea28cc6ecb96f51557bcae333441372a534c4741c33f5e8c3072eac5cea5d27ac9a469423f5a2a8e7eb1e62933131205d7e910ee7dfabbc6522c557b49afc115fc", @ANYRESDEC=0x0, @ANYBLOB="2c616c6c6f775f6f746865722c246f6f74636f6e746578743db9a673797374656d63752c00d45511b384ddbcd997d79f0d3bd6ac324820d5ed9011a67a5fdda9a88fa38787b73741acd078d8741a4c7fd2a12bcf711411b62278b20542a42102624a1e860280bdfe10b77382d5a61c0d918b00005b403bdb7ee1f9121000abc5"]) syz_io_uring_complete(0x0) geteuid() r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) [ 1796.339035][T21680] loop7: detected capacity change from 0 to 1036 05:40:37 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) read$FUSE(r0, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r2, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:40:37 executing program 4: prlimit64(0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0x5e, &(0x7f0000000140)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0xf, 0x2, 0x0, 0x0, 0x0, {[@sack={0x4, 0xa, [0x0, 0x0]}, @sack={0x5, 0xa, [0x0, 0x0]}, @md5sig={0x13, 0x12, "d36d43b30ea346f217a6079d942d51e5"}]}}}}}}}, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 05:40:37 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 05:40:37 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./control\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="42b991afa0aa52249ae63a1f6cf3f8dcd56dbc75eac6ec8d12800cdb9f0990fe9091", @ANYRESDEC, @ANYBLOB="63384ff0e8e2f4b0d351f54f6b7acfcd7df526be923ce4d363098ab16fb6ce2797362f703012f5ff3375373d44b17a3ca5c4aadf65b91bde32bd0a155d3b9fa8db4b0a7bd3583cfbd98d19ea20008865357de099bcc47db073bc8c068074f2b1bafca86868d0cb234cea19c7fedc33f59fb3c9dfea28cc6ecb96f51557bcae333441372a534c4741c33f5e8c3072eac5cea5d27ac9a469423f5a2a8e7eb1e62933131205d7e910ee7dfabbc6522c557b49afc115fc", @ANYRESDEC=0x0, @ANYBLOB="2c616c6c6f775f6f746865722c246f6f74636f6e746578743db9a673797374656d63752c00d45511b384ddbcd997d79f0d3bd6ac324820d5ed9011a67a5fdda9a88fa38787b73741acd078d8741a4c7fd2a12bcf711411b62278b20542a42102624a1e860280bdfe10b77382d5a61c0d918b00005b403bdb7ee1f9121000abc5"]) syz_io_uring_complete(0x0) geteuid() r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 05:40:37 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x0, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./control\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="42b991afa0aa52249ae63a1f6cf3f8dcd56dbc75eac6ec8d12800cdb9f0990fe9091", @ANYRESDEC, @ANYBLOB="63384ff0e8e2f4b0d351f54f6b7acfcd7df526be923ce4d363098ab16fb6ce2797362f703012f5ff3375373d44b17a3ca5c4aadf65b91bde32bd0a155d3b9fa8db4b0a7bd3583cfbd98d19ea20008865357de099bcc47db073bc8c068074f2b1bafca86868d0cb234cea19c7fedc33f59fb3c9dfea28cc6ecb96f51557bcae333441372a534c4741c33f5e8c3072eac5cea5d27ac9a469423f5a2a8e7eb1e62933131205d7e910ee7dfabbc6522c557b49afc115fc", @ANYRESDEC=0x0, @ANYBLOB="2c616c6c6f775f6f746865722c246f6f74636f6e746578743db9a673797374656d63752c00d45511b384ddbcd997d79f0d3bd6ac324820d5ed9011a67a5fdda9a88fa38787b73741acd078d8741a4c7fd2a12bcf711411b62278b20542a42102624a1e860280bdfe10b77382d5a61c0d918b00005b403bdb7ee1f9121000abc5"]) syz_io_uring_complete(0x0) geteuid() r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:40:37 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x0, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./control\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="42b991afa0aa52249ae63a1f6cf3f8dcd56dbc75eac6ec8d12800cdb9f0990fe9091", @ANYRESDEC, @ANYBLOB="63384ff0e8e2f4b0d351f54f6b7acfcd7df526be923ce4d363098ab16fb6ce2797362f703012f5ff3375373d44b17a3ca5c4aadf65b91bde32bd0a155d3b9fa8db4b0a7bd3583cfbd98d19ea20008865357de099bcc47db073bc8c068074f2b1bafca86868d0cb234cea19c7fedc33f59fb3c9dfea28cc6ecb96f51557bcae333441372a534c4741c33f5e8c3072eac5cea5d27ac9a469423f5a2a8e7eb1e62933131205d7e910ee7dfabbc6522c557b49afc115fc", @ANYRESDEC=0x0, @ANYBLOB="2c616c6c6f775f6f746865722c246f6f74636f6e746578743db9a673797374656d63752c00d45511b384ddbcd997d79f0d3bd6ac324820d5ed9011a67a5fdda9a88fa38787b73741acd078d8741a4c7fd2a12bcf711411b62278b20542a42102624a1e860280bdfe10b77382d5a61c0d918b00005b403bdb7ee1f9121000abc5"]) syz_io_uring_complete(0x0) geteuid() r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:40:37 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) read$FUSE(r0, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r2, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) [ 1796.770744][T21692] I/O error, dev loop7, sector 512 op 0x0:(READ) flags 0x80700 phys_seg 32 prio class 0 [ 1796.811307][T21701] loop7: detected capacity change from 0 to 1036 05:40:37 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x0, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./control\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="42b991afa0aa52249ae63a1f6cf3f8dcd56dbc75eac6ec8d12800cdb9f0990fe9091", @ANYRESDEC, @ANYBLOB="63384ff0e8e2f4b0d351f54f6b7acfcd7df526be923ce4d363098ab16fb6ce2797362f703012f5ff3375373d44b17a3ca5c4aadf65b91bde32bd0a155d3b9fa8db4b0a7bd3583cfbd98d19ea20008865357de099bcc47db073bc8c068074f2b1bafca86868d0cb234cea19c7fedc33f59fb3c9dfea28cc6ecb96f51557bcae333441372a534c4741c33f5e8c3072eac5cea5d27ac9a469423f5a2a8e7eb1e62933131205d7e910ee7dfabbc6522c557b49afc115fc", @ANYRESDEC=0x0, @ANYBLOB="2c616c6c6f775f6f746865722c246f6f74636f6e746578743db9a673797374656d63752c00d45511b384ddbcd997d79f0d3bd6ac324820d5ed9011a67a5fdda9a88fa38787b73741acd078d8741a4c7fd2a12bcf711411b62278b20542a42102624a1e860280bdfe10b77382d5a61c0d918b00005b403bdb7ee1f9121000abc5"]) syz_io_uring_complete(0x0) geteuid() r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:40:37 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 05:40:38 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./control\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="42b991afa0aa52249ae63a1f6cf3f8dcd56dbc75eac6ec8d12800cdb9f0990fe9091", @ANYRESDEC, @ANYBLOB="63384ff0e8e2f4b0d351f54f6b7acfcd7df526be923ce4d363098ab16fb6ce2797362f703012f5ff3375373d44b17a3ca5c4aadf65b91bde32bd0a155d3b9fa8db4b0a7bd3583cfbd98d19ea20008865357de099bcc47db073bc8c068074f2b1bafca86868d0cb234cea19c7fedc33f59fb3c9dfea28cc6ecb96f51557bcae333441372a534c4741c33f5e8c3072eac5cea5d27ac9a469423f5a2a8e7eb1e62933131205d7e910ee7dfabbc6522c557b49afc115fc", @ANYRESDEC=0x0, @ANYBLOB="2c616c6c6f775f6f746865722c246f6f74636f6e746578743db9a673797374656d63752c00d45511b384ddbcd997d79f0d3bd6ac324820d5ed9011a67a5fdda9a88fa38787b73741acd078d8741a4c7fd2a12bcf711411b62278b20542a42102624a1e860280bdfe10b77382d5a61c0d918b00005b403bdb7ee1f9121000abc5"]) syz_io_uring_complete(0x0) geteuid() r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) [ 1797.114164][ T4020] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 1797.125713][ T9754] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 05:40:38 executing program 2: r0 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000000)) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r0, 0x5451, 0x0) 05:40:38 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) [ 1797.414622][T21714] I/O error, dev loop7, sector 768 op 0x0:(READ) flags 0x80700 phys_seg 16 prio class 0 [ 1797.446906][T21721] loop7: detected capacity change from 0 to 1036 05:40:38 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) read$FUSE(r0, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r2, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:40:38 executing program 4: prlimit64(0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0x5e, &(0x7f0000000140)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0xf, 0x2, 0x0, 0x0, 0x0, {[@sack={0x4, 0xa, [0x0, 0x0]}, @sack={0x5, 0xa, [0x0, 0x0]}, @md5sig={0x13, 0x12, "d36d43b30ea346f217a6079d942d51e5"}]}}}}}}}, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 05:40:38 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./control\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="42b991afa0aa52249ae63a1f6cf3f8dcd56dbc75eac6ec8d12800cdb9f0990fe9091", @ANYRESDEC, @ANYBLOB="63384ff0e8e2f4b0d351f54f6b7acfcd7df526be923ce4d363098ab16fb6ce2797362f703012f5ff3375373d44b17a3ca5c4aadf65b91bde32bd0a155d3b9fa8db4b0a7bd3583cfbd98d19ea20008865357de099bcc47db073bc8c068074f2b1bafca86868d0cb234cea19c7fedc33f59fb3c9dfea28cc6ecb96f51557bcae333441372a534c4741c33f5e8c3072eac5cea5d27ac9a469423f5a2a8e7eb1e62933131205d7e910ee7dfabbc6522c557b49afc115fc", @ANYRESDEC=0x0, @ANYBLOB="2c616c6c6f775f6f746865722c246f6f74636f6e746578743db9a673797374656d63752c00d45511b384ddbcd997d79f0d3bd6ac324820d5ed9011a67a5fdda9a88fa38787b73741acd078d8741a4c7fd2a12bcf711411b62278b20542a42102624a1e860280bdfe10b77382d5a61c0d918b00005b403bdb7ee1f9121000abc5"]) syz_io_uring_complete(0x0) geteuid() r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 05:40:38 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x0, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./control\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="42b991afa0aa52249ae63a1f6cf3f8dcd56dbc75eac6ec8d12800cdb9f0990fe9091", @ANYRESDEC, @ANYBLOB="63384ff0e8e2f4b0d351f54f6b7acfcd7df526be923ce4d363098ab16fb6ce2797362f703012f5ff3375373d44b17a3ca5c4aadf65b91bde32bd0a155d3b9fa8db4b0a7bd3583cfbd98d19ea20008865357de099bcc47db073bc8c068074f2b1bafca86868d0cb234cea19c7fedc33f59fb3c9dfea28cc6ecb96f51557bcae333441372a534c4741c33f5e8c3072eac5cea5d27ac9a469423f5a2a8e7eb1e62933131205d7e910ee7dfabbc6522c557b49afc115fc", @ANYRESDEC=0x0, @ANYBLOB="2c616c6c6f775f6f746865722c246f6f74636f6e746578743db9a673797374656d63752c00d45511b384ddbcd997d79f0d3bd6ac324820d5ed9011a67a5fdda9a88fa38787b73741acd078d8741a4c7fd2a12bcf711411b62278b20542a42102624a1e860280bdfe10b77382d5a61c0d918b00005b403bdb7ee1f9121000abc5"]) syz_io_uring_complete(0x0) geteuid() r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:40:38 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x7fff0000}]}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 05:40:38 executing program 2: pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x0) lseek(r0, 0x0, 0x0) 05:40:38 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r1, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:40:39 executing program 4: prlimit64(0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0x5e, &(0x7f0000000140)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0xf, 0x2, 0x0, 0x0, 0x0, {[@sack={0x4, 0xa, [0x0, 0x0]}, @sack={0x5, 0xa, [0x0, 0x0]}, @md5sig={0x13, 0x12, "d36d43b30ea346f217a6079d942d51e5"}]}}}}}}}, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) [ 1797.997308][T21740] I/O error, dev loop7, sector 768 op 0x0:(READ) flags 0x80700 phys_seg 17 prio class 0 [ 1798.000950][T21743] loop7: detected capacity change from 0 to 1036 05:40:39 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./control\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="42b991afa0aa52249ae63a1f6cf3f8dcd56dbc75eac6ec8d12800cdb9f0990fe9091", @ANYRESDEC, @ANYBLOB="63384ff0e8e2f4b0d351f54f6b7acfcd7df526be923ce4d363098ab16fb6ce2797362f703012f5ff3375373d44b17a3ca5c4aadf65b91bde32bd0a155d3b9fa8db4b0a7bd3583cfbd98d19ea20008865357de099bcc47db073bc8c068074f2b1bafca86868d0cb234cea19c7fedc33f59fb3c9dfea28cc6ecb96f51557bcae333441372a534c4741c33f5e8c3072eac5cea5d27ac9a469423f5a2a8e7eb1e62933131205d7e910ee7dfabbc6522c557b49afc115fc", @ANYRESDEC=0x0, @ANYBLOB="2c616c6c6f775f6f746865722c246f6f74636f6e746578743db9a673797374656d63752c00d45511b384ddbcd997d79f0d3bd6ac324820d5ed9011a67a5fdda9a88fa38787b73741acd078d8741a4c7fd2a12bcf711411b62278b20542a42102624a1e860280bdfe10b77382d5a61c0d918b00005b403bdb7ee1f9121000abc5"]) syz_io_uring_complete(0x0) geteuid() r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 05:40:39 executing program 2: syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000001380)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1}}]}}, 0x0) 05:40:39 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x7fff0000}]}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 05:40:39 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./control\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="42b991afa0aa52249ae63a1f6cf3f8dcd56dbc75eac6ec8d12800cdb9f0990fe9091", @ANYRESDEC, @ANYBLOB="63384ff0e8e2f4b0d351f54f6b7acfcd7df526be923ce4d363098ab16fb6ce2797362f703012f5ff3375373d44b17a3ca5c4aadf65b91bde32bd0a155d3b9fa8db4b0a7bd3583cfbd98d19ea20008865357de099bcc47db073bc8c068074f2b1bafca86868d0cb234cea19c7fedc33f59fb3c9dfea28cc6ecb96f51557bcae333441372a534c4741c33f5e8c3072eac5cea5d27ac9a469423f5a2a8e7eb1e62933131205d7e910ee7dfabbc6522c557b49afc115fc", @ANYRESDEC=0x0, @ANYBLOB="2c616c6c6f775f6f746865722c246f6f74636f6e746578743db9a673797374656d63752c00d45511b384ddbcd997d79f0d3bd6ac324820d5ed9011a67a5fdda9a88fa38787b73741acd078d8741a4c7fd2a12bcf711411b62278b20542a42102624a1e860280bdfe10b77382d5a61c0d918b00005b403bdb7ee1f9121000abc5"]) syz_io_uring_complete(0x0) geteuid() r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 05:40:39 executing program 4: prlimit64(0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0x5e, &(0x7f0000000140)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0xf, 0x2, 0x0, 0x0, 0x0, {[@sack={0x4, 0xa, [0x0, 0x0]}, @sack={0x5, 0xa, [0x0, 0x0]}, @md5sig={0x13, 0x12, "d36d43b30ea346f217a6079d942d51e5"}]}}}}}}}, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 05:40:39 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x7fff0000}]}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 05:40:39 executing program 4: prlimit64(0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0x5e, &(0x7f0000000140)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0xf, 0x2, 0x0, 0x0, 0x0, {[@sack={0x4, 0xa, [0x0, 0x0]}, @sack={0x5, 0xa, [0x0, 0x0]}, @md5sig={0x13, 0x12, "d36d43b30ea346f217a6079d942d51e5"}]}}}}}}}, 0x0) 05:40:39 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x0, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./control\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="42b991afa0aa52249ae63a1f6cf3f8dcd56dbc75eac6ec8d12800cdb9f0990fe9091", @ANYRESDEC, @ANYBLOB="63384ff0e8e2f4b0d351f54f6b7acfcd7df526be923ce4d363098ab16fb6ce2797362f703012f5ff3375373d44b17a3ca5c4aadf65b91bde32bd0a155d3b9fa8db4b0a7bd3583cfbd98d19ea20008865357de099bcc47db073bc8c068074f2b1bafca86868d0cb234cea19c7fedc33f59fb3c9dfea28cc6ecb96f51557bcae333441372a534c4741c33f5e8c3072eac5cea5d27ac9a469423f5a2a8e7eb1e62933131205d7e910ee7dfabbc6522c557b49afc115fc", @ANYRESDEC=0x0, @ANYBLOB="2c616c6c6f775f6f746865722c246f6f74636f6e746578743db9a673797374656d63752c00d45511b384ddbcd997d79f0d3bd6ac324820d5ed9011a67a5fdda9a88fa38787b73741acd078d8741a4c7fd2a12bcf711411b62278b20542a42102624a1e860280bdfe10b77382d5a61c0d918b00005b403bdb7ee1f9121000abc5"]) syz_io_uring_complete(0x0) geteuid() r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) [ 1798.754043][ T9611] usb 3-1: new high-speed USB device number 27 using dummy_hcd [ 1798.827605][T21776] I/O error, dev loop7, sector 512 op 0x0:(READ) flags 0x80700 phys_seg 32 prio class 0 05:40:39 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 05:40:39 executing program 4: syz_emit_ethernet(0x5e, &(0x7f0000000140)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0xf, 0x2, 0x0, 0x0, 0x0, {[@sack={0x4, 0xa, [0x0, 0x0]}, @sack={0x5, 0xa, [0x0, 0x0]}, @md5sig={0x13, 0x12, "d36d43b30ea346f217a6079d942d51e5"}]}}}}}}}, 0x0) [ 1799.003754][ T9611] usb 3-1: device descriptor read/64, error 18 [ 1799.094581][ T26] audit: type=1326 audit(1634881240.066:3417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=21793 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f8d06d66a39 code=0x0 [ 1799.138821][T21797] loop7: detected capacity change from 0 to 1036 [ 1799.293430][ T9611] usb 3-1: new high-speed USB device number 28 using dummy_hcd [ 1799.513650][ T9611] usb 3-1: device descriptor read/64, error 18 [ 1799.633249][ T9611] usb usb3-port1: attempt power cycle [ 1800.061541][ T9611] usb 3-1: new high-speed USB device number 29 using dummy_hcd [ 1800.181113][ T9611] usb 3-1: Invalid ep0 maxpacket: 0 [ 1800.342771][ T9611] usb 3-1: new high-speed USB device number 30 using dummy_hcd [ 1800.453361][ T9611] usb 3-1: Invalid ep0 maxpacket: 0 [ 1800.464970][ T9611] usb usb3-port1: unable to enumerate USB device 05:40:42 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r1, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:40:42 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./control\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="42b991afa0aa52249ae63a1f6cf3f8dcd56dbc75eac6ec8d12800cdb9f0990fe9091", @ANYRESDEC, @ANYBLOB="63384ff0e8e2f4b0d351f54f6b7acfcd7df526be923ce4d363098ab16fb6ce2797362f703012f5ff3375373d44b17a3ca5c4aadf65b91bde32bd0a155d3b9fa8db4b0a7bd3583cfbd98d19ea20008865357de099bcc47db073bc8c068074f2b1bafca86868d0cb234cea19c7fedc33f59fb3c9dfea28cc6ecb96f51557bcae333441372a534c4741c33f5e8c3072eac5cea5d27ac9a469423f5a2a8e7eb1e62933131205d7e910ee7dfabbc6522c557b49afc115fc", @ANYRESDEC=0x0, @ANYBLOB="2c616c6c6f775f6f746865722c246f6f74636f6e746578743db9a673797374656d63752c00d45511b384ddbcd997d79f0d3bd6ac324820d5ed9011a67a5fdda9a88fa38787b73741acd078d8741a4c7fd2a12bcf711411b62278b20542a42102624a1e860280bdfe10b77382d5a61c0d918b00005b403bdb7ee1f9121000abc5"]) syz_io_uring_complete(0x0) geteuid() sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, 0xffffffffffffffff) 05:40:42 executing program 4: syz_emit_ethernet(0x0, 0x0, 0x0) 05:40:42 executing program 2: pipe2(&(0x7f0000001240), 0x0) 05:40:42 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x0, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./control\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="42b991afa0aa52249ae63a1f6cf3f8dcd56dbc75eac6ec8d12800cdb9f0990fe9091", @ANYRESDEC, @ANYBLOB="63384ff0e8e2f4b0d351f54f6b7acfcd7df526be923ce4d363098ab16fb6ce2797362f703012f5ff3375373d44b17a3ca5c4aadf65b91bde32bd0a155d3b9fa8db4b0a7bd3583cfbd98d19ea20008865357de099bcc47db073bc8c068074f2b1bafca86868d0cb234cea19c7fedc33f59fb3c9dfea28cc6ecb96f51557bcae333441372a534c4741c33f5e8c3072eac5cea5d27ac9a469423f5a2a8e7eb1e62933131205d7e910ee7dfabbc6522c557b49afc115fc", @ANYRESDEC=0x0, @ANYBLOB="2c616c6c6f775f6f746865722c246f6f74636f6e746578743db9a673797374656d63752c00d45511b384ddbcd997d79f0d3bd6ac324820d5ed9011a67a5fdda9a88fa38787b73741acd078d8741a4c7fd2a12bcf711411b62278b20542a42102624a1e860280bdfe10b77382d5a61c0d918b00005b403bdb7ee1f9121000abc5"]) syz_io_uring_complete(0x0) geteuid() r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 05:40:42 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 05:40:42 executing program 4: syz_emit_ethernet(0x0, 0x0, 0x0) 05:40:42 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r1, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) [ 1801.319022][T21819] I/O error, dev loop7, sector 512 op 0x0:(READ) flags 0x80700 phys_seg 31 prio class 0 05:40:42 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./control\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="42b991afa0aa52249ae63a1f6cf3f8dcd56dbc75eac6ec8d12800cdb9f0990fe9091", @ANYRESDEC, @ANYBLOB="63384ff0e8e2f4b0d351f54f6b7acfcd7df526be923ce4d363098ab16fb6ce2797362f703012f5ff3375373d44b17a3ca5c4aadf65b91bde32bd0a155d3b9fa8db4b0a7bd3583cfbd98d19ea20008865357de099bcc47db073bc8c068074f2b1bafca86868d0cb234cea19c7fedc33f59fb3c9dfea28cc6ecb96f51557bcae333441372a534c4741c33f5e8c3072eac5cea5d27ac9a469423f5a2a8e7eb1e62933131205d7e910ee7dfabbc6522c557b49afc115fc", @ANYRESDEC=0x0, @ANYBLOB="2c616c6c6f775f6f746865722c246f6f74636f6e746578743db9a673797374656d63752c00d45511b384ddbcd997d79f0d3bd6ac324820d5ed9011a67a5fdda9a88fa38787b73741acd078d8741a4c7fd2a12bcf711411b62278b20542a42102624a1e860280bdfe10b77382d5a61c0d918b00005b403bdb7ee1f9121000abc5"]) syz_io_uring_complete(0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, 0xffffffffffffffff) [ 1801.498679][ T26] audit: type=1326 audit(1634881242.466:3418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=21830 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f8d06d66a39 code=0x0 05:40:42 executing program 4: syz_emit_ethernet(0x0, 0x0, 0x0) [ 1801.598100][T21831] loop7: detected capacity change from 0 to 1036 05:40:42 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x1, 0x0) read$FUSE(r0, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r2, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:40:42 executing program 2: pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) accept(r0, 0x0, 0x0) 05:40:42 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x0, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./control\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="42b991afa0aa52249ae63a1f6cf3f8dcd56dbc75eac6ec8d12800cdb9f0990fe9091", @ANYRESDEC, @ANYBLOB="63384ff0e8e2f4b0d351f54f6b7acfcd7df526be923ce4d363098ab16fb6ce2797362f703012f5ff3375373d44b17a3ca5c4aadf65b91bde32bd0a155d3b9fa8db4b0a7bd3583cfbd98d19ea20008865357de099bcc47db073bc8c068074f2b1bafca86868d0cb234cea19c7fedc33f59fb3c9dfea28cc6ecb96f51557bcae333441372a534c4741c33f5e8c3072eac5cea5d27ac9a469423f5a2a8e7eb1e62933131205d7e910ee7dfabbc6522c557b49afc115fc", @ANYRESDEC=0x0, @ANYBLOB="2c616c6c6f775f6f746865722c246f6f74636f6e746578743db9a673797374656d63752c00d45511b384ddbcd997d79f0d3bd6ac324820d5ed9011a67a5fdda9a88fa38787b73741acd078d8741a4c7fd2a12bcf711411b62278b20542a42102624a1e860280bdfe10b77382d5a61c0d918b00005b403bdb7ee1f9121000abc5"]) syz_io_uring_complete(0x0) geteuid() r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 05:40:42 executing program 4: syz_emit_ethernet(0x5e, &(0x7f0000000140)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0xf, 0x2, 0x0, 0x0, 0x0, {[@sack={0x4, 0xa, [0x0, 0x0]}, @sack={0x5, 0xa, [0x0, 0x0]}, @md5sig={0x13, 0x12, "d36d43b30ea346f217a6079d942d51e5"}]}}}}}}}, 0x0) 05:40:43 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x1, 0x0) read$FUSE(r0, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r2, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:40:43 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x0, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./control\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="42b991afa0aa52249ae63a1f6cf3f8dcd56dbc75eac6ec8d12800cdb9f0990fe9091", @ANYRESDEC, @ANYBLOB="63384ff0e8e2f4b0d351f54f6b7acfcd7df526be923ce4d363098ab16fb6ce2797362f703012f5ff3375373d44b17a3ca5c4aadf65b91bde32bd0a155d3b9fa8db4b0a7bd3583cfbd98d19ea20008865357de099bcc47db073bc8c068074f2b1bafca86868d0cb234cea19c7fedc33f59fb3c9dfea28cc6ecb96f51557bcae333441372a534c4741c33f5e8c3072eac5cea5d27ac9a469423f5a2a8e7eb1e62933131205d7e910ee7dfabbc6522c557b49afc115fc", @ANYRESDEC=0x0, @ANYBLOB="2c616c6c6f775f6f746865722c246f6f74636f6e746578743db9a673797374656d63752c00d45511b384ddbcd997d79f0d3bd6ac324820d5ed9011a67a5fdda9a88fa38787b73741acd078d8741a4c7fd2a12bcf711411b62278b20542a42102624a1e860280bdfe10b77382d5a61c0d918b00005b403bdb7ee1f9121000abc5"]) syz_io_uring_complete(0x0) geteuid() r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:40:43 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0xf, &(0x7f0000002000)={0x1, 0x0, 0x0, 0x76b13200e7321d8c}, 0x20) 05:40:43 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 05:40:43 executing program 4: syz_emit_ethernet(0x5e, &(0x7f0000000140)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0xf, 0x0, 0x0, 0x0, 0x0, {[@sack={0x4, 0xa, [0x0, 0x0]}, @sack={0x5, 0xa, [0x0, 0x0]}, @md5sig={0x13, 0x12, "d36d43b30ea346f217a6079d942d51e5"}]}}}}}}}, 0x0) 05:40:43 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./control\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="42b991afa0aa52249ae63a1f6cf3f8dcd56dbc75eac6ec8d12800cdb9f0990fe9091", @ANYRESDEC, @ANYBLOB="63384ff0e8e2f4b0d351f54f6b7acfcd7df526be923ce4d363098ab16fb6ce2797362f703012f5ff3375373d44b17a3ca5c4aadf65b91bde32bd0a155d3b9fa8db4b0a7bd3583cfbd98d19ea20008865357de099bcc47db073bc8c068074f2b1bafca86868d0cb234cea19c7fedc33f59fb3c9dfea28cc6ecb96f51557bcae333441372a534c4741c33f5e8c3072eac5cea5d27ac9a469423f5a2a8e7eb1e62933131205d7e910ee7dfabbc6522c557b49afc115fc", @ANYRESDEC=0x0, @ANYBLOB="2c616c6c6f775f6f746865722c246f6f74636f6e746578743db9a673797374656d63752c00d45511b384ddbcd997d79f0d3bd6ac324820d5ed9011a67a5fdda9a88fa38787b73741acd078d8741a4c7fd2a12bcf711411b62278b20542a42102624a1e860280bdfe10b77382d5a61c0d918b00005b403bdb7ee1f9121000abc5"]) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, 0xffffffffffffffff) 05:40:43 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x0, 0x800, 0x1}, 0x40) 05:40:43 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x1, 0x0) read$FUSE(r0, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r2, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) [ 1802.667360][ T26] audit: type=1326 audit(1634881243.636:3419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=21866 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f8d06d66a39 code=0x0 05:40:43 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x0, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./control\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="42b991afa0aa52249ae63a1f6cf3f8dcd56dbc75eac6ec8d12800cdb9f0990fe9091", @ANYRESDEC, @ANYBLOB="63384ff0e8e2f4b0d351f54f6b7acfcd7df526be923ce4d363098ab16fb6ce2797362f703012f5ff3375373d44b17a3ca5c4aadf65b91bde32bd0a155d3b9fa8db4b0a7bd3583cfbd98d19ea20008865357de099bcc47db073bc8c068074f2b1bafca86868d0cb234cea19c7fedc33f59fb3c9dfea28cc6ecb96f51557bcae333441372a534c4741c33f5e8c3072eac5cea5d27ac9a469423f5a2a8e7eb1e62933131205d7e910ee7dfabbc6522c557b49afc115fc", @ANYRESDEC=0x0, @ANYBLOB="2c616c6c6f775f6f746865722c246f6f74636f6e746578743db9a673797374656d63752c00d45511b384ddbcd997d79f0d3bd6ac324820d5ed9011a67a5fdda9a88fa38787b73741acd078d8741a4c7fd2a12bcf711411b62278b20542a42102624a1e860280bdfe10b77382d5a61c0d918b00005b403bdb7ee1f9121000abc5"]) syz_io_uring_complete(0x0) geteuid() r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:40:43 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0xa, 0x0, 0x0, 0x0, 0x0, {[@sack={0x4, 0xa, [0x0, 0x0]}, @sack={0x5, 0xa, [0x0, 0x0]}]}}}}}}}, 0x0) [ 1802.875681][ T4020] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 1802.878496][ T10] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 05:40:43 executing program 3: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r3, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:40:44 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./control\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="42b991afa0aa52249ae63a1f6cf3f8dcd56dbc75eac6ec8d12800cdb9f0990fe9091", @ANYRESDEC, @ANYBLOB="63384ff0e8e2f4b0d351f54f6b7acfcd7df526be923ce4d363098ab16fb6ce2797362f703012f5ff3375373d44b17a3ca5c4aadf65b91bde32bd0a155d3b9fa8db4b0a7bd3583cfbd98d19ea20008865357de099bcc47db073bc8c068074f2b1bafca86868d0cb234cea19c7fedc33f59fb3c9dfea28cc6ecb96f51557bcae333441372a534c4741c33f5e8c3072eac5cea5d27ac9a469423f5a2a8e7eb1e62933131205d7e910ee7dfabbc6522c557b49afc115fc", @ANYRESDEC=0x0, @ANYBLOB="2c616c6c6f775f6f746865722c246f6f74636f6e746578743db9a673797374656d63752c00d45511b384ddbcd997d79f0d3bd6ac324820d5ed9011a67a5fdda9a88fa38787b73741acd078d8741a4c7fd2a12bcf711411b62278b20542a42102624a1e860280bdfe10b77382d5a61c0d918b00005b403bdb7ee1f9121000abc5"]) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, 0xffffffffffffffff) 05:40:44 executing program 2: socketpair(0x25, 0x5, 0x3f, &(0x7f0000001240)) 05:40:44 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x0, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./control\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="42b991afa0aa52249ae63a1f6cf3f8dcd56dbc75eac6ec8d12800cdb9f0990fe9091", @ANYRESDEC, @ANYBLOB="63384ff0e8e2f4b0d351f54f6b7acfcd7df526be923ce4d363098ab16fb6ce2797362f703012f5ff3375373d44b17a3ca5c4aadf65b91bde32bd0a155d3b9fa8db4b0a7bd3583cfbd98d19ea20008865357de099bcc47db073bc8c068074f2b1bafca86868d0cb234cea19c7fedc33f59fb3c9dfea28cc6ecb96f51557bcae333441372a534c4741c33f5e8c3072eac5cea5d27ac9a469423f5a2a8e7eb1e62933131205d7e910ee7dfabbc6522c557b49afc115fc", @ANYRESDEC=0x0, @ANYBLOB="2c616c6c6f775f6f746865722c246f6f74636f6e746578743db9a673797374656d63752c00d45511b384ddbcd997d79f0d3bd6ac324820d5ed9011a67a5fdda9a88fa38787b73741acd078d8741a4c7fd2a12bcf711411b62278b20542a42102624a1e860280bdfe10b77382d5a61c0d918b00005b403bdb7ee1f9121000abc5"]) syz_io_uring_complete(0x0) geteuid() r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:40:44 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0xa, 0x0, 0x0, 0x0, 0x0, {[@sack={0x4, 0xa, [0x0, 0x0]}, @sack={0x5, 0xa, [0x0, 0x0]}]}}}}}}}, 0x0) 05:40:44 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 05:40:44 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./control\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="42b991afa0aa52249ae63a1f6cf3f8dcd56dbc75eac6ec8d12800cdb9f0990fe9091", @ANYRESDEC, @ANYBLOB="63384ff0e8e2f4b0d351f54f6b7acfcd7df526be923ce4d363098ab16fb6ce2797362f703012f5ff3375373d44b17a3ca5c4aadf65b91bde32bd0a155d3b9fa8db4b0a7bd3583cfbd98d19ea20008865357de099bcc47db073bc8c068074f2b1bafca86868d0cb234cea19c7fedc33f59fb3c9dfea28cc6ecb96f51557bcae333441372a534c4741c33f5e8c3072eac5cea5d27ac9a469423f5a2a8e7eb1e62933131205d7e910ee7dfabbc6522c557b49afc115fc", @ANYRESDEC=0x0, @ANYBLOB="2c616c6c6f775f6f746865722c246f6f74636f6e746578743db9a673797374656d63752c00d45511b384ddbcd997d79f0d3bd6ac324820d5ed9011a67a5fdda9a88fa38787b73741acd078d8741a4c7fd2a12bcf711411b62278b20542a42102624a1e860280bdfe10b77382d5a61c0d918b00005b403bdb7ee1f9121000abc5"]) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, 0xffffffffffffffff) 05:40:44 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000032140)={0x10, 0x4, 0x0, 0xd9}, 0x40) 05:40:44 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0xa, 0x0, 0x0, 0x0, 0x0, {[@sack={0x4, 0xa, [0x0, 0x0]}, @sack={0x5, 0xa, [0x0, 0x0]}]}}}}}}}, 0x0) 05:40:44 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x0, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./control\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="42b991afa0aa52249ae63a1f6cf3f8dcd56dbc75eac6ec8d12800cdb9f0990fe9091", @ANYRESDEC, @ANYBLOB="63384ff0e8e2f4b0d351f54f6b7acfcd7df526be923ce4d363098ab16fb6ce2797362f703012f5ff3375373d44b17a3ca5c4aadf65b91bde32bd0a155d3b9fa8db4b0a7bd3583cfbd98d19ea20008865357de099bcc47db073bc8c068074f2b1bafca86868d0cb234cea19c7fedc33f59fb3c9dfea28cc6ecb96f51557bcae333441372a534c4741c33f5e8c3072eac5cea5d27ac9a469423f5a2a8e7eb1e62933131205d7e910ee7dfabbc6522c557b49afc115fc", @ANYRESDEC=0x0, @ANYBLOB="2c616c6c6f775f6f746865722c246f6f74636f6e746578743db9a673797374656d63752c00d45511b384ddbcd997d79f0d3bd6ac324820d5ed9011a67a5fdda9a88fa38787b73741acd078d8741a4c7fd2a12bcf711411b62278b20542a42102624a1e860280bdfe10b77382d5a61c0d918b00005b403bdb7ee1f9121000abc5"]) syz_io_uring_complete(0x0) geteuid() r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) [ 1803.674933][T21904] loop7: detected capacity change from 0 to 1036 05:40:44 executing program 4: syz_emit_ethernet(0x52, &(0x7f0000000140)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0xc, 0x0, 0x0, 0x0, 0x0, {[@sack={0x4, 0xa, [0x0, 0x0]}, @md5sig={0x13, 0x12, "d36d43b30ea346f217a6079d942d51e5"}]}}}}}}}, 0x0) 05:40:44 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2, 0x11) socket$kcm(0xa, 0x5, 0x0) r0 = socket$kcm(0x2c, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='freezer.state\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r0, 0x11b, 0x6, &(0x7f0000000040)=r1, 0x20000044) 05:40:47 executing program 3: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r3, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:40:47 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) syz_io_uring_complete(0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, 0xffffffffffffffff) 05:40:47 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x0, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./control\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="42b991afa0aa52249ae63a1f6cf3f8dcd56dbc75eac6ec8d12800cdb9f0990fe9091", @ANYRESDEC, @ANYBLOB="63384ff0e8e2f4b0d351f54f6b7acfcd7df526be923ce4d363098ab16fb6ce2797362f703012f5ff3375373d44b17a3ca5c4aadf65b91bde32bd0a155d3b9fa8db4b0a7bd3583cfbd98d19ea20008865357de099bcc47db073bc8c068074f2b1bafca86868d0cb234cea19c7fedc33f59fb3c9dfea28cc6ecb96f51557bcae333441372a534c4741c33f5e8c3072eac5cea5d27ac9a469423f5a2a8e7eb1e62933131205d7e910ee7dfabbc6522c557b49afc115fc", @ANYRESDEC=0x0, @ANYBLOB="2c616c6c6f775f6f746865722c246f6f74636f6e746578743db9a673797374656d63752c00d45511b384ddbcd997d79f0d3bd6ac324820d5ed9011a67a5fdda9a88fa38787b73741acd078d8741a4c7fd2a12bcf711411b62278b20542a42102624a1e860280bdfe10b77382d5a61c0d918b00005b403bdb7ee1f9121000abc5"]) syz_io_uring_complete(0x0) geteuid() r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:40:47 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "d36d43b30ea346f217a6079d942d51e5"}]}}}}}}}, 0x0) 05:40:47 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2, 0x11) socket$kcm(0xa, 0x5, 0x0) r0 = socket$kcm(0x2c, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='freezer.state\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r0, 0x11b, 0x6, &(0x7f0000000040)=r1, 0x20000044) 05:40:47 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 05:40:47 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2, 0x11) socket$kcm(0xa, 0x5, 0x0) r0 = socket$kcm(0x2c, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='freezer.state\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r0, 0x11b, 0x6, &(0x7f0000000040)=r1, 0x20000044) 05:40:47 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) syz_io_uring_complete(0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, 0xffffffffffffffff) 05:40:47 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2, 0x11) socket$kcm(0xa, 0x5, 0x0) r0 = socket$kcm(0x2c, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='freezer.state\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r0, 0x11b, 0x6, &(0x7f0000000040)=r1, 0x20000044) 05:40:47 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x0, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./control\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="42b991afa0aa52249ae63a1f6cf3f8dcd56dbc75eac6ec8d12800cdb9f0990fe9091", @ANYRESDEC, @ANYBLOB="63384ff0e8e2f4b0d351f54f6b7acfcd7df526be923ce4d363098ab16fb6ce2797362f703012f5ff3375373d44b17a3ca5c4aadf65b91bde32bd0a155d3b9fa8db4b0a7bd3583cfbd98d19ea20008865357de099bcc47db073bc8c068074f2b1bafca86868d0cb234cea19c7fedc33f59fb3c9dfea28cc6ecb96f51557bcae333441372a534c4741c33f5e8c3072eac5cea5d27ac9a469423f5a2a8e7eb1e62933131205d7e910ee7dfabbc6522c557b49afc115fc", @ANYRESDEC=0x0, @ANYBLOB="2c616c6c6f775f6f746865722c246f6f74636f6e746578743db9a673797374656d63752c00d45511b384ddbcd997d79f0d3bd6ac324820d5ed9011a67a5fdda9a88fa38787b73741acd078d8741a4c7fd2a12bcf711411b62278b20542a42102624a1e860280bdfe10b77382d5a61c0d918b00005b403bdb7ee1f9121000abc5"]) syz_io_uring_complete(0x0) geteuid() r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:40:47 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg(r0, &(0x7f0000000380)={&(0x7f00000004c0)=@sco={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0x80, &(0x7f0000000c40)=[{&(0x7f0000000080)="00a2b62483f984c77f4b4b27b5f97bc3fa2ca600dbd106db7ecf7e85039ff93597992e7757830be36207a50522467a9dbc4f61b315bfd7fde67d54093b109dee", 0x40}, {&(0x7f0000000780)="0e3f5bf7f01a01dd26ee2293b1696f8d7fa5c74767999940d6be9893de9d347e95c86e0019a23bb13a26aee2685328f9736c4ecd5197d6381c15ffa5e8b1d13ed93da4f4746218ee78b034135189f93f2282adfa765d8c697850c00d51c0f67c3f2b697d4aeadd70be962bb6ee9e4863a4a74a0ad46012b150d57fb09b5737797c59728868c3d46f6d48cce1abba", 0x8e}, {&(0x7f0000000840)="609ba0c29e5458ab61a4151b0f33ce07204c1c186c210724f643a9069eaa0fc844a510003c21a7fd99fb891bbd105d3583031def8f5c6c2e15d4c25aac2fe7b09233200c1ac65fda6e581a8593a3e60b28b923250d117afbd9e8fd14a58894a654ed962b078d8e3aa7e189b36fb8137e8f995c8ed220a5cbbf3697b96a0dc3d4bf802839b47e830be2b4bbe9bd239fb8acaff0f512d289ff033d70ade418ee1203a7a364703fc5d1a8519c95b8742762343015d0d2f04b8a3faab8c8ace91ee9ed5da5a5a8d1eb0774a2b58116162f228b4ba34bf72aa18afa2359a6f735a238e42730e5dd364bb543d18ef5ef21ae1fe414dd9789", 0xf5}, {0x0}, {0x0}, {&(0x7f0000000a00)="6dc2672fac732a3504e8e3cc3c55fb70a9372e7d8c0bb0b3b31994b758e4a06d74a7c39c2bf64bbac007974855e878feaaa439f08e4e7d88c7d96c", 0x3b}, {&(0x7f0000000a80)="6c6c722b390fa7adbf765bffa3ab92bbdc6323ebf20d7410eea19b02855fc622c744d1c37bee4f626ee4da15921fe30b59fc6f4d34add9977f3f8c31759c111890dbb9e5342c399393f950edc9a1d75f12f898b7d57e99001cf3f3b9bc329603927e0fb7de6d1e023f2b91d98ee5f111428f5d4284dac8c40e6d37049c933be60fca87ce124b49b113e6601ac300bbf356444ac94b83813866b84ca6d9643cd71f23d2d02ae2fba441943fa220428cc7c9e33c2002fb2f98981531bdbf849d42f062407c7086ce5535f6597cc21c", 0xce}, {&(0x7f0000000b80)="75f8500f489b30c6fb92166b95f55b78723df0566dd41a1fb9a4ad742518ac9fb4b1821a02d5b16d6ae725ae663742989eb09a04711661f911d4db749f0ac296c18d6cfd54dedba512086d14bb56becf5150de5498255159bad01729f75de9c6569a1d73feb873f3c2ac32b1c26cd9330f0c9d62464344b76eb16f77a55e6ec3", 0x80}, {&(0x7f0000000200)="9b0676670ae7", 0x6}], 0x9, &(0x7f0000000d00)=[{0xb0, 0x11, 0xfffffff9, "101ddc9d51b5c658ce783db35aa00d7e816cd4797fcf60603fe78372eaf613178117b477a2a22a396e68aa74607c6c5fb826f3b53814d09975544bc17a78b7bbcde861b05aeee3a668bea3fdff60553f90660276be08f22e2b3e8a96cbfa435b3f7a4552de7d524d3731b825d9ccc6336b0967bb704a583006121cf920f74930e706827d6fc10533026329f128d19b02bcf870a4d0bfc1ee3b1930c42a39635e"}, {0x38, 0x10d, 0x9e0, "dcf05e468c0ae621d7f02f7719a06802ed9e63e669e78fc5fbb6fa5467fac474cbdb35a3"}, {0x10, 0x10c, 0x2}, {0x50, 0x114, 0x3, "95cea7c9cbe297707313282c5db285454a1630e5af1745971914136d98a53557eb6e799cc25419fc1a19757c7422cf5f84d379e1cebc12fd4e9b86a30cc9"}, {0x28, 0x29, 0x7, "e786a78a423f8adf33aa626ed444c02bbe"}, {0x28, 0x314, 0x8001, "91f0577345eda2af02536e059653085f8a"}, {0x60, 0x0, 0x80000000, "d2a4b75fb0c5806c5dd2469453cc410bd496bb5304a7af2620a3aca14e771df63f20cb42bc44f18ea8c390a2e1608edf978e42d755267fd8aa9b8b4ffdebdafdf0bf0d8bd6c80704870a8c68a2a0fda5"}, {0x68, 0x10c, 0x9, "9b904eba71ba02bfb83f1f34204dd41ce7d112fb3f85be7d46340facba23f3460510831685d9135e387d520f16d182eba3cc6b10e9141f22de5089aa6087f160e77f2e71adfa3ce6a466e43e2fe40c99403a00"}, {0xb0, 0x109, 0x40, "fc0a17b0974d4a47cfad7dde9f218308a02a535d677d856028c6a3bcfedf19fefdd4260ddc5469530f85002758778dbd80019f2de0e1fee3225980fa9bccd4c25902682946243eab23a1d4df39871133f4cc27720e08e73fb64b1f1e53c37fcdb311d7fa5542ff14c7c4e6928f3d7a2163ffeb1c94cafb73916e0273756aca5a6ff7fcac481bfe29f0bf49e97220a0d0f4cb7255806949bff6f210ee00"}], 0x310}, 0x20000000) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x200000, 0xffffffffffffffff, 0x9) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) socket$kcm(0x10, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)="2e00000010008188040f80ec800000000000000026000000e3bdeefb44004f000e000a0010000b2fd6130f97d80a", 0x2e}], 0x1}, 0x0) 05:40:47 executing program 2: timer_create(0x0, 0x0, &(0x7f0000000180)) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, r0+60000000}, {0x0, r1+60000000}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x3938700}}, &(0x7f00000000c0)) [ 1806.982129][T21954] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 1807.103997][T21954] team0: Port device team_slave_0 removed [ 1807.161326][T21960] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 1808.642406][ T10] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 1808.654612][ T4020] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 05:40:50 executing program 3: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r3, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:40:50 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x0, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./control\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="42b991afa0aa52249ae63a1f6cf3f8dcd56dbc75eac6ec8d12800cdb9f0990fe9091", @ANYRESDEC, @ANYBLOB="63384ff0e8e2f4b0d351f54f6b7acfcd7df526be923ce4d363098ab16fb6ce2797362f703012f5ff3375373d44b17a3ca5c4aadf65b91bde32bd0a155d3b9fa8db4b0a7bd3583cfbd98d19ea20008865357de099bcc47db073bc8c068074f2b1bafca86868d0cb234cea19c7fedc33f59fb3c9dfea28cc6ecb96f51557bcae333441372a534c4741c33f5e8c3072eac5cea5d27ac9a469423f5a2a8e7eb1e62933131205d7e910ee7dfabbc6522c557b49afc115fc", @ANYRESDEC=0x0, @ANYBLOB="2c616c6c6f775f6f746865722c246f6f74636f6e746578743db9a673797374656d63752c00d45511b384ddbcd997d79f0d3bd6ac324820d5ed9011a67a5fdda9a88fa38787b73741acd078d8741a4c7fd2a12bcf711411b62278b20542a42102624a1e860280bdfe10b77382d5a61c0d918b00005b403bdb7ee1f9121000abc5"]) syz_io_uring_complete(0x0) geteuid() r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:40:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:40:50 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 05:40:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$SIOCGSTAMP(r1, 0x8906, 0x0) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) 05:40:50 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$getflags(r0, 0x401) syz_open_dev$tty1(0xc, 0x4, 0x1) 05:40:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:40:50 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000002240), 0x2442, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000004b40)={0xb0, 0x0, 0x0, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}, {0x0, 0x0, 0x1, 0x0, '$'}}]}, 0xfa4) 05:40:50 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$getflags(r0, 0x401) syz_open_dev$tty1(0xc, 0x4, 0x1) 05:40:50 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x0, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./control\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="42b991afa0aa52249ae63a1f6cf3f8dcd56dbc75eac6ec8d12800cdb9f0990fe9091", @ANYRESDEC, @ANYBLOB="63384ff0e8e2f4b0d351f54f6b7acfcd7df526be923ce4d363098ab16fb6ce2797362f703012f5ff3375373d44b17a3ca5c4aadf65b91bde32bd0a155d3b9fa8db4b0a7bd3583cfbd98d19ea20008865357de099bcc47db073bc8c068074f2b1bafca86868d0cb234cea19c7fedc33f59fb3c9dfea28cc6ecb96f51557bcae333441372a534c4741c33f5e8c3072eac5cea5d27ac9a469423f5a2a8e7eb1e62933131205d7e910ee7dfabbc6522c557b49afc115fc", @ANYRESDEC=0x0, @ANYBLOB="2c616c6c6f775f6f746865722c246f6f74636f6e746578743db9a673797374656d63752c00d45511b384ddbcd997d79f0d3bd6ac324820d5ed9011a67a5fdda9a88fa38787b73741acd078d8741a4c7fd2a12bcf711411b62278b20542a42102624a1e860280bdfe10b77382d5a61c0d918b00005b403bdb7ee1f9121000abc5"]) syz_io_uring_complete(0x0) geteuid() r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:40:50 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$getflags(r0, 0x401) syz_open_dev$tty1(0xc, 0x4, 0x1) 05:40:50 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) io_cancel(0x0, 0x0, 0x0) 05:40:53 executing program 3: timer_create(0x0, 0x0, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r3, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:40:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:40:53 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$getflags(r0, 0x401) syz_open_dev$tty1(0xc, 0x4, 0x1) 05:40:53 executing program 2: socketpair(0x23, 0x0, 0x0, &(0x7f0000000280)) 05:40:53 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x0, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./control\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="42b991afa0aa52249ae63a1f6cf3f8dcd56dbc75eac6ec8d12800cdb9f0990fe9091", @ANYRESDEC, @ANYBLOB="63384ff0e8e2f4b0d351f54f6b7acfcd7df526be923ce4d363098ab16fb6ce2797362f703012f5ff3375373d44b17a3ca5c4aadf65b91bde32bd0a155d3b9fa8db4b0a7bd3583cfbd98d19ea20008865357de099bcc47db073bc8c068074f2b1bafca86868d0cb234cea19c7fedc33f59fb3c9dfea28cc6ecb96f51557bcae333441372a534c4741c33f5e8c3072eac5cea5d27ac9a469423f5a2a8e7eb1e62933131205d7e910ee7dfabbc6522c557b49afc115fc", @ANYRESDEC=0x0, @ANYBLOB="2c616c6c6f775f6f746865722c246f6f74636f6e746578743db9a673797374656d63752c00d45511b384ddbcd997d79f0d3bd6ac324820d5ed9011a67a5fdda9a88fa38787b73741acd078d8741a4c7fd2a12bcf711411b62278b20542a42102624a1e860280bdfe10b77382d5a61c0d918b00005b403bdb7ee1f9121000abc5"]) syz_io_uring_complete(0x0) geteuid() pwritev(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r1, 0x4c00, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:40:53 executing program 0: syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000000)={{0x12, 0x1, 0x310, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}}}}]}}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0}) 05:40:53 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) write$cgroup_netprio_ifpriomap(r0, 0x0, 0x803e) 05:40:53 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) syz_io_uring_complete(0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, 0xffffffffffffffff) 05:40:53 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x4, &(0x7f0000000200)=@framed={{}, [@jmp={0x4, 0x0, 0x6, 0xa}]}, &(0x7f0000000040)='GPL\x00', 0x5, 0xea, &(0x7f0000000100)=""/234, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:40:53 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x0, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./control\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="42b991afa0aa52249ae63a1f6cf3f8dcd56dbc75eac6ec8d12800cdb9f0990fe9091", @ANYRESDEC, @ANYBLOB="63384ff0e8e2f4b0d351f54f6b7acfcd7df526be923ce4d363098ab16fb6ce2797362f703012f5ff3375373d44b17a3ca5c4aadf65b91bde32bd0a155d3b9fa8db4b0a7bd3583cfbd98d19ea20008865357de099bcc47db073bc8c068074f2b1bafca86868d0cb234cea19c7fedc33f59fb3c9dfea28cc6ecb96f51557bcae333441372a534c4741c33f5e8c3072eac5cea5d27ac9a469423f5a2a8e7eb1e62933131205d7e910ee7dfabbc6522c557b49afc115fc", @ANYRESDEC=0x0, @ANYBLOB="2c616c6c6f775f6f746865722c246f6f74636f6e746578743db9a673797374656d63752c00d45511b384ddbcd997d79f0d3bd6ac324820d5ed9011a67a5fdda9a88fa38787b73741acd078d8741a4c7fd2a12bcf711411b62278b20542a42102624a1e860280bdfe10b77382d5a61c0d918b00005b403bdb7ee1f9121000abc5"]) syz_io_uring_complete(0x0) geteuid() pwritev(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r1, 0x4c00, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:40:53 executing program 2: r0 = getpgrp(0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000000)=0x7ff) [ 1812.937005][ T9563] usb 1-1: new high-speed USB device number 18 using dummy_hcd 05:40:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x14, r1, 0x1}, 0x14}}, 0x0) [ 1813.411735][ T9563] usb 1-1: unable to get BOS descriptor or descriptor too short [ 1813.493319][ T9563] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1813.504264][ T9563] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1813.514126][ T9563] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 1813.523936][ T9563] usb 1-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 0 [ 1813.533747][ T9563] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 1813.543480][ T9563] usb 1-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 0 [ 1813.761671][ T9563] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1813.770755][ T9563] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1813.779111][ T9563] usb 1-1: Product: syz [ 1813.783357][ T9563] usb 1-1: Manufacturer: syz [ 1813.788314][ T9563] usb 1-1: SerialNumber: syz [ 1814.142582][ T9563] cdc_ncm 1-1:1.0: bind() failure [ 1814.151250][ T9563] cdc_ncm 1-1:1.1: CDC Union missing and no IAD found [ 1814.158777][ T9563] cdc_ncm 1-1:1.1: bind() failure [ 1814.200071][ T9563] usb 1-1: USB disconnect, device number 18 [ 1814.393310][ T8901] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 1814.921554][ T9563] usb 1-1: new high-speed USB device number 19 using dummy_hcd [ 1815.391558][ T9563] usb 1-1: unable to get BOS descriptor or descriptor too short [ 1815.471623][ T9563] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1815.483050][ T9563] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1815.493203][ T9563] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 1815.503091][ T9563] usb 1-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 0 05:40:56 executing program 3: timer_create(0x0, 0x0, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r3, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:40:56 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) syz_io_uring_complete(0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, 0xffffffffffffffff) 05:40:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000340)={0x3c, r1, 0x9c70b2ccf1fd8c2f, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x28, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xa6b}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}]}]}, 0x3c}}, 0x0) 05:40:56 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x0, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./control\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="42b991afa0aa52249ae63a1f6cf3f8dcd56dbc75eac6ec8d12800cdb9f0990fe9091", @ANYRESDEC, @ANYBLOB="63384ff0e8e2f4b0d351f54f6b7acfcd7df526be923ce4d363098ab16fb6ce2797362f703012f5ff3375373d44b17a3ca5c4aadf65b91bde32bd0a155d3b9fa8db4b0a7bd3583cfbd98d19ea20008865357de099bcc47db073bc8c068074f2b1bafca86868d0cb234cea19c7fedc33f59fb3c9dfea28cc6ecb96f51557bcae333441372a534c4741c33f5e8c3072eac5cea5d27ac9a469423f5a2a8e7eb1e62933131205d7e910ee7dfabbc6522c557b49afc115fc", @ANYRESDEC=0x0, @ANYBLOB="2c616c6c6f775f6f746865722c246f6f74636f6e746578743db9a673797374656d63752c00d45511b384ddbcd997d79f0d3bd6ac324820d5ed9011a67a5fdda9a88fa38787b73741acd078d8741a4c7fd2a12bcf711411b62278b20542a42102624a1e860280bdfe10b77382d5a61c0d918b00005b403bdb7ee1f9121000abc5"]) syz_io_uring_complete(0x0) geteuid() pwritev(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r1, 0x4c00, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:40:56 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x4, &(0x7f0000000200)=@framed={{}, [@func]}, &(0x7f0000000040)='GPL\x00', 0x7, 0xea, &(0x7f0000000100)=""/234, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1815.513007][ T9563] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 1815.522732][ T9563] usb 1-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 0 05:40:56 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x4, 0x0, &(0x7f0000000200)) [ 1815.752415][ T9563] usb 1-1: string descriptor 0 read error: -71 [ 1815.758768][ T9563] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1815.767965][ T9563] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 05:40:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = gettid() sendmsg$unix(r0, &(0x7f0000003140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003100)=[@cred={{0x1c, 0x1, 0x2, {r1}}}], 0x20}, 0x0) 05:40:56 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x0, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./control\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="42b991afa0aa52249ae63a1f6cf3f8dcd56dbc75eac6ec8d12800cdb9f0990fe9091", @ANYRESDEC, @ANYBLOB="63384ff0e8e2f4b0d351f54f6b7acfcd7df526be923ce4d363098ab16fb6ce2797362f703012f5ff3375373d44b17a3ca5c4aadf65b91bde32bd0a155d3b9fa8db4b0a7bd3583cfbd98d19ea20008865357de099bcc47db073bc8c068074f2b1bafca86868d0cb234cea19c7fedc33f59fb3c9dfea28cc6ecb96f51557bcae333441372a534c4741c33f5e8c3072eac5cea5d27ac9a469423f5a2a8e7eb1e62933131205d7e910ee7dfabbc6522c557b49afc115fc", @ANYRESDEC=0x0, @ANYBLOB="2c616c6c6f775f6f746865722c246f6f74636f6e746578743db9a673797374656d63752c00d45511b384ddbcd997d79f0d3bd6ac324820d5ed9011a67a5fdda9a88fa38787b73741acd078d8741a4c7fd2a12bcf711411b62278b20542a42102624a1e860280bdfe10b77382d5a61c0d918b00005b403bdb7ee1f9121000abc5"]) syz_io_uring_complete(0x0) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:40:56 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) syz_io_uring_complete(0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, 0xffffffffffffffff) 05:40:56 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x4, &(0x7f0000000200)=@framed={{}, [@jmp={0x4, 0x1, 0x6}]}, &(0x7f0000000040)='GPL\x00', 0x5, 0xea, &(0x7f0000000100)=""/234, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1815.921820][ T9563] usb 1-1: can't set config #1, error -71 [ 1815.949804][ T9563] usb 1-1: USB disconnect, device number 19 05:40:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x2c, 0x0, 0x0) 05:40:57 executing program 2: syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x2, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}}}]}}]}}, 0x0) [ 1816.601374][ T9563] usb 3-1: new high-speed USB device number 31 using dummy_hcd [ 1816.892257][ T9563] usb 3-1: Using ep0 maxpacket: 8 [ 1817.013589][ T9563] usb 3-1: config 1 has an invalid interface descriptor of length 2, skipping [ 1817.022922][ T9563] usb 3-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 1817.034151][ T9563] usb 3-1: config 1 has 0 interfaces, different from the descriptor's value: 1 [ 1817.231938][ T9563] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1817.241379][ T9563] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1817.249382][ T9563] usb 3-1: Product: syz [ 1817.253783][ T9563] usb 3-1: Manufacturer: syz [ 1817.258404][ T9563] usb 3-1: SerialNumber: syz [ 1817.526797][ T9563] usb 3-1: USB disconnect, device number 31 [ 1818.231757][ T5453] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 1818.311305][ T8548] usb 3-1: new high-speed USB device number 32 using dummy_hcd [ 1818.551720][ T8548] usb 3-1: Using ep0 maxpacket: 8 05:40:59 executing program 3: timer_create(0x0, 0x0, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r3, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:40:59 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) syz_io_uring_complete(0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, 0xffffffffffffffff) 05:40:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x6, 0x6, &(0x7f00000002c0)={0x8}, 0x8) 05:40:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x32, 0x0, 0x0) 05:40:59 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x0, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./control\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="42b991afa0aa52249ae63a1f6cf3f8dcd56dbc75eac6ec8d12800cdb9f0990fe9091", @ANYRESDEC, @ANYBLOB="63384ff0e8e2f4b0d351f54f6b7acfcd7df526be923ce4d363098ab16fb6ce2797362f703012f5ff3375373d44b17a3ca5c4aadf65b91bde32bd0a155d3b9fa8db4b0a7bd3583cfbd98d19ea20008865357de099bcc47db073bc8c068074f2b1bafca86868d0cb234cea19c7fedc33f59fb3c9dfea28cc6ecb96f51557bcae333441372a534c4741c33f5e8c3072eac5cea5d27ac9a469423f5a2a8e7eb1e62933131205d7e910ee7dfabbc6522c557b49afc115fc", @ANYRESDEC=0x0, @ANYBLOB="2c616c6c6f775f6f746865722c246f6f74636f6e746578743db9a673797374656d63752c00d45511b384ddbcd997d79f0d3bd6ac324820d5ed9011a67a5fdda9a88fa38787b73741acd078d8741a4c7fd2a12bcf711411b62278b20542a42102624a1e860280bdfe10b77382d5a61c0d918b00005b403bdb7ee1f9121000abc5"]) syz_io_uring_complete(0x0) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) [ 1818.691369][ T8548] usb 3-1: config 1 has an invalid interface descriptor of length 2, skipping [ 1818.700277][ T8548] usb 3-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 1818.710550][ T8548] usb 3-1: config 1 has 0 interfaces, different from the descriptor's value: 1 05:40:59 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xf0ff7f}}, 0x0) 05:40:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000680)={0x14, r1, 0x1}, 0x14}}, 0x0) 05:40:59 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) syz_io_uring_complete(0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, 0xffffffffffffffff) 05:41:00 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x0, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./control\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="42b991afa0aa52249ae63a1f6cf3f8dcd56dbc75eac6ec8d12800cdb9f0990fe9091", @ANYRESDEC, @ANYBLOB="63384ff0e8e2f4b0d351f54f6b7acfcd7df526be923ce4d363098ab16fb6ce2797362f703012f5ff3375373d44b17a3ca5c4aadf65b91bde32bd0a155d3b9fa8db4b0a7bd3583cfbd98d19ea20008865357de099bcc47db073bc8c068074f2b1bafca86868d0cb234cea19c7fedc33f59fb3c9dfea28cc6ecb96f51557bcae333441372a534c4741c33f5e8c3072eac5cea5d27ac9a469423f5a2a8e7eb1e62933131205d7e910ee7dfabbc6522c557b49afc115fc", @ANYRESDEC=0x0, @ANYBLOB="2c616c6c6f775f6f746865722c246f6f74636f6e746578743db9a673797374656d63752c00d45511b384ddbcd997d79f0d3bd6ac324820d5ed9011a67a5fdda9a88fa38787b73741acd078d8741a4c7fd2a12bcf711411b62278b20542a42102624a1e860280bdfe10b77382d5a61c0d918b00005b403bdb7ee1f9121000abc5"]) syz_io_uring_complete(0x0) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) [ 1818.971306][ T8548] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1818.980542][ T8548] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1818.988825][ T8548] usb 3-1: Product: syz [ 1818.993091][ T8548] usb 3-1: Manufacturer: syz [ 1818.997739][ T8548] usb 3-1: SerialNumber: syz 05:41:00 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) [ 1819.205970][T22145] loop7: detected capacity change from 0 to 1036 05:41:00 executing program 4: io_setup(0x9, &(0x7f0000000000)=0x0) io_cancel(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 05:41:00 executing program 2: r0 = socket(0x2, 0x3, 0x1) bind$unix(r0, &(0x7f0000000000)=@abs={0x2, 0x0, 0x4e24}, 0x6e) [ 1819.343032][ T8548] usb 3-1: USB disconnect, device number 32 [ 1820.153198][ T8901] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 05:41:02 executing program 3: timer_create(0x0, &(0x7f0000000040), &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r3, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:41:02 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) syz_io_uring_complete(0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, 0xffffffffffffffff) 05:41:02 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x0, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./control\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="42b991afa0aa52249ae63a1f6cf3f8dcd56dbc75eac6ec8d12800cdb9f0990fe9091", @ANYRESDEC, @ANYBLOB="63384ff0e8e2f4b0d351f54f6b7acfcd7df526be923ce4d363098ab16fb6ce2797362f703012f5ff3375373d44b17a3ca5c4aadf65b91bde32bd0a155d3b9fa8db4b0a7bd3583cfbd98d19ea20008865357de099bcc47db073bc8c068074f2b1bafca86868d0cb234cea19c7fedc33f59fb3c9dfea28cc6ecb96f51557bcae333441372a534c4741c33f5e8c3072eac5cea5d27ac9a469423f5a2a8e7eb1e62933131205d7e910ee7dfabbc6522c557b49afc115fc", @ANYRESDEC=0x0, @ANYBLOB="2c616c6c6f775f6f746865722c246f6f74636f6e746578743db9a673797374656d63752c00d45511b384ddbcd997d79f0d3bd6ac324820d5ed9011a67a5fdda9a88fa38787b73741acd078d8741a4c7fd2a12bcf711411b62278b20542a42102624a1e860280bdfe10b77382d5a61c0d918b00005b403bdb7ee1f9121000abc5"]) geteuid() r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:02 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, r1, 0x1, 0x0, 0x0, {{}, {}, {0x14, 0x19, {0x80000001, 0x0, 0x0, 0x7}}}}, 0x30}}, 0x0) 05:41:02 executing program 2: bpf$BPF_PROG_DETACH(0xb, &(0x7f0000000000)={@cgroup, 0xffffffffffffffff, 0x11}, 0x10) 05:41:02 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000009c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0xffffff24, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}]}, 0x20}}, 0x0) [ 1821.997170][T22185] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1822.073161][T22186] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 05:41:03 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) syz_io_uring_complete(0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, 0xffffffffffffffff) 05:41:03 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x2, 0x14, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x6}]}, 0x30}}, 0x0) 05:41:03 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x4, &(0x7f0000000200)=@framed={{}, [@jmp={0x5, 0x0, 0x2, 0x0, 0x6}]}, &(0x7f0000000040)='GPL\x00', 0x7, 0xea, &(0x7f0000000100)=""/234, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:41:03 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) bind$tipc(r0, &(0x7f0000000140)=@nameseq={0x1e, 0x1, 0x0, {0x2}}, 0x10) 05:41:03 executing program 0: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f00000000c0)={0x41, 0x0, 0x3}, 0x10) 05:41:03 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x4, &(0x7f0000000200)=@framed={{}, [@jmp={0x5, 0x0, 0x0, 0x5}]}, &(0x7f0000000040)='GPL\x00', 0x7, 0xea, &(0x7f0000000100)=""/234, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1822.647761][T22207] tipc: Can't bind to reserved service type 2 [ 1822.678575][T22202] I/O error, dev loop7, sector 768 op 0x0:(READ) flags 0x80700 phys_seg 32 prio class 0 [ 1823.351485][ T5453] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 05:41:06 executing program 3: timer_create(0x0, &(0x7f0000000040), &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r3, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:41:06 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x0, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) geteuid() r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:06 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) syz_io_uring_complete(0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, 0xffffffffffffffff) 05:41:06 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000140)=""/215, &(0x7f0000000100)=0xd7) 05:41:06 executing program 0: eventfd2(0x0, 0xce52da9b185b365d) 05:41:06 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000200)=""/8, 0x8}], 0x2, &(0x7f0000000880)=[{&(0x7f00000003c0)=""/142, 0x8e}, {0x0}], 0x2, 0x0) [ 1825.216451][T22228] loop7: detected capacity change from 0 to 1036 [ 1825.281271][ T4020] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 05:41:06 executing program 0: mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) 05:41:06 executing program 2: accept$unix(0xffffffffffffffff, &(0x7f0000000000), 0x0) 05:41:06 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x0, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) geteuid() r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:06 executing program 4: r0 = socket$inet6(0x18, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1001, 0x0, 0x0) 05:41:06 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) syz_io_uring_complete(0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, 0xffffffffffffffff) 05:41:06 executing program 2: mprotect(&(0x7f0000ff6000/0x3000)=nil, 0x3000, 0x7) 05:41:09 executing program 4: lchown(&(0x7f0000000240)='.\x00', 0x0, 0x0) munmap(&(0x7f0000003000/0x3000)=nil, 0x3000) 05:41:09 executing program 3: timer_create(0x0, &(0x7f0000000040), &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r3, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:41:09 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, 0x0, 0x0) 05:41:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000003600)='./file0\x00', 0x10b341, 0x0) write$FUSE_ATTR(r0, 0x0, 0x0) 05:41:09 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) syz_io_uring_complete(0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, 0xffffffffffffffff) 05:41:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) geteuid() r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r2, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r2) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:09 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001180), 0x2, 0x0) r1 = inotify_init1(0x0) fcntl$dupfd(r1, 0x0, r0) 05:41:09 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0xa000031b) 05:41:09 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) syz_io_uring_complete(0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) 05:41:09 executing program 4: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0xb0000309) 05:41:09 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) syz_io_uring_complete(0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) 05:41:09 executing program 0: openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.pending_reads\x00', 0x20040, 0x31) 05:41:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) geteuid() r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r2, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r2) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) [ 1829.111823][ T5453] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 1831.031896][ T9754] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 05:41:12 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, 0x0) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r3, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:41:12 executing program 2: mknodat$null(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x103) fchownat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xee00, 0xffffffffffffffff, 0x0) 05:41:12 executing program 4: pipe2$9p(&(0x7f0000005280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERROR(r0, 0x0, 0x2) 05:41:12 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r1 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) syz_io_uring_complete(0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) 05:41:12 executing program 0: io_setup(0x0, &(0x7f0000000000)=0x0) r1 = inotify_init() io_submit(r0, 0x1, &(0x7f00000030c0)=[&(0x7f0000002d80)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 05:41:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:12 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) syz_io_uring_complete(0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, 0xffffffffffffffff) 05:41:12 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, 0x0) 05:41:12 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$char_usb(r0, &(0x7f00000000c0), 0x0) 05:41:12 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/fs/cgroup', 0x292040, 0x22) 05:41:12 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) syz_io_uring_complete(0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, 0xffffffffffffffff) 05:41:12 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000001080), 0x353040, 0x0) [ 1832.238975][T22345] I/O error, dev loop7, sector 512 op 0x0:(READ) flags 0x80700 phys_seg 32 prio class 0 05:41:15 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, 0x0) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r3, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:41:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:15 executing program 4: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x701840, 0x0) 05:41:15 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0xcc, &(0x7f0000000040), 0x0) 05:41:15 executing program 2: r0 = semget$private(0x0, 0x4, 0x0) semctl$GETNCNT(r0, 0x3, 0xe, &(0x7f0000000000)=""/30) 05:41:15 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) syz_io_uring_complete(0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, 0xffffffffffffffff) [ 1834.694547][T22366] loop7: detected capacity change from 0 to 1036 05:41:15 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, r0, 0x8) syz_io_uring_complete(0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, 0xffffffffffffffff) 05:41:15 executing program 2: r0 = eventfd2(0x0, 0x0) write$eventfd(r0, &(0x7f00000000c0), 0x8) 05:41:15 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/class/power_supply', 0x0, 0x0) getsockopt$inet6_mtu(r0, 0x29, 0x17, 0x0, 0x0) 05:41:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:15 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/fs/cgroup', 0x0, 0x0) getsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) [ 1834.870951][ T9754] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 05:41:16 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendto$inet6(r1, &(0x7f0000000000)="ca", 0x1, 0x0, &(0x7f0000000080)={0x1c, 0x1c, 0x1}, 0x1c) [ 1835.124228][T22383] I/O error, dev loop7, sector 296 op 0x0:(READ) flags 0x80700 phys_seg 27 prio class 0 [ 1836.790324][ T9754] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 05:41:18 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, 0x0) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r3, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:41:18 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) 05:41:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:18 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) 05:41:18 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:18 executing program 2: open(0x0, 0x1, 0x0) [ 1837.751681][T22420] loop7: detected capacity change from 0 to 1036 05:41:18 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:18 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x2}, 0x1c) 05:41:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_buf(r0, 0x0, 0x9, &(0x7f0000000080)="caa844d9", 0x4) 05:41:18 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect(r0, &(0x7f0000000040)=@in6={0x1c, 0x1c, 0x1}, 0x1c) 05:41:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:19 executing program 2: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@in6={0x1c, 0x1c, 0x2}, 0x1c) [ 1839.990682][ T54] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 05:41:21 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r3, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:41:21 executing program 5: r0 = syz_open_dev$loop(0x0, 0x7f, 0x182) r1 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:21 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000280)={0x1c, 0x1c, 0x3}, 0x1c) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x901, &(0x7f0000000000)={0x0, 0x6, 0x1, [0x0]}, 0xa) 05:41:21 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendmsg(r0, &(0x7f0000001740)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f0000001440)=[{&(0x7f0000000080)='v', 0x1}], 0x1}, 0x0) 05:41:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:21 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendmsg(r0, &(0x7f0000001180)={&(0x7f00000010c0)=@in6={0x0, 0x1c}, 0x8, &(0x7f0000001040)=[{&(0x7f0000000040)="14f87323f414889ebbf614fb02cece0d934d426efda2d4e485c10d376e8afb38276378a17d6d9cc1bd693346239fc1267a4431c4b889acde894494d6be7ca9a3713a8784f56f36f25e72250dc429c23939b6aa76fa4970f6dec3b705018189ced3ade724addefa17c2c586f4c722b5e4c1034a3f478ef0c7f40e03a34f90a8d2910ba6c5b45bb7c29c7e52fddafcef8673fab53c2055bb67ff20185e2cec327870d55e2d440928d0f09be6a363096851b6a379744c6b9a0363614535ec935d0bee8b6d6aae49e09e8cdffcb7ca653b78fc1564553790689e7e7f984ea296148ea3c558e56a36bed2f98e5793a9167bcd22aeadf66055821e5db1ec51b2e4d227b46ddee62a1d85373daee78b5dedc76511bc8c86ed8cfc58f18196fd4f0e398f1d8f73424ea39c2e1eb3ba109e6e816b34ff4783c5758f90fed7ba41b76ba24f8712116df7582008cd981a2f4a0e6e0ae17fe8bff55e5089bf02ff7332991d8d98f4cbd6f504b600fc1fca14db3a70c048138376d5b60ae34dd048e5c307e870efbd0b51385e29246c04f7f870fd3fdcf8a8742fdc933aadca330387aa61acc5ec2987af0949489d7745775ba055a27f1e05f31685b64535c61ac0322c8676b1cd56fc1a02f4e3835d9ac154c9bfa57889face1480e8749916be0f288ec5611c83bd898d559cab7a4251feb139ebd97b39ded312d1f1f50d58adcbd56edf75ddeac1f53c1e54d2565c6a2e86a752d2782a92ff0f837560178a44628e38f0e3b0ad446b54db8d39f07356aa0bd2252b493b79a2641eb515e24c9e0e3b4ff9efd45abfaef66ffe90d2b525beed259569d538c7b0ccdc6b7c352dac6d22013f49830254a2dcd47dfd0b80d4fd024200a6b0dadb63c879cae83cc20957399ed6739724c1b401e37278c74c81166c84842e62b42182c3dbe53cb36800dab67419a1b0177f2d6a9f1285991fef40c8b06c9be57c969f82f9794027602e4a78dc2924752c0629a0f480cd07fb4d0e8855e26a38b4179644a9f2bbd792603e10e57291378330bf836f37aa101769bcea257d4cd41639faaae31104ab9b5bb02a9d6b644950980c171bf9c2e5a83f512edfd6312c81633542a7b85835b7a19f1a1a055ec10398fcae586313edf686fc2cf37369e0c5129aa2e5442cb86f0ca54da2e7b4cf0e935f0c9add870e70a331b752cbc6118307b50e4cf21cee84a27670d2f7bc1e4216aedbe962a3bae41538cb10c9a45a3f8fda8f69d0d6ee8d16d14c117b90c4404d1db26b16f906ef7c1af5a72042a7976b457a767302769f07c2ced727d4b575c68e7a1cfbed0a4c823024c4e224822fff3e22c9ef9c459b1f637262cdf933da476d9586b07a3d472b4326b24dea6d89b07cfe57fe641bd74432d18f3d525af6c069cea2d31628db8959ae0d244e89e0f7609c16aae574441bf0664bd14338fd9ee803f42cae7cf012b6508040ea834e44ae92ce602f880068717eb45587fe827e7e38368a3cb5d078f669dabf7de8bcd2ac7d97cdfd2aac06af8bf2548fed9e4e9fef3f90bf6e0a6dbdde397b62edaee2a530fe90eae0bc3b79a097c7a9b1d37943d4631e487858b2291ec3a570e6b1422532504a7a2dfe46a370bbf479529fabe4b61da3c049453822a3723cc4cb3ee2b23b6780f845a5fdb86aef97f59c664662b5780745b89b5ef5e86341fc0c7d26936be698311bb7b9a532640e6527d7d2dc129fc6fb1c199922a573097ed40e3d0fe65f6fec3c479e65e1fd26e50e2e3db16070cfc6b09ceeb0b756bda0077b788345b4df877e28b540cdc8aed566080d61ffae9c43046484e4a0d3e6b6bfcf9d20e27c34530faa3a8a937aa4b5168977e5a2129c682ad50ef1c6601f8e3c1619c2282af262ce160e88dbdb6bf700187b551bb541de159368f1d4083f28a62798f88300443b5acaba985b499ec5b385bafac12ac076921f0d6a5876c9f42a1509bbeb8dbb54001af8cc43232167747eadf07e95643871b4fb7397e425d43e64394dc9fa495b3055ea85c58a270cd35f9dee4d19ef8f68e9d7b50a35b6a878a31c55aea795f5c95b12cfc7e020603f232c017dcd89521630ef84b6fb0868a5b7b26145e376b58932eae6332003cebe212bef7bfd5976dbb961940d023fcd7c7a74b727d3734666b85fbc88de2a7316cd0af3a040a2e9d30159da04b0ed310566472f2aef4be1df24c7f7466ecd1a90063c33a792f6729b3bed613de065123ec606763ca176b83f6e08df8004b37984fc80e865fb411a3e576fbc96002af4d7f878176cc69ab6223083ce3da54c772644109bedafafc02c6c800b189b332113f7344cc822594976fb918b1faefec777a89441f275c97124781062a602a00923462b2b874b938ee478638666ec7313738d04288d5abab7659e13c8be41ed14bbb505ceecdd03d04ba462774dd2de687cf1e7f0b8cdf00e4e7b8430926c50071181485e52c747b7515cd45f40aa745b07509c687fe9a4bffac1558e5970e5ce0ca0d46757fcf59f1bd971cc84a4f7db33c2dc29302e182ce2c4ad4720c9db36f03c6175d93872bda08ca68b3e12151508d7425acff1eb67fb79466d6a50eda129ce162393177e33ba3aa0cf5e63c573407c7766e70c6827542e1ebf363ea4baf4fc80c59c4583c043f4973c8544d591fde45978c6090a9f1aa71423a2245c0b46c465f2182203bf6a67f71485bd514aab8bdcd75f658a831e84ed58eb3e3c3bde906bbc6ce4d897873201eb3d12faa1229e9c47e0c929a8214c69388fa5151a3a0b868729d196148220366e115c06a19a75afc6f8ad5496ef580fbbed16c6097d85add27d7422f0284648c754b4d4c486bf72c7f4b600b86b4dd06b43667fb3c0409e6663c844d415e5461a19807cb92daa8f2280478b5e88f28f7c023a4d707f50178bd1c624e288f494742741291a5a1c3dde42628b88ee90115c86477bbbccba39883d45a7749ae660798e6d1eabc355be9220ec8e5aec1bcfaed29d3142eeb5349f395b52cfdfb3eaa69e60b1ba88ffef20063e2e56c19cce9ced7275daf74414846711ebeac3e29f5b926f3eed1283f80d840f949efb58c834f5eacf9010b1021979d61dcaf227646d5c9fb8c0375e78d1b8adff16eff6ef97eb6807d2999ab6080d7a7f4cd8a41ba7dddc1c3c5f4ba77337d992c281022b4f09457e1a98cec278e951f6ca9281e42e69ecde3db212c79f4846e5466938a8efcaf4bef70ab1eaf9128744e430cfd43657b779f240c4692cc01d80aa7229ad055b0795386f32797c008417d703eb6adc4ee1a2c9616640d059c1d4725e0d2526e177483b9ca27b8fa68a1adde5c2ef5207faa3820c6823b871e105a135ef74b9e9733c2a4c98bd168e168baa345ee85352c9796405cade65ce518734948dfb0b707a97a1f7e974c95979fccfe368270daf03887eb23a9ee3765279e6630a4f09ac7f1168bb29a68c2503424ed89c282698ba5e100c8817e925e1fd72f811e79aab0159adbdb82414163b6d430a873375dcc1f905b7f3127d11171a9af4edc8becb39e76301c43dbf953a98fc297817b10d5b8f2aa575a621de74d5154e7fd9d06ca527bcce1ecf338420de6c796a24e602c595e095a7f9cac33c2f65319a0764dc6cd2b4fec74c93fd573202caa997bf6261a82fad1ff97129541b073012a758f315ea204f0e39be447bb2fdb9a6d479dbb53ccefa0e6a6f46a642852ab62d33b887ae63c3aacf8780b6b61b877b0a8e39662d69d5dcba3e5e1a75149dc3daea8da03af8b51c56b02bf3330f292801224c9a95f1be34c7b72ce502ea5ff5c5ae542abe5539ebc3dc291dc613ccc384dd77ca2bd4bd7abbc778b35e2f6aa84afac3c9fd4cc64128504477b1dd26e3b886fa5dbce1acadd82a5345912ee0d82320e7529cf149cb787a8ffd02dd7c93495b2d0a26fae6f9d2c2ce2ad99355f2ad0c9cddeba0dca88e1ff7fb3ec83cb3ed356f25665f1b46ef87e08436cd626802104f09972f7b4caf06454289080a4d41e440f8a83100a53b846c901ab305f6f9a104e17c41fe7098e3c31f1ead8814401044d1539d3316ae81052ac21b3662969f6d99ac4780e4087cf68a8a7355ffed85eb3279ef282dd790a50161294435816595ce9e9c9c4e58bac275f2790007a028cb306a9b5ff5edb0720065921d4e4fe39a95d5319439c46e4146c2e7ac4f47cca9f8adcbbd5da434bd2ebffc03407d6d51b3f5786c7b904add045e928d52fb9dc43d2e0217a5a6f6a2ccac456a21ef280092ffb3cb207632a34f14759607e6d32370d04e2be8afeecc08e365e8cb9cf5da3e72e2248d85f7c51179b22f7e1846c7faeef728f492b400f56d37d9234d9937c8d223173f5b05c24dc7415495dddfd2490e4e228ecac11e5fdc7df6d20b0c1e285caaf53d65d0bf058d442b1ca706fc940b22b7a491765799346d2d62e4adb66c8d21bb024a32a2e3963b855b489865037a42ee79afcbb926efbc0d5c63c9f2bde778b675c1d5e7d8032cd2dcf4e3c73dfe4cbc96c0810edd7d228ba75f933eb651b9aa99b3322b24fe1f38f2c72a99d663d040fea90a1484cced9eda83ff53575b71768de524eb744a46780dcfb6d47e1dca5427b9ee655319fb56673d883dfe36e31f6e55d2ead6dcd56e6c433bc39583bee893d7a217a539746a5bb63bfee1c50a3aeec4d80b931baf296ca913bf0613305cdf54feab2440e35a7a79dc0fc447b4395145d72bb2d3931b91a948f6f3aa7ed0f06aae4a547ca71978b6c5316e3a581a9a0859be203d59103f2d3817452343a3c80034fb9899e236d92843e4e734e8ca45c38971966170201a9753d21ccba967aa892ab7d9b1f9a3886b97a2fc32f68f9d80f40e422efa094f41a4c29befe71df1f92d65028b0822cc7df9c4437ffcbc547983a02d8b0637ccb8a364915384d0581bb95ced3f3481cf9135c4461de4b4487a9f959ff721ec8b5f6f31cd46839f4d1d8a254d9d8e7bf9736485731bba18ace17b6457cc1902f69008b9a79a96d90c1ec7d34f68f924bd50ded199c717f8ad0118e9d98de6c3b1285f33acac8367de238207cb8f1ef0a6dafac7b57e7fabed2a320309b6ce3655173d193ec75e59e048e7a3d8f73eb50abaaadaf5a6759e47220efd5fca13af004cd93502bd6641c988d561a2862525ad350877892747d029c0c645744ac9614e1ff03ed2df5ddc5cf9c47fdfce3a946eb3ce1ca540e2e8c2b04c787e1a068f81673ee1b14b5584595f9e53ebc025cc145b60cc1e45e52483c2b833f246b725cad27a8dd06636a14ecad11dd59ab8681c7a6e0ff2b20e861a8bbd9cf328c58fc968f6393f890b5e631434c6855b057d5054512d1845fdf96022056229796f6a70dd3ba283c0d750d92ef059e17a58c1628acebf0a61442f8d3f49ecd16fa1ebece8eab535690815a1b7159db5c72cc047b07cb78e1d23104c030ff65211082cbf5daf78e47fd2a664db8f851d050c3674de543c4f21e6cdafb232be80ae65abf8467d3f5eb48f0876ea39b437d3346f653b4abbfb0df75406a294687d51b091cec1f50e8aba842725286cea8658a543da2b2eb4858719ae213325765273e9cc3db7aac2c62311d25370faa1f526347e454799ac1b0a65ef8cb21ebf9044d165fa4d72a5ef62e8ad25b7be51ccd47d904e0eb762c2b8307c65d83c677e45bbd3006f4d8bdb9b19b90f4543974deccc4dfb610af36c3519a9de582277f57f6454bff416ec1c0063eff38e8707ee329b3be86aa17f22807c2bca5dcf1de5e7b1247905ee5f128e319d", 0x1000}], 0x1, &(0x7f00000011c0)=ANY=[@ANYBLOB="300000000000000084000000200000001e5090414db594d6b4b720b6f449fd12bd702dd7295c93e08d0000000000000098000000000000008400000008000000e040e751360703c67d97fcd7e6faf3eb7785822779d223fbd717160775ac3c098fd313421d97e698c56ef6677e84dc695cbdc1b1547c4eb5394274d67889aa5ff89c42576cc888aa8c0a667151572b75a0558ffa5b18446d7ce4e0f9f609d7fd6e9128f486e792a0693cc258f5616e5a6c08d634cb1e7d9c6a814b2f776214c045b66b7e9a02c5fccd3633126debfd329c9636ccaf"], 0xa7}, 0x80) 05:41:21 executing program 5: r0 = syz_open_dev$loop(0x0, 0x7f, 0x182) r1 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) [ 1840.923478][T22474] loop7: detected capacity change from 0 to 1036 05:41:22 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x28, &(0x7f0000000280)={0x1, [0x0]}, &(0x7f00000002c0)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x1d, &(0x7f00000005c0)={r1}, 0x8) 05:41:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:22 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) dup2(r0, r1) 05:41:22 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0x24, &(0x7f0000000200), &(0x7f0000000000)=0x98) 05:41:22 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r3, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:41:22 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto(r0, &(0x7f0000000040)='\x00', 0x1, 0x0, &(0x7f00000000c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) dup2(r1, r0) 05:41:22 executing program 5: r0 = syz_open_dev$loop(0x0, 0x7f, 0x182) r1 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r0 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r0, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x24000000) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r0) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:22 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000001840)={0x1c, 0x1c, 0x2}, 0x1c) 05:41:22 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r3, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:41:22 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f0000000400), &(0x7f0000000440)=0xc) 05:41:22 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x0, 0x182) r1 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:22 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x28, &(0x7f0000000280)={0x1, [0x0]}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f00000013c0)={r1}, &(0x7f0000001400)=0x10) 05:41:22 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x0, 0x0, &(0x7f0000000140)) 05:41:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r0 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r0, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x24000000) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r0) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:22 executing program 4: r0 = gettid() setpriority(0x0, r0, 0x7b) [ 1841.912036][ T9754] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 05:41:22 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x0, 0x182) r1 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:23 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x28, &(0x7f0000000280)={0x1, [0x0]}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f00000013c0)={r1}, &(0x7f0000001400)=0x10) 05:41:23 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x1, 0x0) read$FUSE(r0, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r2, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:41:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) tkill(0x0, 0x29) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r0 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r0, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x24000000) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r0) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:23 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@bridge_setlink={0x28, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0x8, 0xc, 0x0, 0x0, [@AF_INET6={0x4}]}]}, 0x28}}, 0x0) 05:41:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={0x0}}, 0x0) [ 1842.207117][T22563] bridge0: port 1(bridge_slave_0) entered blocking state [ 1842.214317][T22563] bridge0: port 1(bridge_slave_0) entered forwarding state 05:41:23 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x0, 0x182) r1 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:23 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x28, &(0x7f0000000280)={0x1, [0x0]}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f00000013c0)={r1}, &(0x7f0000001400)=0x10) 05:41:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) [ 1842.420050][T22571] bridge0: port 1(bridge_slave_0) entered blocking state [ 1842.427283][T22571] bridge0: port 1(bridge_slave_0) entered forwarding state 05:41:23 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x18) 05:41:23 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x1, 0x0) read$FUSE(r0, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r2, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:41:23 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x28, &(0x7f0000000280)={0x1, [0x0]}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f00000013c0)={r1}, &(0x7f0000001400)=0x10) 05:41:23 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) getdents(r0, &(0x7f0000000140)=""/72, 0x48) 05:41:23 executing program 4: recvmsg$unix(0xffffffffffffffff, &(0x7f0000002800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x48}, 0x0) timer_create(0x3, 0x0, &(0x7f0000002480)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x77359400}, {0x0, 0x989680}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x77359400}}, &(0x7f00000000c0)) 05:41:23 executing program 2: pselect6(0xa, &(0x7f0000000080)={0xe0}, 0x0, 0x0, 0x0, 0x0) 05:41:24 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x1, 0x0) read$FUSE(r0, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r2, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:41:24 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:24 executing program 0: r0 = openat$pfkey(0xffffff9c, &(0x7f0000000500), 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x0, 0x0, 0x0) 05:41:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:24 executing program 4: r0 = gettid() ioprio_set$pid(0x2, r0, 0x4004) 05:41:24 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000180), 0x4) 05:41:24 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f000000adc0)=0x5, 0x4) 05:41:24 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:24 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r1, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:41:24 executing program 4: r0 = gettid() ioprio_set$pid(0x2, r0, 0x4004) [ 1843.459456][T22612] loop7: detected capacity change from 0 to 1036 05:41:24 executing program 0: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x600, 0x0, &(0x7f0000001240), 0x0, &(0x7f0000001280)) 05:41:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:24 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=@newtaction={0x68, 0x30, 0x1, 0x0, 0x0, {0x0, 0x0, 0x1300}, [{0x54, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20}]}, {0x4}, {0xc}, {0x18}}}]}]}, 0x68}}, 0x0) 05:41:24 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x7) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:24 executing program 4: r0 = gettid() ioprio_set$pid(0x2, r0, 0x4004) 05:41:24 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r1, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) [ 1843.808428][T22632] loop7: detected capacity change from 0 to 1036 [ 1843.857733][T22638] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1843.867297][T22638] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 05:41:24 executing program 0: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x1, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000200)=0x0) timer_settime(r2, 0x0, &(0x7f0000000100)={{}, {0x0, 0x3938700}}, 0x0) 05:41:24 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=@newtaction={0x68, 0x30, 0x1, 0x0, 0x0, {0x0, 0x0, 0x1300}, [{0x54, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20}]}, {0x4}, {0xc}, {0x18}}}]}]}, 0x68}}, 0x0) 05:41:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:25 executing program 4: r0 = gettid() ioprio_set$pid(0x2, r0, 0x4004) [ 1844.131698][T22652] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1844.141486][T22652] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 05:41:25 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r1, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:41:25 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) [ 1844.219363][T22655] loop7: detected capacity change from 0 to 1036 05:41:25 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) read$FUSE(r0, &(0x7f0000004540)={0x2020}, 0x2000) write$FUSE_INIT(r1, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) 05:41:25 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=@newtaction={0x68, 0x30, 0x1, 0x0, 0x0, {0x0, 0x0, 0x1300}, [{0x54, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20}]}, {0x4}, {0xc}, {0x18}}}]}]}, 0x68}}, 0x0) 05:41:25 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x1, 0x0) read$FUSE(r0, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r2, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:41:25 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) [ 1844.562975][T22673] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1844.572597][T22673] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 05:41:25 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(0x0, 0x7f, 0x182) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) [ 1845.749877][ T8901] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 05:41:28 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) setsockopt$packet_int(r0, 0x107, 0xc, &(0x7f0000000000), 0x4) 05:41:28 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=@newtaction={0x68, 0x30, 0x1, 0x0, 0x0, {0x0, 0x0, 0x1300}, [{0x54, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20}]}, {0x4}, {0xc}, {0x18}}}]}]}, 0x68}}, 0x0) 05:41:28 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x1, 0x0) read$FUSE(r0, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r2, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:41:28 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:28 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(0x0, 0x7f, 0x182) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:28 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=@newtaction={0x68, 0x30, 0x1, 0x0, 0x0, {0x0, 0x0, 0x1300}, [{0x54, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{}, 0x4, r3}}]}, {0x5}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) [ 1847.141318][T22704] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1847.150873][T22704] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 05:41:28 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) [ 1847.222896][T22708] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1847.232662][T22708] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 05:41:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000012c0)={&(0x7f0000000080)={0x14, r1, 0x1}, 0x14}}, 0x0) 05:41:28 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(0x0, 0x7f, 0x182) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:28 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000580)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555077e3a159110193dd2ff1fa7c3205bfedbe9d8f3b423cdacfa7e32fe0231368b2264f9c504c9f1f65515b2e1a38d522be18bd10a48b043ccc42646d25dfd73d06d7535f7866907dc6751dfced1fd8accae669e173a649c1cfd6587d47578f4c35235138d5521d9453559bb02a860e8efbc6f2b2a3e3173d566a0f06c54c3a4903ef3144d4aea54404458cef2ce3599f455c7a3a48a01010000009f2f0517e4ca0e1803a2971a50f713d4e21b3336f1ae0796f23526ec0fd97f734c4c815bf697e6bd25eac36d4dfafe7cc03b0864009d2e7d7ff6ff72ba8972b122b09789d99b3d0524f39dc09244ba5dbe9180950f76f7049db5cb19d7962f1715321f077d555da11fa74e2865cd81f2b77fdd76c677f812d249f4a1983cd0de0d450000000000db3947c8dc7b1b4c4554ffdca8b7fb05000000000000593d60abd3759dcfeb820634fd4d419efaefb24305b2bea20007840484511b6efaad206335a30ef7b9e01446a6285f4665a7fe37da236dc32add75e0f435f28fbeda75cf971d54a9698cf3270f420edc85c176070bfff7909413f3fbd3ced3284db730b368ddca659e4bdb7387361a39fd7526847a6bfda9c648e8aa5c558aa6d463ec9d840f3914908187b6b0776952be71b0418133d3ab25493418494d9d10d76e603129e9a726579ac7d672cacd581b7e2fc7a5758fcfb822de1dacc357341e000cc34c49914f1aa198a77b3610b740b930fd42051d4b7443e5b49c0000000000000000000000008d6a76e3fae0d0f6ddf6d97a66c54b92d79cbd71582d24431aa03d5efd74aa33ab8fbe017db5d7a1d9a9b88b0679c6b58929deeaef5aceb54a148a23d07832f7296f24628f356416ece570219b4eaa7cf7350e9f36a7cacc6e147a5e893b81d47dfb60cbfe0714"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x3e) 05:41:28 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)={[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@fsname={'fsname', 0x3d, ','}}, {@context={'context', 0x3d, 'system_u'}}]}) 05:41:28 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x1, 0x0) read$FUSE(r0, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r2, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:41:28 executing program 0: syz_mount_image$vfat(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001680)={[{@fat=@errors_remount}, {@shortname_lower}]}) 05:41:28 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x0, 0x182) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:28 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) [ 1847.610957][T22727] tmpfs: Unknown parameter 'context' [ 1847.631361][T22727] tmpfs: Unknown parameter 'context' 05:41:28 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='sys_enter\x00', r0}, 0x10) clock_gettime(0x0, &(0x7f0000000400)) [ 1847.680111][ T8901] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 05:41:28 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x0, 0x182) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:28 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r3, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:41:28 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) 05:41:28 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x1, 0x0) read$FUSE(r2, &(0x7f0000004540)={0x2020}, 0x2020) write$binfmt_misc(r1, &(0x7f00000000c0)={'syz1'}, 0x4) 05:41:28 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:29 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x0, 0x182) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:29 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r0, 0x4b72, &(0x7f0000000480)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)="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"}) 05:41:29 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:29 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r3, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:41:29 executing program 4: r0 = syz_open_dev$hidraw(0xfffffffffffffffc, 0x0, 0xc43e2) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {0x2}, @rumble={0x0, 0x2}}) r1 = syz_open_dev$hidraw(0xfffffffffffffffc, 0x0, 0x161f42) write$hidraw(r1, &(0x7f0000000000)="03", 0xfd50) write$hidraw(r1, &(0x7f0000000200)="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", 0x2b1) ioctl$HIDIOCGRAWNAME(r0, 0x40305839, &(0x7f0000000080)) r2 = syz_open_dev$hidraw(0xfffffffffffffffc, 0x0, 0x10e801) write$hidraw(r2, &(0x7f0000001800)="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", 0xfffffeb0) 05:41:29 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:29 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r0, 0x4b72, &(0x7f0000000480)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)="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"}) 05:41:29 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x1, 0x0) read$FUSE(r2, &(0x7f0000004540)={0x2020}, 0x2020) write$binfmt_misc(r1, &(0x7f00000000c0)={'syz1'}, 0x4) [ 1848.395617][ T26] audit: type=1800 audit(1634881289.359:3420): pid=22768 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name=48C7C060 dev="sda1" ino=14720 res=0 errno=0 05:41:29 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) [ 1848.485422][T22771] loop7: detected capacity change from 0 to 1036 05:41:29 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r3, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:41:29 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r0, 0x4b72, &(0x7f0000000480)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)="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"}) 05:41:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000001300)={&(0x7f0000000000), 0xc, &(0x7f00000012c0)={&(0x7f0000000080)={0x48, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_OURS={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}, @ETHTOOL_A_LINKMODES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}]}]}, 0x48}}, 0x0) 05:41:29 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:29 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:29 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x1, 0x0) read$FUSE(r2, &(0x7f0000004540)={0x2020}, 0x2020) write$binfmt_misc(r1, &(0x7f00000000c0)={'syz1'}, 0x4) 05:41:29 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r0, 0x4b72, &(0x7f0000000480)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)="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"}) 05:41:29 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=@newtaction={0x68, 0x30, 0x1, 0x0, 0x0, {0x0, 0x0, 0x1300}, [{0x54, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20}]}, {0x5}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) [ 1848.867230][T22796] loop7: detected capacity change from 0 to 1036 05:41:29 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x7, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:30 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r3, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:41:30 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) [ 1849.110467][T22811] __nla_validate_parse: 2 callbacks suppressed [ 1849.110540][T22811] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1849.126268][T22811] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 05:41:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$bt_rfcomm(r0, &(0x7f0000000000), 0xa) [ 1849.206004][T22816] loop7: detected capacity change from 0 to 1036 05:41:30 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:30 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x1, 0x0) read$FUSE(r2, &(0x7f0000004540)={0x2020}, 0x2020) write$binfmt_misc(r1, &(0x7f00000000c0)={'syz1'}, 0x4) 05:41:30 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x0, 0x6}, 0x1c) 05:41:30 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x1d14c0, 0x0) 05:41:30 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:30 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r3, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:41:30 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='oom_score_adj\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) write$tcp_mem(r0, &(0x7f0000000180)={0x0, 0x20, 0x0, 0x20, 0x0, 0xa}, 0x48) [ 1849.526100][T22837] loop7: detected capacity change from 0 to 1036 05:41:30 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:30 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:30 executing program 0: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x2, &(0x7f0000000740)=[{0x0, 0x0, 0x7fff}, {&(0x7f0000000440)="9ef4898f5f8c0cc6", 0x8, 0x9}], 0x0, &(0x7f00000007c0)={[{@utf8no}, {@fat=@gid}, {@numtail}]}) 05:41:30 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r3, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:41:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=@newtaction={0x68, 0x30, 0x1, 0x0, 0x0, {0x0, 0x0, 0x1300}, [{0x54, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x0, 0x0, 0x9effffff}, 0x4, r3}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) 05:41:30 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='oom_score_adj\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) write$tcp_mem(r0, &(0x7f0000000180)={0x0, 0x20, 0x0, 0x20, 0x0, 0xa}, 0x48) [ 1849.875997][T22859] loop7: detected capacity change from 0 to 1036 05:41:30 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:30 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:31 executing program 0: bpf$OBJ_PIN_MAP(0x21, 0x0, 0x0) 05:41:31 executing program 4: perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000000)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r1, 0x388, 0x80000b8) ptrace$pokeuser(0x6, r0, 0x388, 0xc225) 05:41:31 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='oom_score_adj\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) write$tcp_mem(r0, &(0x7f0000000180)={0x0, 0x20, 0x0, 0x20, 0x0, 0xa}, 0x48) 05:41:31 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x1, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r2, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:41:31 executing program 4: perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000000)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r1, 0x388, 0x80000b8) ptrace$pokeuser(0x6, r0, 0x388, 0xc225) 05:41:31 executing program 0: perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000000)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r1, 0x388, 0x80000b8) ptrace$pokeuser(0x6, r0, 0x388, 0xc225) 05:41:31 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:31 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:31 executing program 4: perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000000)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r1, 0x388, 0x80000b8) ptrace$pokeuser(0x6, r0, 0x388, 0xc225) 05:41:31 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='oom_score_adj\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) write$tcp_mem(r0, &(0x7f0000000180)={0x0, 0x20, 0x0, 0x20, 0x0, 0xa}, 0x48) 05:41:31 executing program 0: perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000000)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r1, 0x388, 0x80000b8) ptrace$pokeuser(0x6, r0, 0x388, 0xc225) 05:41:31 executing program 4: perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000000)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r1, 0x388, 0x80000b8) ptrace$pokeuser(0x6, r0, 0x388, 0xc225) 05:41:31 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:31 executing program 0: perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000000)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r1, 0x388, 0x80000b8) ptrace$pokeuser(0x6, r0, 0x388, 0xc225) 05:41:31 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='oom_score_adj\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) write$tcp_mem(r0, &(0x7f0000000180)={0x0, 0x20, 0x0, 0x20, 0x0, 0xa}, 0x48) [ 1850.826395][T22916] loop7: detected capacity change from 0 to 1036 [ 1850.869946][ T54] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 05:41:32 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x1, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r2, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:41:32 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:32 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x8, 0x201, 0x0, 0x0, {}, [@CTA_TIMEOUT_L3PROTO={0x6}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x28}}, 0x0) 05:41:32 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x5, [@func, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @ptr, @volatile, @int, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @array, @ptr]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0xf9, 0x0, 0x20000000}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 05:41:32 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='oom_score_adj\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) write$tcp_mem(r0, &(0x7f0000000180)={0x0, 0x20, 0x0, 0x20, 0x0, 0xa}, 0x48) 05:41:32 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:32 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x5, [@func, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @ptr, @volatile, @int, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @array, @ptr]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0xf9, 0x0, 0x20000000}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 05:41:32 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:32 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@mcast1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1}, 0x20) 05:41:32 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='oom_score_adj\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) write$tcp_mem(r0, &(0x7f0000000180)={0x0, 0x20, 0x0, 0x20, 0x0, 0xa}, 0x48) 05:41:32 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:32 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x5, [@func, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @ptr, @volatile, @int, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @array, @ptr]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0xf9, 0x0, 0x20000000}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) [ 1851.549739][T22957] loop7: detected capacity change from 0 to 1036 [ 1851.727938][T22961] I/O error, dev loop7, sector 1024 op 0x0:(READ) flags 0x80700 phys_seg 2 prio class 0 05:41:33 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x1, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r2, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:41:33 executing program 4: perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000300)={0x2, 0x4e21, @broadcast}, 0x10) 05:41:33 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:33 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='oom_score_adj\x00') socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) write$tcp_mem(r0, &(0x7f0000000180)={0x0, 0x20, 0x0, 0x20, 0x0, 0xa}, 0x48) 05:41:33 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x5, [@func, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @ptr, @volatile, @int, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @array, @ptr]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0xf9, 0x0, 0x20000000}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 05:41:33 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:33 executing program 0: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=@newlink={0x1d0, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3909}, [@IFLA_LINKINFO={0x60, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x50, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x81, 0x200}}]}, @IFLA_VLAN_INGRESS_QOS={0x28, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xa7, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x40000000}}]}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_VF_PORTS={0x148, 0x18, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0x3ff}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b612f86ce56212c94714bf0b76819e9a"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x4}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "8a9b3077ed1aa6ace904e9e35648df9b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fcf96501967ca4b8c98b630e47d70397"}, @IFLA_PORT_VF={0x8, 0x1, 0x8}]}, {0x14, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0x417d}, @IFLA_PORT_REQUEST={0x5}]}, {0x4}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0x7ff}, @IFLA_PORT_PROFILE={0x9, 0x2, 'vlan\x00'}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_VF={0x8, 0x1, 0x4}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "23ccfc2ecf587e08576f5963fa26e9b0"}]}, {0x14, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x2}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "aae87310c9c8de3d27a75bf42ccc77f7"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "ad7c63e402ceeb09fc90236114c6a473"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x7, 0x2, '@+\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "2c0d2599b124661282a99a771829e447"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "917a06017f79aef911acb674c169a528"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}]}]}]}, 0x1d0}}, 0x0) 05:41:33 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='oom_score_adj\x00') socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) write$tcp_mem(r0, &(0x7f0000000180)={0x0, 0x20, 0x0, 0x20, 0x0, 0xa}, 0x48) [ 1852.393046][T22990] loop7: detected capacity change from 0 to 1036 05:41:33 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:33 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_DYING(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x6, 0x1, 0x201}, 0x14}}, 0x0) 05:41:33 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:33 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='oom_score_adj\x00') socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) write$tcp_mem(r0, &(0x7f0000000180)={0x0, 0x20, 0x0, 0x20, 0x0, 0xa}, 0x48) [ 1852.785997][T23005] device vlan2 entered promiscuous mode [ 1852.792366][T23005] device macvlan0 entered promiscuous mode [ 1852.800252][ T1197] ieee802154 phy0 wpan0: encryption failed: -22 [ 1852.806586][ T1197] ieee802154 phy1 wpan1: encryption failed: -22 05:41:34 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(0x0, 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:34 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) read$FUSE(r1, 0x0, 0x0) write$FUSE_INIT(r2, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r3, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:41:34 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:34 executing program 4: perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'stack ', '::u'}, 0x9) 05:41:34 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='oom_score_adj\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) write$tcp_mem(r0, &(0x7f0000000180)={0x0, 0x20, 0x0, 0x20, 0x0, 0xa}, 0x48) 05:41:34 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, 0x0, 0x8, 0x201, 0x0, 0x0, {}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x20}}, 0x0) [ 1853.430927][ T9754] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 05:41:34 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(0x0, 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:34 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='oom_score_adj\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) write$tcp_mem(r0, &(0x7f0000000180)={0x0, 0x20, 0x0, 0x20, 0x0, 0xa}, 0x48) 05:41:34 executing program 4: perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 05:41:34 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:34 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e21, @loopback}, 0x10) 05:41:34 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/sockstat\x00') sendfile(r0, r1, &(0x7f0000000240)=0x202, 0x4000000000dc) 05:41:34 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(0x0, 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:35 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) read$FUSE(r1, 0x0, 0x0) write$FUSE_INIT(r2, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r3, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:41:35 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='oom_score_adj\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) write$tcp_mem(r0, &(0x7f0000000180)={0x0, 0x20, 0x0, 0x20, 0x0, 0xa}, 0x48) 05:41:35 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:35 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:35 executing program 0: r0 = socket$inet(0x2, 0x3, 0x6) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x8982, &(0x7f0000007740)={0x7, 'veth1_virt_wifi\x00'}) 05:41:35 executing program 4: perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r0, &(0x7f0000001840)=[{&(0x7f00000003c0)=""/247, 0xf7}], 0x1, 0x0, 0x0) 05:41:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) write$tcp_mem(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x20, 0x0, 0x20, 0x0, 0xa}, 0x48) 05:41:35 executing program 0: perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r0, 0x16, &(0x7f0000000000)) ptrace(0x10, r0) ptrace$pokeuser(0x6, r0, 0x388, 0x80000b8) 05:41:35 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:35 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:35 executing program 4: syz_open_dev$evdev(&(0x7f0000001100), 0x5, 0x341) 05:41:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) write$tcp_mem(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x20, 0x0, 0x20, 0x0, 0xa}, 0x48) 05:41:36 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) read$FUSE(r1, 0x0, 0x0) write$FUSE_INIT(r2, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r3, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:41:36 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae3978e256be26fadb1f2665f6bc3b68eddafaf761730f7d964ca6b9", 0x6b}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:36 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:36 executing program 0: r0 = perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) 05:41:36 executing program 4: perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) 05:41:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) write$tcp_mem(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x20, 0x0, 0x20, 0x0, 0xa}, 0x48) 05:41:36 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000001280)='ns/user\x00') 05:41:36 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) write$tcp_mem(r0, &(0x7f0000000180)={0x0, 0x20, 0x0, 0x20, 0x0, 0xa}, 0x48) 05:41:36 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, 0x0, 0x0, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:36 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x275d0000) mmap(&(0x7f0000926000/0x3000)=nil, 0x3000, 0x0, 0x840000000000a132, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) 05:41:36 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) [ 1855.989536][ T8901] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 05:41:37 executing program 4: socketpair(0x2, 0x3, 0x1, &(0x7f0000000100)) 05:41:37 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r3, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:41:37 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x275d0000) mmap(&(0x7f0000926000/0x3000)=nil, 0x3000, 0x0, 0x840000000000a132, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) 05:41:37 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) write$tcp_mem(r0, &(0x7f0000000180)={0x0, 0x20, 0x0, 0x20, 0x0, 0xa}, 0x48) 05:41:37 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, 0x0, 0x0, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:37 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:37 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) ioctl$SIOCGETLINKNAME(r0, 0xc0045878, 0x0) 05:41:37 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) write$tcp_mem(r0, &(0x7f0000000180)={0x0, 0x20, 0x0, 0x20, 0x0, 0xa}, 0x48) 05:41:37 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, 0x0, 0x0, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:37 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) ioctl$SIOCGETLINKNAME(r0, 0x8901, &(0x7f0000000000)) 05:41:38 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x275d0000) mmap(&(0x7f0000926000/0x3000)=nil, 0x3000, 0x0, 0x840000000000a132, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) 05:41:38 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:38 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='oom_score_adj\x00') socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) write$tcp_mem(r0, &(0x7f0000000180)={0x0, 0x20, 0x0, 0x20, 0x0, 0xa}, 0x48) 05:41:38 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r3, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:41:38 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$inet(r0, &(0x7f0000001700)={&(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10, 0x0}, 0x20004010) 05:41:38 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}], 0x1, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:38 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x275d0000) mmap(&(0x7f0000926000/0x3000)=nil, 0x3000, 0x0, 0x840000000000a132, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) 05:41:38 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='oom_score_adj\x00') socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) write$tcp_mem(r0, &(0x7f0000000180)={0x0, 0x20, 0x0, 0x20, 0x0, 0xa}, 0x48) 05:41:38 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) [ 1858.088119][T23198] loop7: detected capacity change from 0 to 1036 05:41:39 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x275d0000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) 05:41:39 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='oom_score_adj\x00') socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) write$tcp_mem(r0, &(0x7f0000000180)={0x0, 0x20, 0x0, 0x20, 0x0, 0xa}, 0x48) 05:41:39 executing program 4: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000400)={'virt_wifi0\x00', &(0x7f0000000000)=@ethtool_stats={0x1d, 0x20000000000001a8}}) 05:41:39 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}], 0x1, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:39 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:39 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x275d0000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) 05:41:40 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r3, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:41:40 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='oom_score_adj\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) setuid(0x0) write$tcp_mem(r0, &(0x7f0000000180)={0x0, 0x20, 0x0, 0x20, 0x0, 0xa}, 0x48) 05:41:40 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000140)={0x40}, 0x10) 05:41:40 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}], 0x1, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:40 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x275d0000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) 05:41:40 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) [ 1859.189036][ T8901] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 05:41:40 executing program 0: mmap(&(0x7f0000926000/0x3000)=nil, 0x3000, 0x0, 0x840000000000a132, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) 05:41:40 executing program 4: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$sock_SIOCETHTOOL(r0, 0xc020660b, 0x0) 05:41:40 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {0x0}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:40 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='oom_score_adj\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) setuid(0x0) write$tcp_mem(r0, &(0x7f0000000180)={0x0, 0x20, 0x0, 0x20, 0x0, 0xa}, 0x48) 05:41:40 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:40 executing program 4: pipe(&(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_pressure(r0, 0x0, 0x0) [ 1859.531707][T23252] loop7: detected capacity change from 0 to 1036 05:41:41 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r2, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r3, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:41:41 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, &(0x7f0000003400)) 05:41:41 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {0x0}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:41 executing program 0: mmap(&(0x7f0000926000/0x3000)=nil, 0x3000, 0x0, 0x840000000000a132, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) 05:41:41 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='oom_score_adj\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) setuid(0x0) write$tcp_mem(r0, &(0x7f0000000180)={0x0, 0x20, 0x0, 0x20, 0x0, 0xa}, 0x48) 05:41:41 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:41 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='oom_score_adj\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r2) write$tcp_mem(r0, &(0x7f0000000180)={0x0, 0x20, 0x0, 0x20, 0x0, 0xa}, 0x48) [ 1860.401870][T23282] loop7: detected capacity change from 0 to 1036 05:41:41 executing program 0: mmap(&(0x7f0000926000/0x3000)=nil, 0x3000, 0x0, 0x840000000000a132, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) 05:41:41 executing program 4: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000400)={'geneve0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB='K']}) 05:41:41 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:41 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {0x0}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:41 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='oom_score_adj\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r2) write$tcp_mem(r0, &(0x7f0000000180)={0x0, 0x20, 0x0, 0x20, 0x0, 0xa}, 0x48) 05:41:42 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x275d0000) mmap(&(0x7f0000926000/0x3000)=nil, 0x3000, 0x0, 0x840000000000a132, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) 05:41:42 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1930c3, 0x0) 05:41:42 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r2, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r3, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:41:42 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:42 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='oom_score_adj\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r2) write$tcp_mem(r0, &(0x7f0000000180)={0x0, 0x20, 0x0, 0x20, 0x0, 0xa}, 0x48) 05:41:42 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) [ 1861.399050][T23318] loop7: detected capacity change from 0 to 1036 05:41:42 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='oom_score_adj\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setuid(0x0) write$tcp_mem(r0, &(0x7f0000000180)={0x0, 0x20, 0x0, 0x20, 0x0, 0xa}, 0x48) 05:41:42 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:42 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x275d0000) mmap(&(0x7f0000926000/0x3000)=nil, 0x3000, 0x0, 0x840000000000a132, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) 05:41:42 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:42 executing program 4: r0 = epoll_create(0x8a15) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000280)={0x30000010}) 05:41:42 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='oom_score_adj\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setuid(0x0) write$tcp_mem(r0, &(0x7f0000000180)={0x0, 0x20, 0x0, 0x20, 0x0, 0xa}, 0x48) [ 1861.751868][ T4020] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 05:41:42 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x275d0000) mmap(&(0x7f0000926000/0x3000)=nil, 0x3000, 0x0, 0x840000000000a132, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) [ 1861.863372][T23343] loop7: detected capacity change from 0 to 1036 05:41:42 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:43 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r2, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r3, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:41:43 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:43 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='oom_score_adj\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setuid(0x0) write$tcp_mem(r0, &(0x7f0000000180)={0x0, 0x20, 0x0, 0x20, 0x0, 0xa}, 0x48) 05:41:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x39000, 0x0) write(r3, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r4, 0x0, 0x10000, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 05:41:43 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000926000/0x3000)=nil, 0x3000, 0x0, 0x840000000000a132, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) 05:41:43 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) [ 1862.473322][T23367] loop7: detected capacity change from 0 to 1036 05:41:43 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000926000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) 05:41:43 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebc", 0x36}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:43 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='oom_score_adj\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) write$tcp_mem(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x20, 0x0, 0x20, 0x0, 0xa}, 0x48) 05:41:43 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) [ 1862.786468][T23390] loop7: detected capacity change from 0 to 1036 05:41:43 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebc", 0x36}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x39000, 0x0) write(r3, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r4, 0x0, 0x10000, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1863.021953][T23396] I/O error, dev loop7, sector 1024 op 0x0:(READ) flags 0x80700 phys_seg 2 prio class 0 05:41:44 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r3, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:41:44 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000926000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) 05:41:44 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='oom_score_adj\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) write$tcp_mem(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x20, 0x0, 0x20, 0x0, 0xa}, 0x48) 05:41:44 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebc", 0x36}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:44 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:44 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x39000, 0x0) write(r3, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r4, 0x0, 0x10000, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 05:41:44 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28d7, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:44 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000926000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) 05:41:44 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='oom_score_adj\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) write$tcp_mem(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x20, 0x0, 0x20, 0x0, 0xa}, 0x48) [ 1863.706102][T23427] loop7: detected capacity change from 0 to 1036 05:41:44 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a49db18c9f811e9c5d45e22ae39", 0x51}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:44 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='oom_score_adj\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) write$tcp_mem(r0, 0x0, 0x0) 05:41:44 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000926000/0x3000)=nil, 0x3000, 0x0, 0x840000000000a132, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) [ 1864.950706][ T54] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 05:41:47 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r3, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:41:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x39000, 0x0) write(r3, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r4, 0x0, 0x10000, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 05:41:47 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:47 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='oom_score_adj\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) write$tcp_mem(r0, 0x0, 0x0) 05:41:47 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000926000/0x3000)=nil, 0x3000, 0x0, 0x840000000000a132, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 05:41:47 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce9", 0x37}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) [ 1866.773167][T23467] loop7: detected capacity change from 0 to 1036 05:41:47 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x470, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:47 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000926000/0x3000)=nil, 0x3000, 0x0, 0x840000000000a132, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 05:41:47 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='oom_score_adj\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) write$tcp_mem(r0, 0x0, 0x0) 05:41:47 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce9", 0x37}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:48 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x39000, 0x0) write(r2, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x10000, 0x0) 05:41:48 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f0000000c40), &(0x7f0000000c80)=0x4) [ 1867.518938][ T8901] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 05:41:50 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x39000, 0x0) write(r2, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x10000, 0x0) 05:41:50 executing program 2: r0 = socket$can_j1939(0x1d, 0x2, 0x7) connect$can_j1939(r0, &(0x7f0000000300), 0xfd5e) 05:41:50 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce9", 0x37}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:50 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r3, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:41:50 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000003840)=[{{&(0x7f0000000080)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}}, {{&(0x7f00000004c0)={0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x1c, 0x0, 0x0, &(0x7f00000005c0)=[@pktinfo={{0x24, 0x29, 0x32, {@mcast1}}}], 0x28}}], 0x2, 0x0) 05:41:50 executing program 2: clone3(&(0x7f0000001180)={0x47024100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:41:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000400)={@in, 0x0, 0x6, 0x21, 0x0, "00000000000000000000000000000000000000000000000000008000007200001000000000000000439a0000000000000000000000000000ffffffffffffffe0000000006926ed0c00008b000100"}, 0xd8) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) [ 1869.896198][T23521] loop7: detected capacity change from 0 to 1036 05:41:50 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d63e4062c7e3a", 0x44}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:51 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:51 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:51 executing program 0: sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB='<\x00\x00', @ANYRES16=0x0, @ANYBLOB="00022abd7000fb"], 0x3c}}, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x890c, &(0x7f0000000140)={'sit0\x00', 0x0}) 05:41:51 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce9", 0x37}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) [ 1870.708401][ T10] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 05:41:53 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, 0x0, &(0x7f0000000000)=0x0) timer_settime(r3, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:41:53 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0xeb33, 0x101002) write$P9_RRENAMEAT(r0, &(0x7f0000000040)={0xfffffffffffffd1a}, 0xfa4) 05:41:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='hugetlbfs\x00', 0x0, 0x0) open(0x0, 0x141042, 0x0) 05:41:53 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce9", 0x37}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:53 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:53 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x39000, 0x0) write(r2, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x10000, 0x0) 05:41:54 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce9", 0x37}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:54 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:54 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0xeb33, 0x101002) write$P9_RRENAMEAT(r0, &(0x7f0000000040)={0xfffffffffffffd1a}, 0xfa4) [ 1873.236696][T23630] loop7: detected capacity change from 0 to 1036 [ 1873.278353][ T10] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 05:41:54 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f0000000140), &(0x7f0000000180)=0xc) 05:41:54 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41024, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:54 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0xeb33, 0x101002) write$P9_RRENAMEAT(r0, &(0x7f0000000040)={0xfffffffffffffd1a}, 0xfa4) 05:41:54 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, 0x0, &(0x7f0000000000)=0x0) timer_settime(r3, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:41:54 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a5d", 0x3e}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:54 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$netlink(r0, 0x10e, 0x4, &(0x7f0000000000)=""/189, &(0x7f00000000c0)=0xbd) 05:41:54 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0xeb33, 0x101002) write$P9_RRENAMEAT(r0, &(0x7f0000000040)={0xfffffffffffffd1a}, 0xfa4) 05:41:54 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:54 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x39000, 0x0) write(r3, &(0x7f0000000100)="b1", 0x19000) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 05:41:54 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99e", 0x38}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:54 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x2, 0x9, 0x0, 0x5, 0x2}, 0x10}}, 0x0) 05:41:54 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, 0x0, &(0x7f0000000000)=0x0) timer_settime(r3, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:41:54 executing program 2: write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000040)={0xfffffffffffffd1a}, 0xfa4) 05:41:55 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3ff, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) [ 1874.006441][T23667] loop7: detected capacity change from 0 to 1036 05:41:55 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99e", 0x38}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:55 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x0) 05:41:55 executing program 2: write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000040)={0xfffffffffffffd1a}, 0xfa4) 05:41:55 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740), &(0x7f0000000000)=0x0) timer_settime(r3, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) [ 1874.292480][T23688] loop7: detected capacity change from 0 to 1036 05:41:55 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:55 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99e", 0x38}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x39000, 0x0) write(r3, &(0x7f0000000100)="b1", 0x19000) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 05:41:55 executing program 2: write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000040)={0xfffffffffffffd1a}, 0xfa4) 05:41:55 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659ee", 0x3b}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:55 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:56 executing program 2: r0 = syz_open_dev$vcsa(0x0, 0xeb33, 0x101002) write$P9_RRENAMEAT(r0, &(0x7f0000000040)={0xfffffffffffffd1a}, 0xfa4) 05:41:56 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:56 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659ee", 0x3b}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) [ 1875.184201][T23728] loop7: detected capacity change from 0 to 1036 [ 1875.216175][ T26] audit: type=1804 audit(1634881316.181:3421): pid=23691 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir196395779/syzkaller.mtBa3l/1732/file0" dev="sda1" ino=14163 res=1 errno=0 [ 1875.242105][ T26] audit: type=1804 audit(1634881316.191:3422): pid=23731 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir196395779/syzkaller.mtBa3l/1732/file0" dev="sda1" ino=14163 res=1 errno=0 05:41:56 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000240), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0xb01, 0x0, 0x0, {0x0}}, 0x14}}, 0x0) 05:41:56 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:56 executing program 2: r0 = syz_open_dev$vcsa(0x0, 0xeb33, 0x101002) write$P9_RRENAMEAT(r0, &(0x7f0000000040)={0xfffffffffffffd1a}, 0xfa4) 05:41:56 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740), &(0x7f0000000000)=0x0) timer_settime(r3, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:41:56 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659ee", 0x3b}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) [ 1875.605037][T23745] loop7: detected capacity change from 0 to 1036 05:41:56 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x39000, 0x0) write(r3, &(0x7f0000000100)="b1", 0x19000) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 05:41:56 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x2, 0x3, 0x801, 0x0, 0x0, {}, [@NFQA_CFG_CMD={0x8}]}, 0x1c}}, 0x0) 05:41:56 executing program 2: r0 = syz_open_dev$vcsa(0x0, 0xeb33, 0x101002) write$P9_RRENAMEAT(r0, &(0x7f0000000040)={0xfffffffffffffd1a}, 0xfa4) 05:41:56 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:56 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a", 0x3d}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) [ 1875.828148][ T54] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 05:41:57 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x101002) write$P9_RRENAMEAT(r0, &(0x7f0000000040)={0xfffffffffffffd1a}, 0xfa4) 05:41:57 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:57 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) io_setup(0x2e, &(0x7f0000000400)=0x0) io_submit(r1, 0x0, &(0x7f0000000540)) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x7f, 0x9, 0x40, 0x40, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x7ff, 0x0, @perf_config_ext={0x78cb}, 0x4, 0x0, 0x3, 0x0, 0x73f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0x10, 0xffffffffffffffff, 0x1) clone(0x7a900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000388000/0x1000)=nil, 0x1000, 0x65) io_setup(0x7, &(0x7f0000000280)=0x0) io_destroy(r2) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) io_setup(0x7, &(0x7f0000000040)=0x0) io_cancel(r4, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, &(0x7f0000000340)="108f3949c4702de0f8863a7cba657330ed81c628cab8683bc53b3b5e704341b4857f4933f93b1e65be239fc611aaa6743697066c4b4dea636d490c4ccf185cc831854f52941b42666e94b99ab82a1e68437a5fac933bb3", 0x57, 0x1000000000000, 0x0, 0x3}, &(0x7f00000004c0)) r5 = socket(0x10, 0x80002, 0x0) fchown(r5, 0xee00, 0xee00) perf_event_open(&(0x7f0000000440)={0x4, 0x80, 0x0, 0x5, 0x4, 0x3, 0x0, 0x1, 0x4000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x8d27b01f771b93cf, @perf_config_ext={0xfd0d, 0x101}, 0x0, 0xf6f, 0x7f, 0x0, 0x7, 0x1, 0xfffb, 0x0, 0x0, 0x0, 0x993d}, 0x0, 0x10, 0xffffffffffffffff, 0x9) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, 0x0}, 0x40025) 05:41:57 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x101002) write$P9_RRENAMEAT(r0, &(0x7f0000000040)={0xfffffffffffffd1a}, 0xfa4) 05:41:57 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea6", 0x3c}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:57 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740), &(0x7f0000000000)=0x0) timer_settime(r3, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) [ 1876.298493][T23786] loop7: detected capacity change from 0 to 1036 05:41:57 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x39000, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r4, 0x0, 0x10000, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 05:41:57 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) io_setup(0x2e, &(0x7f0000000400)=0x0) io_submit(r1, 0x0, &(0x7f0000000540)) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x7f, 0x9, 0x40, 0x40, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x7ff, 0x0, @perf_config_ext={0x78cb}, 0x4, 0x0, 0x3, 0x0, 0x73f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0x10, 0xffffffffffffffff, 0x1) clone(0x7a900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000388000/0x1000)=nil, 0x1000, 0x65) io_setup(0x7, &(0x7f0000000280)=0x0) io_destroy(r2) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) io_setup(0x7, &(0x7f0000000040)=0x0) io_cancel(r4, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, &(0x7f0000000340)="108f3949c4702de0f8863a7cba657330ed81c628cab8683bc53b3b5e704341b4857f4933f93b1e65be239fc611aaa6743697066c4b4dea636d490c4ccf185cc831854f52941b42666e94b99ab82a1e68437a5fac933bb3", 0x57, 0x1000000000000, 0x0, 0x3}, &(0x7f00000004c0)) r5 = socket(0x10, 0x80002, 0x0) fchown(r5, 0xee00, 0xee00) perf_event_open(&(0x7f0000000440)={0x4, 0x80, 0x0, 0x5, 0x4, 0x3, 0x0, 0x1, 0x4000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x8d27b01f771b93cf, @perf_config_ext={0xfd0d, 0x101}, 0x0, 0xf6f, 0x7f, 0x0, 0x7, 0x1, 0xfffb, 0x0, 0x0, 0x0, 0x993d}, 0x0, 0x10, 0xffffffffffffffff, 0x9) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, 0x0}, 0x40025) 05:41:57 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x101002) write$P9_RRENAMEAT(r0, &(0x7f0000000040)={0xfffffffffffffd1a}, 0xfa4) 05:41:57 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea6", 0x3c}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:57 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) [ 1876.937807][T23810] loop7: detected capacity change from 0 to 1036 05:41:58 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c81", 0x82}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea6", 0x3c}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:58 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0xeb33, 0x0) write$P9_RRENAMEAT(r0, &(0x7f0000000040)={0xfffffffffffffd1a}, 0xfa4) 05:41:58 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000380)="5d650181193eac9238391a5f172d3ef144fcf7f3b5c03bb7e73074d5c9551ec4e76ed35274d74461bdaa670f3acfe92b0000010000000000ffffffffffffffff5f42485266535f4d43a4463e4f7afb3f5511489034e0ace519d5304c1ceeafa86fa871b2883f79e1c88056d77215f3e4ba08bfa90b0ddf294226f1a5e7087e904f052dbf121aa317f2e6893652b217fe2ad47bc2a3a63eab8372f137dd504889d48d8e04f1699c97b9d572052311f6bf8f9c5c1bcd925bd2c85a9d03300d", 0xbe, 0x10000}], 0x0, &(0x7f0000016b00)) [ 1877.146468][T23825] loop7: detected capacity change from 0 to 1036 05:41:58 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a", 0x3d}], 0x1, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:58 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:41:58 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0xeb33, 0x0) write$P9_RRENAMEAT(r0, &(0x7f0000000040)={0xfffffffffffffd1a}, 0xfa4) 05:41:58 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x39000, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r4, 0x0, 0x10000, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 05:41:58 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40), 0x0, &(0x7f00000000c0)={[{@lowerdir={'lowerdir', 0x3d, './file0'}, 0x3a}, {@xino_auto}]}) socketpair(0x0, 0x20000000000001, 0x0, 0x0) 05:41:58 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a", 0x3d}], 0x1, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:58 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:58 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0xeb33, 0x0) write$P9_RRENAMEAT(r0, &(0x7f0000000040)={0xfffffffffffffd1a}, 0xfa4) 05:41:58 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) [ 1877.913913][T23857] loop7: detected capacity change from 0 to 1036 [ 1877.927252][T23860] overlayfs: failed to resolve 'xino=auto': -2 [ 1877.948706][T23864] overlayfs: failed to resolve 'xino=auto': -2 05:41:59 executing program 0: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000400)='./bus\x00', 0x0) write$P9_RXATTRCREATE(r1, &(0x7f0000000200)={0x5a}, 0xfe85) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ftruncate(r0, 0x7fa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) r3 = open(&(0x7f00000006c0)='./bus\x00', 0x141142, 0x0) ftruncate(r3, 0x88001) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 05:41:59 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0xeb33, 0x101002) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000040)={0xfffffffffffffd1a}, 0xfa4) 05:41:59 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a", 0x3d}], 0x1, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) [ 1878.210632][ T26] audit: type=1804 audit(1634881319.181:3423): pid=23879 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir196395779/syzkaller.mtBa3l/1739/bus" dev="sda1" ino=14130 res=1 errno=0 05:41:59 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) [ 1878.275494][T23882] loop7: detected capacity change from 0 to 1036 [ 1878.328433][ T26] audit: type=1804 audit(1634881319.211:3424): pid=23879 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir196395779/syzkaller.mtBa3l/1739/bus" dev="sda1" ino=14130 res=1 errno=0 05:41:59 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:41:59 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0xeb33, 0x101002) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000040)={0xfffffffffffffd1a}, 0xfa4) [ 1878.387585][ T9754] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 1878.536711][T23887] I/O error, dev loop7, sector 1024 op 0x0:(READ) flags 0x80700 phys_seg 2 prio class 0 [ 1878.609123][ T26] audit: type=1804 audit(1634881319.582:3425): pid=23898 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir196395779/syzkaller.mtBa3l/1739/bus" dev="sda1" ino=14130 res=1 errno=0 [ 1878.738517][ T26] audit: type=1804 audit(1634881319.602:3426): pid=23897 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir196395779/syzkaller.mtBa3l/1739/bus" dev="sda1" ino=14130 res=1 errno=0 05:41:59 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x39000, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r4, 0x0, 0x10000, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 05:41:59 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{0x0}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a", 0x3d}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:41:59 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0xeb33, 0x101002) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000040)={0xfffffffffffffd1a}, 0xfa4) 05:41:59 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:41:59 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r0, 0x4008f510, 0x0) ioctl$BTRFS_IOC_FS_INFO(r0, 0x8400941f, &(0x7f0000000d80)) fchmodat(0xffffffffffffffff, &(0x7f00000003c0)='./file1\x00', 0x41) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000) fstat(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='system.posix_acl_access\x00', 0x0, 0xfffffffffffffd0b, 0x3) setxattr$system_posix_acl(&(0x7f0000000240)='.\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000540)=ANY=[@ANYBLOB="020000000100000000000000040004000400000a08000400", @ANYRES32=0xee00, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000500", @ANYRES32=r2, @ANYBLOB="10000500000000002000050000000000"], 0x3c, 0x1) r3 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000700)="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", 0x171, 0x600}, {0x0, 0x0, 0x80000000}], 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"]) write$khugepaged_scan(0xffffffffffffffff, &(0x7f0000000180), 0x8) chdir(&(0x7f00000001c0)='./file0\x00') ioctl$LOOP_SET_FD(r1, 0x4c00, 0xffffffffffffffff) mkdirat(r3, &(0x7f0000000040)='./file1\x00', 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) socket$alg(0x26, 0x5, 0x0) syz_open_dev$vcsa(0x0, 0x7, 0x440040) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000380)='./file1\x00', 0x1, 0x5, &(0x7f0000000680)=[{&(0x7f0000000440)="38eaaa22a805597df1e3a22a4eed643aac6f219f51e1be88127a0e2dabffd8f80dbb4b148336d276c316fadadccec79b91e95158200e7d8f1f396553fa525d621b3f8c6b3dda46b84a688798374855640b98d5373870462b7637d04d869769414cbc967ba7fea01037d55d09ff16279be37011", 0x73, 0x7}, {&(0x7f0000000880)="407f333f21f4c57f4fe3c5f114f91a373139c03ae88cf2cd8ddadca2e1a773e482fce6fc7e0d289b1d3dd1365b7f1e0043cfc67fb05c6324d01b34be88defb035a32bda212b65ca0a1ce4a7d36257c2836c48d120ef03704c8763de4c4c24f66fa22aa7a65aaf14cd5e54252995e2a6164f69f8ea5520af95aee6ce93bcb9ebc38a92ed76d32e4abec24138552d72eda05e495c42a78cf786ed3b33cf2fffc6a70291f830503cf5c99be7a7721f1ddcee55588ff3d5bf3dc26fdd32150e1bd8cdb4576d9333dfc6c978326", 0xcb, 0xffffffff}, {&(0x7f00000004c0)="3159a94c7b2376e017913a16950790822452037640d245efb3607042267944a0f2e7a7d7589a312a3e173c8e4eeb4a4abe", 0x31}, {&(0x7f0000000500)="16519d6af430920ccaaf34bef199b05cfedf8a410990d120913949b3d67c5bfc18240be2e880c29ce3d35ef5bcf8a5c60d7230cce8db08", 0x37}, {&(0x7f0000000580)="865f1d288c86abcb303431a3690c481d7766c4b310067dd5d2f3c4718fa3f6617c4f49fa2c7d334a42b03dd26ea375900e4093db6a7d580c81bd4055b34d95792a03a9f8d84858a030eaeebf553f50725008", 0x52, 0x5}], 0x100008, &(0x7f0000000980)={[{@uni_xlate}], [{@func={'func', 0x3d, 'FIRMWARE_CHECK'}}]}) 05:42:00 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0xeb33, 0x101002) write$P9_RRENAMEAT(r0, 0x0, 0x0) 05:42:00 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:42:00 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{0x0}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a", 0x3d}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:42:00 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:42:00 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x7, r0) [ 1879.173268][T23923] loop7: detected capacity change from 0 to 1036 05:42:00 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:42:00 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0xeb33, 0x101002) write$P9_RRENAMEAT(r0, 0x0, 0x0) 05:42:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x10000, 0x0) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 05:42:00 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{0x0}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a", 0x3d}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:42:00 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:42:00 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0xeb33, 0x101002) write$P9_RRENAMEAT(r0, 0x0, 0x0) 05:42:00 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2, 0x16, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 05:42:00 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) [ 1879.948415][T23954] loop7: detected capacity change from 0 to 1036 05:42:01 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x48a240, 0x0) 05:42:01 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x1203c2, 0x0) 05:42:01 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a", 0x3d}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:42:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x10000, 0x0) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 05:42:01 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)) timer_settime(0x0, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:42:01 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$GIO_UNIMAP(r0, 0x4b66, 0x0) 05:42:01 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) 05:42:01 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_complete(0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:42:01 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a", 0x3d}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:42:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x10000, 0x0) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1880.621248][T23990] loop7: detected capacity change from 0 to 1036 05:42:01 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) 05:42:01 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, 0x0) 05:42:01 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_complete(0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:42:01 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a", 0x3d}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:42:01 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, 0x0) 05:42:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x39000, 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x10000, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1880.951016][ T10] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 1880.957573][T24009] loop7: detected capacity change from 0 to 1036 05:42:02 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)) timer_settime(0x0, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:42:02 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 05:42:02 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_complete(0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:42:02 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_open_pts(r0, 0x0) 05:42:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x39000, 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x10000, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 05:42:02 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0d", 0x41}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a", 0x3d}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:42:02 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, 0x0, 0x0) 05:42:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x39000, 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x10000, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 05:42:02 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0d", 0x41}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a", 0x3d}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:42:02 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_complete(0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) [ 1881.807408][T24050] loop7: detected capacity change from 0 to 1036 05:42:02 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$NS_GET_NSTYPE(r0, 0xb703, 0x0) 05:42:02 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x39000, 0x0) write(r1, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x10000, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 05:42:03 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)) timer_settime(0x0, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:42:03 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0d", 0x41}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a", 0x3d}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:42:03 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_complete(0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:42:03 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_TIOCINQ(r0, 0x541b, 0x0) 05:42:03 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x39000, 0x0) write(r1, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x10000, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 05:42:03 executing program 2: r0 = syz_open_dev$midi(&(0x7f00000014c0), 0xfc, 0x2) write$midi(r0, &(0x7f0000005980)="91", 0x1) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 1882.590943][T24082] loop7: detected capacity change from 0 to 1036 05:42:03 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_complete(0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:42:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x108, 0x108, 0x8, [@int, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @fwd, @const, @typedef, @array, @enum={0x0, 0x9, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x128}, 0x20) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 05:42:03 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe", 0x62}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a", 0x3d}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:42:03 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x39000, 0x0) write(r1, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x10000, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 05:42:03 executing program 2: prctl$PR_SET_MM(0x23, 0x6, &(0x7f0000ffa000/0x3000)=nil) 05:42:03 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) recvmmsg(r0, &(0x7f0000005900)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2000, 0x0) 05:42:04 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:42:04 executing program 2: syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) 05:42:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0xe, &(0x7f00000002c0)="a13a893c63e554e1c1dbf96e8d7d2a01d9fa7f55784a637decc037afdfee0757ba4181e3292225f11a65d48b60b88fe2989920920220001bcf84e49bd92d02cf291dbabdd5d4ec3c619a64b8e95e1a7668b2de256b71182617c67156d055a1d94e47b5cb2fab09721289f43b0f31d35b1042b68f12ba5e959521312e3c3e09a2abee39c1b71561f9eb10be4d08f07513918e947e0b394e190b8d67b9784bd2c79d99f948611809dd2c408781af50a4203abe8d06139ba210e976860bd34ea05277b4831306d9d14974c77a0a44d18bf5d6297ef7d67994dc", 0xd8) 05:42:04 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe", 0x62}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a", 0x3d}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:42:04 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:42:04 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x39000, 0x0) write(r3, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r4, 0x0, 0x10000, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1883.648136][T24133] loop7: detected capacity change from 0 to 1036 05:42:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20008804}, 0x4001) lseek(0xffffffffffffffff, 0x0, 0x0) syz_80211_join_ibss(&(0x7f0000000140)='wlan1\x00', &(0x7f0000000040)=@default_ap_ssid, 0x6, 0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x74, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_OFFCHANNEL_TX_OK={0x4}, @NL80211_ATTR_FRAME={0x4a, 0x33, @beacon={@with_ht={{{}, {}, @device_a, @device_a, @from_mac=@device_b}}, 0x0, @random, 0x0, @val={0x0, 0x6, @default_ap_ssid}, @val, @void, @void, @val={0x6, 0x2}, @val={0x5, 0x3}, @void, @val={0x2a, 0x1}, @void, @void, @void, @void, @val={0x76, 0x6}}}, @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1450}]]}, 0x74}}, 0x0) 05:42:04 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe", 0x62}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a", 0x3d}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:42:04 executing program 0: socketpair(0x1d, 0x0, 0x0, &(0x7f0000000640)) 05:42:04 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x39000, 0x0) write(r3, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r4, 0x0, 0x10000, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 05:42:04 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) [ 1883.935216][T24152] loop7: detected capacity change from 0 to 1036 [ 1883.954770][ T10] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1883.962812][ T10] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1884.018727][T24153] can: request_module (can-proto-0) failed. [ 1884.079841][T24153] can: request_module (can-proto-0) failed. 05:42:05 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8", 0x72}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a", 0x3d}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) [ 1884.147840][ T8901] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 1884.325594][T24170] loop7: detected capacity change from 0 to 1036 05:42:05 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) 05:42:05 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000940), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000001c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"8442688279df4d48dee1ea0be44abb05"}}, @in6={0xa, 0x0, 0x0, @mcast1}}}, 0x118) 05:42:05 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:42:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@ipv6_deladdrlabel={0x1c, 0x67, 0xd0d}, 0x1c}}, 0x0) 05:42:05 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x39000, 0x0) write(r3, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r4, 0x0, 0x10000, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 05:42:05 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8", 0x72}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a", 0x3d}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:42:05 executing program 0: splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)=0x9, 0x401, 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000040)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000052440)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x3f, "deb2842d5ce960"}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect={0x0, 0x5517, 0x48000000}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) 05:42:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x39000, 0x0) write(r1, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x10000, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 05:42:05 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000940), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000480)={0x0, 0x1f, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) 05:42:05 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 05:42:06 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe", 0x62}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a", 0x3d}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:42:06 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syz_tun\x00'}) 05:42:06 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r3, 0x0, 0x0, 0x0) 05:42:06 executing program 0: splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)=0x9, 0x401, 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000040)={0x0, 0x0, "b024e86c9a84173519073da865d2b266430a2323007631e27a4f7b1696958c6ae031bab7718280b2c15e0760fa283468f477311b7a4282878c5d12241c212505d7bfe6caf85431d921fe108459c1bcb678cceb3a9bc22dde58c21957cf1ad810522b458aa59379a297e7ffb72c0e55db672be36a20f3e3a1ad61b080b0c73f3b29c177802a3a61ecf97315983a9952e555d162592183210bb22fc50edde4a7e31b19c79ad19e8d1e49598497df161ef0456c07b0246bab9fabe7aa3d07259a302a9752aa9e13722f72f9023cc3e7d7132f86162a240e5f2ad2f6983efdae4738ea6829f41b55971dc15a3a4ab5abb72b7508ae7763d6d85edb9dbadb88df69fc", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000052440)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x3f, "deb2842d5ce960"}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect={0x0, 0x5517, 0x48000000}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) 05:42:06 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) setgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_complete(0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) 05:42:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x39000, 0x0) write(r1, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x10000, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 05:42:06 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) 05:42:06 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5", 0x52}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a", 0x3d}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:42:06 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5", 0x52}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a", 0x3d}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:42:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001ec0)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[{0x408, 0x1, 0x1, "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"}], 0x408}, 0x0) 05:42:06 executing program 0: splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)=0x9, 0x401, 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000040)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000052440)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x3f, "deb2842d5ce960"}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect={0x0, 0x5517, 0x48000000}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) 05:42:06 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000080)="c4", 0x1}], 0x1}, 0x0) 05:42:06 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x40) 05:42:07 executing program 2: mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303830303030303030302c009b1395ad5a7877b3c15d11de3339a94558403f5279874a9ec02cc25b0112836d1684da721518e1df5fd92f0a5ceefc70f4f561bf34a9edf61fa09834a22a2729db1a541862dfa923c5e471ee65"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) mount$bpf(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680), 0x0, &(0x7f00000006c0)={[{}, {@mode={'mode', 0x3d, 0x3}}, {}, {@mode={'mode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0x20}}, {@mode={'mode', 0x3d, 0x8}}, {}], [{@fowner_lt}, {@uid_lt}, {@uid_lt}, {@fowner_lt}, {@subj_user={'subj_user', 0x3d, 'team0\x00'}}]}) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140), 0x0, 0x0) 05:42:07 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r3, 0x0, 0x0, 0x0) 05:42:07 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db2", 0x42}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a", 0x3d}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:42:07 executing program 0: splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)=0x9, 0x401, 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000040)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000052440)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x3f, "deb2842d5ce960"}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect={0x0, 0x5517, 0x48000000}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) 05:42:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000001ec0)={&(0x7f00000012c0)={0x2, 0x0, @broadcast}, 0x10, 0x0}, 0x200000c4) 05:42:07 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x6a0843, 0x0) ioctl$TUNSETOWNER(r0, 0x400454cc, 0x0) 05:42:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x39000, 0x0) write(r1, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x10000, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1886.717613][ T4020] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 05:42:07 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000031c0)={&(0x7f0000003040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1}}, @ptr={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000030c0)=""/204, 0x41, 0xcc, 0x1}, 0x20) 05:42:07 executing program 5: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x20}, 0xc) 05:42:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x39000, 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x10000, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 05:42:08 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x1c, 0x4, 0x4, 0x600000}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:08 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d", 0x32}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a", 0x3d}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:42:08 executing program 2: perf_event_open(&(0x7f0000000040)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:42:08 executing program 3: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000400)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000004540)={0x2020}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000000380)={0xfffffffffffffdc9}, 0xd03cb0e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000001740)={0x0, 0x14}, &(0x7f0000000000)=0x0) timer_settime(r3, 0x0, 0x0, 0x0) 05:42:08 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x39000, 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x10000, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 05:42:08 executing program 5: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x0, 0x18}, 0xc) 05:42:08 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030022000505d25a80648c63940d6c24fc6004000f400a000a00053582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 05:42:08 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x1c, 0x4, 0x4, 0x600000}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:08 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6", 0x22}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a", 0x3d}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) [ 1888.029727][T24304] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 1888.038213][T24304] netlink: 194488 bytes leftover after parsing attributes in process `syz-executor.2'. 05:42:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x39000, 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x10000, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 05:42:09 executing program 5: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x1c, 0x4, 0x4, 0x600000}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:09 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a", 0x12}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a", 0x3d}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:42:09 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x1c, 0x4, 0x4, 0x600000}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:09 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030022000505d25a80648c63940d6c24fc6004000f400a000a00053582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 05:42:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x39000, 0x0) write(r2, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x10000, 0x0) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1888.760895][T24320] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 1888.769357][T24320] netlink: 194488 bytes leftover after parsing attributes in process `syz-executor.2'. 05:42:10 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030022000505d25a80648c63940d6c24fc6004000f400a000a00053582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 05:42:10 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53", 0x2}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a", 0x3d}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:42:10 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x80a01, 0x0) ioctl$TUNGETSNDBUF(r0, 0x5450, 0x0) 05:42:10 executing program 3: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 05:42:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x39000, 0x0) write(r2, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x10000, 0x0) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 05:42:10 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x1c, 0x4, 0x4, 0x600000}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) [ 1889.369175][T24336] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 1889.377428][T24336] netlink: 194488 bytes leftover after parsing attributes in process `syz-executor.2'. 05:42:10 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x440d02, 0x0) 05:42:10 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a", 0x3d}], 0x2, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:42:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f000000f2c0)={&(0x7f000000f180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f000000f200)=""/152, 0x2e, 0x98, 0x1}, 0x20) 05:42:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x39000, 0x0) write(r2, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x10000, 0x0) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 05:42:10 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030022000505d25a80648c63940d6c24fc6004000f400a000a00053582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 05:42:10 executing program 5: syz_emit_ethernet(0xe, &(0x7f00000020c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff88e7"], 0x0) 05:42:10 executing program 3: syz_emit_ethernet(0x5a, &(0x7f0000001180)={@local, @random="cf106bbb4df3", @val, {@ipv6}}, 0x0) 05:42:10 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a", 0x3d}], 0x2, 0x0, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:42:10 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x1c, 0x4, 0x4, 0x600000}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:10 executing program 5: syz_emit_ethernet(0x66, &(0x7f00000001c0)={@local, @broadcast, @val, {@ipv6}}, 0x0) [ 1889.917155][ T5453] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 1889.946595][T24359] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 1889.954715][T24359] netlink: 194488 bytes leftover after parsing attributes in process `syz-executor.2'. 05:42:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x39000, 0x0) write(r3, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r4, 0x0, 0x10000, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 05:42:11 executing program 3: syz_emit_ethernet(0x66, &(0x7f00000020c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd609120fa00303a0000000000000000000000ffbfe0000001fe"], 0x0) 05:42:11 executing program 5: syz_emit_ethernet(0x6a, &(0x7f0000001180)={@local, @random="cf106bbb4df3", @val, {@ipv6}}, 0x0) 05:42:11 executing program 2: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030022000505d25a80648c63940d6c24fc6004000f400a000a00053582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 05:42:11 executing program 3: syz_emit_ethernet(0x4a, &(0x7f0000001180)={@local, @random="cf106bbb4df3", @val, {@ipv6}}, 0x0) 05:42:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x39000, 0x0) write(r3, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r4, 0x0, 0x10000, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 05:42:11 executing program 5: io_pgetevents(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)={0x0}) 05:42:11 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a", 0x3d}], 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:42:11 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x1c, 0x4, 0x4, 0x600000}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:11 executing program 2: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030022000505d25a80648c63940d6c24fc6004000f400a000a00053582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 05:42:11 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$sock(r0, &(0x7f00000014c0)={0x0, 0x0, 0x0}, 0x20000001) 05:42:11 executing program 5: capget(&(0x7f0000006100)={0x19980330}, 0x0) 05:42:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x39000, 0x0) write(r3, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r4, 0x0, 0x10000, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 05:42:11 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a", 0x3d}], 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:42:11 executing program 3: r0 = syz_usb_connect$printer(0x0, 0x36, &(0x7f00000000c0)=ANY=[@ANYBLOB="12010000090000082505a8a4070000000e01090224ffff050074980904"], 0x0) syz_usb_control_io$printer(r0, 0x0, &(0x7f0000000400)={0x34, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x20, 0x0, 0x1}}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) 05:42:11 executing program 2: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030022000505d25a80648c63940d6c24fc6004000f400a000a00053582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 05:42:12 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x1c, 0x4, 0x4, 0x600000}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:12 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x68, r1, 0x1, 0x0, 0x0, {{}, {}, {0x4c, 0x18, {0x0, @media='ib\x00'}}}}, 0x68}}, 0x0) 05:42:12 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a", 0x3d}], 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:42:12 executing program 2: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030022000505d25a80648c63940d6c24fc6004000f400a000a00053582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 05:42:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) write(r3, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r4, 0x0, 0x10000, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 05:42:12 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x2000, 0x4, 0x3400}, 0x1c) [ 1891.436329][T31893] usb 4-1: new high-speed USB device number 54 using dummy_hcd 05:42:12 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a", 0x3d}], 0x2, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:42:12 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x1c, 0x4, 0x4, 0x600000}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:12 executing program 2: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030022000505d25a80648c63940d6c24fc6004000f400a000a00053582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 05:42:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) write(r3, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r4, 0x0, 0x10000, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1891.678143][T31893] usb 4-1: Using ep0 maxpacket: 8 [ 1891.797518][T31893] usb 4-1: config index 0 descriptor too short (expected 65316, got 36) [ 1891.806032][T31893] usb 4-1: config 5 has too many interfaces: 255, using maximum allowed: 32 [ 1891.814753][T31893] usb 4-1: config 5 has an invalid descriptor of length 0, skipping remainder of the config [ 1891.825032][T31893] usb 4-1: config 5 has 1 interface, different from the descriptor's value: 255 [ 1892.056953][T31893] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.07 [ 1892.066576][T31893] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=14 [ 1892.074940][T31893] usb 4-1: SerialNumber: syz [ 1892.127985][T31893] hub 4-1:5.0: bad descriptor, ignoring hub [ 1892.133941][T31893] hub: probe of 4-1:5.0 failed with error -5 [ 1892.476666][ T4020] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 05:42:15 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000001000)) 05:42:15 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x2000, 0x4, 0x3400}, 0x1c) 05:42:15 executing program 2: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030022000505d25a80648c63940d6c24fc6004000f400a000a00053582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 05:42:15 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a", 0x3d}], 0x2, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:42:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) write(r3, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r4, 0x0, 0x10000, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 05:42:15 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x1c, 0x4, 0x4, 0x600000}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) [ 1894.176182][ T3705] usb 4-1: USB disconnect, device number 54 05:42:15 executing program 2: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030022000505d25a80648c63940d6c24fc6004000f400a000a00053582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 05:42:15 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x2000, 0x4, 0x3400}, 0x1c) 05:42:15 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a", 0x3d}], 0x2, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24000000) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:42:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x39000, 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r4, 0x0, 0x10000, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 05:42:15 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000000)=[{{&(0x7f0000000180)={0xa, 0x4e24, 0x0, @dev}, 0x1c, 0x0}}], 0x1, 0x8000) r1 = fcntl$dupfd(r0, 0x0, r0) sendmmsg$inet6(r1, &(0x7f0000004fc0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f00000000c0)="f4", 0x1}], 0x1}}], 0x1, 0x4000000) 05:42:15 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x1c, 0x4, 0x4, 0x600000}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:15 executing program 2: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030022000505d25a80648c63940d6c24fc6004000f400a000a00053582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 05:42:15 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x2000, 0x4, 0x3400}, 0x1c) 05:42:15 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a", 0x3d}], 0x2, 0x0, 0x0) sendfile(r0, r0, 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:42:15 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0xff72) 05:42:15 executing program 2: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030022000505d25a80648c63940d6c24fc6004000f400a000a00053582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 05:42:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000a40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000000cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x10020) 05:42:15 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a", 0x3d}], 0x2, 0x0, 0x0) sendfile(r0, r0, 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:42:15 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x1c, 0x4, 0x4, 0x600000}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:16 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000a80)={'tunl0\x00', &(0x7f0000000a00)={'tunl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @multicast1, @multicast1}}}}) [ 1895.031245][ T8901] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 05:42:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x39000, 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r4, 0x0, 0x10000, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 05:42:16 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000003c0)={0x2, 0xb, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_x_kmaddress={0x8, 0x19, 0x0, @in6={0xa, 0x0, 0x0, @private2}, @in6={0xa, 0x0, 0x0, @private2}}, @sadb_x_sec_ctx={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @loopback}}]}, 0x80}}, 0x0) 05:42:16 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x0) 05:42:16 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a", 0x3d}], 0x2, 0x0, 0x0) sendfile(r0, r0, 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:42:16 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x40000, 0x5) 05:42:16 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x1c, 0x4, 0x4, 0x600000}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:16 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x0) 05:42:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 05:42:16 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a", 0x3d}], 0x2, 0x0, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r1) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:42:16 executing program 5: r0 = creat(&(0x7f0000001080)='./file0\x00', 0x0) write$FUSE_ENTRY(r0, 0x0, 0x0) 05:42:16 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x1c, 0x4, 0x4, 0x600000}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:16 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x0) 05:42:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x39000, 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r4, 0x0, 0x10000, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 05:42:17 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000000c0)='./file1\x00', 0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0) 05:42:17 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) openat(r0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x4c) 05:42:17 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a", 0x3d}], 0x2, 0x0, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) 05:42:17 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 05:42:17 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x1c, 0x4, 0x4, 0x600000}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, 0x0, 0x0) mknodat$loop(r0, &(0x7f0000001340)='./file1\x00', 0x8000, 0x0) 05:42:17 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x1c, 0x4, 0x4, 0x600000}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:17 executing program 5: r0 = msgget(0x1, 0x0) msgrcv(r0, &(0x7f0000000180)={0x0, ""/81}, 0xd, 0x0, 0x1000) 05:42:17 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 05:42:17 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) openat(0xffffffffffffffff, 0x0, 0x0, 0x7) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) geteuid() r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000800)=[{&(0x7f00000009c0)}, {&(0x7f0000000280)="d756c8f86a7e4156a24690345a92abcf572dca7e756782e699393deb6aed68197c0000000000a9ac02edb0d5cc3cb86615dfc2fb1ebce99ea659eea65a", 0x3d}], 0x2, 0x0, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:42:18 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) utimensat(r0, 0x0, 0x0, 0x0) 05:42:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x39000, 0x0) write(r3, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r4, 0x0, 0x10000, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 05:42:18 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 05:42:18 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000000)='./file1\x00', 0x0, 0x88) 05:42:18 executing program 1: clock_nanosleep(0x1, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180)) 05:42:18 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x1c, 0x4, 0x4, 0x600000}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:18 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001ec0)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000002180)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000001f40)='Y', 0x1}, {&(0x7f0000001f80)="cb", 0x1}], 0x2, &(0x7f0000002040)=[@ip_retopts={{0x10}}, @ip_ttl={{0x14}}], 0x28}, 0x4000840) 05:42:18 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$FUSE_STATFS(r0, 0x0, 0xffffffffffffff82) 05:42:18 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffa, 0x0, 0x0) 05:42:19 executing program 5: syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}}}]}}]}}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x1, [{0x0, 0x0}]}) 05:42:19 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x0) 05:42:19 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x1c, 0x4, 0x4, 0x600000}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:19 executing program 3: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x200, 0x0, 0x0, 0x0, 0x10, 0x46d, 0xc30a, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xf9, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x2, {0x9, 0x21, 0x7, 0x9, 0x1, {0x22, 0xa18}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x9, 0xfe, 0xb5}}}}}]}}]}}, &(0x7f0000000140)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x6, 0x2, 0x0, 0xff, 0x4}, 0x61, &(0x7f0000000080)={0x5, 0xf, 0x61, 0x1, [@generic={0x5c, 0x10, 0x1, "58e0c17c975740a912b977df46f2321af9db5ead75108dd4603204cb96094378fb216e5968da5e9ffe74a640dce23262a1c44ebab4c5370f5b829c7475947a10548a368ba67ff835a8b4f88a5da3381d8caaadbc6634081656"}]}, 0x1, [{0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x100a}}]}) [ 1898.446401][ T3705] usb 6-1: new high-speed USB device number 29 using dummy_hcd [ 1898.645967][ T9804] usb 4-1: new high-speed USB device number 55 using dummy_hcd [ 1898.714511][ T3705] usb 6-1: Using ep0 maxpacket: 8 05:42:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x39000, 0x0) write(r3, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r4, 0x0, 0x10000, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 05:42:19 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x0) 05:42:19 executing program 1: syz_usb_connect$hid(0x6, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46d, 0xc30a, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, 0x0) 05:42:19 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x1c, 0x4, 0x4, 0x600000}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) [ 1898.855872][ T3705] usb 6-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 1898.906205][ T9804] usb 4-1: Using ep0 maxpacket: 16 05:42:19 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x0) [ 1899.138672][ T3705] usb 6-1: string descriptor 0 read error: -22 [ 1899.145028][ T3705] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1899.154160][ T3705] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1899.219427][ T9804] usb 4-1: New USB device found, idVendor=046d, idProduct=c30a, bcdDevice= 0.40 [ 1899.228878][ T9804] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1899.237193][ T9804] usb 4-1: Product: syz [ 1899.241398][ T9804] usb 4-1: Manufacturer: syz [ 1899.246084][ T9804] usb 4-1: SerialNumber: syz 05:42:20 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x1c, 0x4, 0x4, 0x600000}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:20 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) [ 1899.307641][ T3705] cdc_ether: probe of 6-1:1.0 failed with error -22 [ 1899.513853][ T3705] usb 6-1: USB disconnect, device number 29 05:42:20 executing program 1: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x46d, 0xc30a, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, 0x0) [ 1899.766463][ T9804] usbhid 4-1:1.0: can't add hid device: -71 [ 1899.772582][ T9804] usbhid: probe of 4-1:1.0 failed with error -71 [ 1899.842063][ T9804] usb 4-1: USB disconnect, device number 55 [ 1900.205785][ T3705] usb 2-1: new high-speed USB device number 32 using dummy_hcd [ 1900.316291][ T3710] usb 6-1: new high-speed USB device number 30 using dummy_hcd [ 1900.452886][ T9804] usb 4-1: new high-speed USB device number 56 using dummy_hcd [ 1900.476405][ T3705] usb 2-1: Using ep0 maxpacket: 16 [ 1900.585854][ T3710] usb 6-1: Using ep0 maxpacket: 8 [ 1900.616525][ T3705] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1900.627554][ T3705] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1900.705987][ T9804] usb 4-1: Using ep0 maxpacket: 16 [ 1900.715626][ T3710] usb 6-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 1900.787869][ T4020] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 1900.816469][ T3705] usb 2-1: New USB device found, idVendor=046d, idProduct=c30a, bcdDevice= 0.40 [ 1900.825625][ T3705] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1900.833639][ T3705] usb 2-1: Product: syz [ 1900.838099][ T3705] usb 2-1: Manufacturer: syz [ 1900.842869][ T3705] usb 2-1: SerialNumber: syz [ 1901.006693][ T3710] usb 6-1: string descriptor 0 read error: -22 [ 1901.012991][ T3710] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1901.022362][ T3710] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1901.065647][ T9804] usb 4-1: New USB device found, idVendor=046d, idProduct=c30a, bcdDevice= 0.40 [ 1901.074932][ T9804] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1901.083391][ T9804] usb 4-1: Product: syz [ 1901.087801][ T9804] usb 4-1: Manufacturer: syz [ 1901.092418][ T9804] usb 4-1: SerialNumber: syz [ 1901.099422][ T3710] cdc_ether: probe of 6-1:1.0 failed with error -22 05:42:22 executing program 5: syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f0000000100)={{0x12, 0x1, 0x201, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}}}]}}]}}, &(0x7f00000002c0)={0x0, 0x0, 0x11, &(0x7f00000001c0)={0x5, 0xf, 0x11, 0x1, [@ssp_cap={0xc}]}}) 05:42:22 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) 05:42:22 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x1c, 0x4, 0x4, 0x600000}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) [ 1901.156650][ T3705] usbhid 2-1:1.0: can't add hid device: -22 [ 1901.162680][ T3705] usbhid: probe of 2-1:1.0 failed with error -22 [ 1901.173721][ T9563] usb 6-1: USB disconnect, device number 30 [ 1901.237095][ T3705] usb 2-1: USB disconnect, device number 32 05:42:22 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) 05:42:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x39000, 0x0) write(r3, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r4, 0x0, 0x10000, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 05:42:22 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) 05:42:22 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x1c, 0x4, 0x4, 0x600000}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) [ 1901.555660][ T9804] usbhid 4-1:1.0: can't add hid device: -71 [ 1901.561705][ T9804] usbhid: probe of 4-1:1.0 failed with error -71 [ 1901.644154][ T9804] usb 4-1: USB disconnect, device number 56 05:42:22 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)}], 0x1}, 0x0) 05:42:22 executing program 3: r0 = socket(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x24, &(0x7f0000000200)='.', 0x1) [ 1901.993070][ T9563] usb 6-1: new high-speed USB device number 31 using dummy_hcd [ 1902.000892][ T9611] usb 2-1: new high-speed USB device number 33 using dummy_hcd 05:42:23 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x1, 0x0, 0x0) 05:42:23 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x1c, 0x4, 0x4, 0x600000}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) [ 1902.237697][ T9563] usb 6-1: Using ep0 maxpacket: 8 [ 1902.246081][ T9611] usb 2-1: Using ep0 maxpacket: 16 [ 1902.368273][ T9611] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1902.379543][ T9611] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1902.439369][ T9563] usb 6-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 1902.576196][ T9611] usb 2-1: New USB device found, idVendor=046d, idProduct=c30a, bcdDevice= 0.40 [ 1902.585545][ T9611] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1902.593558][ T9611] usb 2-1: Product: syz [ 1902.597855][ T9611] usb 2-1: Manufacturer: syz [ 1902.602479][ T9611] usb 2-1: SerialNumber: syz [ 1902.626462][ T9563] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1902.635692][ T9563] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1902.643705][ T9563] usb 6-1: Product: syz [ 1902.648180][ T9563] usb 6-1: Manufacturer: syz [ 1902.652804][ T9563] usb 6-1: SerialNumber: syz [ 1902.740346][ T9563] cdc_ether: probe of 6-1:1.0 failed with error -22 05:42:23 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c) connect$inet6(r0, &(0x7f00000001c0)={0x1c, 0x1c, 0x2}, 0x1c) getpeername(r0, 0x0, &(0x7f0000000080)) [ 1902.953622][ T3710] usb 6-1: USB disconnect, device number 31 [ 1902.955707][ T9611] usbhid 2-1:1.0: can't add hid device: -22 [ 1902.965967][ T9611] usbhid: probe of 2-1:1.0 failed with error -22 [ 1903.077771][ T9611] usb 2-1: USB disconnect, device number 33 [ 1903.755416][ T3710] usb 6-1: new high-speed USB device number 32 using dummy_hcd [ 1904.025246][ T3710] usb 6-1: Using ep0 maxpacket: 8 [ 1904.246175][ T3710] usb 6-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 05:42:25 executing program 5: syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f0000000100)={{0x12, 0x1, 0x201, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}}}]}}]}}, &(0x7f00000002c0)={0x0, 0x0, 0x11, &(0x7f00000001c0)={0x5, 0xf, 0x11, 0x1, [@ssp_cap={0xc}]}}) 05:42:25 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)}], 0x1}, 0x0) 05:42:25 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind$inet6(r0, &(0x7f00000001c0)={0x1c, 0x1c, 0x3}, 0x1c) 05:42:25 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x1c, 0x4, 0x4, 0x600000}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:25 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x39000, 0x0) write(r3, &(0x7f0000000100), 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r4, 0x0, 0x10000, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 05:42:25 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x4, &(0x7f0000000080), 0x4) [ 1904.407628][ T3710] usb 6-1: string descriptor 0 read error: -71 [ 1904.413945][ T3710] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1904.423131][ T3710] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1904.485273][ T3710] usb 6-1: can't set config #1, error -71 [ 1904.492528][ T3710] usb 6-1: USB disconnect, device number 32 05:42:25 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)}], 0x1}, 0x0) 05:42:25 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000000)=""/36, 0x24}], 0x1) 05:42:25 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000180)={0xffffffffffffff5f, 0x1c, 0x2}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=""/173, 0xad}, 0x0) 05:42:25 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x1c, 0x4, 0x4, 0x600000}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:25 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030022000505d25a80648c63940d6c24fc6004000f", 0x17}], 0x1}, 0x0) 05:42:26 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 1905.155266][ T3710] usb 6-1: new high-speed USB device number 33 using dummy_hcd [ 1905.415179][ T3710] usb 6-1: Using ep0 maxpacket: 8 [ 1905.637427][ T3710] usb 6-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 1905.836500][ T3710] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1905.845876][ T3710] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1905.853895][ T3710] usb 6-1: Product: syz [ 1905.858218][ T3710] usb 6-1: Manufacturer: syz [ 1905.862827][ T3710] usb 6-1: SerialNumber: syz [ 1905.926481][ T3710] cdc_ether: probe of 6-1:1.0 failed with error -22 [ 1906.159627][ T9438] usb 6-1: USB disconnect, device number 33 [ 1906.555655][ T54] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 05:42:27 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x26, &(0x7f0000000100), &(0x7f0000000140)=0x8) 05:42:27 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x39000, 0x0) write(r3, &(0x7f0000000100), 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r4, 0x0, 0x10000, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 05:42:27 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x1c, 0x4, 0x4, 0x600000}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:27 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030022000505d25a80648c63940d6c24fc6004000f", 0x17}], 0x1}, 0x0) 05:42:27 executing program 1: getpriority(0x0, 0x400) 05:42:27 executing program 3: shmat(0xffffffffffffffff, &(0x7f0000ffc000/0x2000)=nil, 0x0) shmat(0xffffffffffffffff, &(0x7f0000ffb000/0x2000)=nil, 0x0) 05:42:27 executing program 1: r0 = socket(0x2, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000100)='vegas\x00', 0x6) close(r0) 05:42:27 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind$inet6(r0, &(0x7f00000001c0)={0x1c, 0x1c}, 0x1c) 05:42:27 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x1c, 0x4, 0x4, 0x600000}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:27 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect(r0, &(0x7f0000000140)=@un=@file={0xa}, 0xa) 05:42:27 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030022000505d25a80648c63940d6c24fc6004000f", 0x17}], 0x1}, 0x0) 05:42:28 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0x1c, 0x1c, 0x3}, 0x1c) 05:42:28 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030022000505d25a80648c63940d6c24fc6004000f400a000a00053582c137153e", 0x23}], 0x1}, 0x0) 05:42:28 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0xa, &(0x7f0000000200), 0x98) 05:42:28 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x39000, 0x0) write(r3, &(0x7f0000000100), 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r4, 0x0, 0x10000, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 05:42:28 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x28, &(0x7f0000000280)={0x1, [0x0]}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xe, &(0x7f00000000c0), 0x8) 05:42:28 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030022000505d25a80648c63940d6c24fc6004000f400a000a00053582c137153e", 0x23}], 0x1}, 0x0) 05:42:28 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x1c, 0x4, 0x4, 0x600000}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:28 executing program 1: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 05:42:28 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000004c0)=ANY=[@ANYBLOB="c811000013003d070000000000000000ac1e0001000000000000000000000000ac1414bb00000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0xee00], 0x11c8}}, 0x0) [ 1907.825380][T24882] netlink: 4368 bytes leftover after parsing attributes in process `syz-executor.5'. 05:42:28 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/slabinfo\x00', 0x0, 0x0) preadv(r0, &(0x7f00000013c0)=[{&(0x7f0000000240)=""/4088, 0xff8}], 0x1, 0x0, 0x0) 05:42:28 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x1, &(0x7f0000000180)=0x0) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x105a00) r5 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r5, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000001c00)={0x0, [], 0xe0, "cf146a61f70946"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, 0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x1b000000, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) creat(&(0x7f0000000000)='./bus\x00', 0x0) 05:42:28 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x1c, 0x4, 0x4, 0x600000}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:28 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030022000505d25a80648c63940d6c24fc6004000f400a000a00053582c137153e", 0x23}], 0x1}, 0x0) 05:42:29 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030022000505d25a80648c63940d6c24fc6004000f400a000a00053582c137153e370248038047", 0x29}], 0x1}, 0x0) [ 1908.175649][ T26] audit: type=1800 audit(1634881349.154:3427): pid=24895 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=14595 res=0 errno=0 [ 1908.278384][ T26] audit: type=1800 audit(1634881349.174:3428): pid=24895 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=14595 res=0 errno=0 [ 1908.288952][ C1] sd 0:0:1:0: tag#325 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1908.309388][ C1] sd 0:0:1:0: tag#325 CDB: opcode=0xe5 (vendor) [ 1908.315716][ C1] sd 0:0:1:0: tag#325 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1908.324679][ C1] sd 0:0:1:0: tag#325 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1908.333698][ C1] sd 0:0:1:0: tag#325 CDB[20]: ba 05:42:29 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) shmctl$SHM_LOCK(0x0, 0xb) 05:42:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x39000, 0x0) write(r3, &(0x7f0000000100)="b1", 0x19000) pipe(0x0) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 05:42:29 executing program 1: clone(0xb06ed00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = semget$private(0x0, 0x7, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0xb4b7, 0x800}], 0x1) rt_sigreturn() 05:42:29 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x1c, 0x4, 0x4, 0x600000}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:29 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030022000505d25a80648c63940d6c24fc6004000f400a000a00053582c137153e370248038047", 0x29}], 0x1}, 0x0) 05:42:29 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=@newpolicy={0xb8, 0x13, 0x73d, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa, 0x30}}}, 0xb8}}, 0x0) 05:42:30 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x8916, 0x0) 05:42:30 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030022000505d25a80648c63940d6c24fc6004000f400a000a00053582c137153e370248038047", 0x29}], 0x1}, 0x0) 05:42:30 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x1, &(0x7f0000000180)=0x0) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x105a00) r5 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r5, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000001c00)={0x0, [], 0xe0, "cf146a61f70946"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, 0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x1b000000, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) creat(&(0x7f0000000000)='./bus\x00', 0x0) 05:42:30 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000040)={0x50, 0x2, 0x2, 0x5, 0x0, 0x0, {0xa}, [@CTA_EXPECT_TUPLE={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x4}}]}]}, 0x50}}, 0x0) 05:42:30 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x1c, 0x4, 0x4, 0x600000}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:30 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030022000505d25a80648c63940d6c24fc6004000f400a000a00053582c137153e370248038047000000", 0x2c}], 0x1}, 0x0) [ 1909.286120][T24930] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 05:42:30 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x1, &(0x7f0000000180)=0x0) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x105a00) r5 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r5, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000001c00)={0x0, [], 0xe0, "cf146a61f70946"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, 0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x1b000000, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) creat(&(0x7f0000000000)='./bus\x00', 0x0) [ 1909.387061][ T26] audit: type=1800 audit(1634881350.364:3429): pid=24934 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=14004 res=0 errno=0 [ 1909.529597][ C0] sd 0:0:1:0: tag#380 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1909.539491][ C0] sd 0:0:1:0: tag#380 CDB: opcode=0xe5 (vendor) [ 1909.545861][ C0] sd 0:0:1:0: tag#380 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1909.554927][ C0] sd 0:0:1:0: tag#380 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1909.563902][ C0] sd 0:0:1:0: tag#380 CDB[20]: ba [ 1909.575618][ T26] audit: type=1800 audit(1634881350.434:3430): pid=24934 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=14004 res=0 errno=0 [ 1909.734139][ T26] audit: type=1800 audit(1634881350.694:3431): pid=24941 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=14450 res=0 errno=0 05:42:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x39000, 0x0) write(r3, &(0x7f0000000100)="b1", 0x19000) pipe(0x0) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 05:42:30 executing program 1: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x1, &(0x7f0000000180)=0x0) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x105a00) r5 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r5, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000001c00)={0x0, [], 0xe0, "cf146a61f70946"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, 0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x1b000000, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) creat(&(0x7f0000000000)='./bus\x00', 0x0) 05:42:30 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x1c, 0x4, 0x4, 0x600000}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:30 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030022000505d25a80648c63940d6c24fc6004000f400a000a00053582c137153e370248038047000000", 0x2c}], 0x1}, 0x0) [ 1909.887846][ C1] sd 0:0:1:0: tag#338 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1909.895125][ T26] audit: type=1800 audit(1634881350.734:3432): pid=24941 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=14450 res=0 errno=0 [ 1909.897687][ C1] sd 0:0:1:0: tag#338 CDB: opcode=0xe5 (vendor) [ 1909.924985][ C1] sd 0:0:1:0: tag#338 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 05:42:30 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x1, &(0x7f0000000180)=0x0) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x105a00) r5 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r5, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000001c00)={0x0, [], 0xe0, "cf146a61f70946"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, 0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x1b000000, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) creat(&(0x7f0000000000)='./bus\x00', 0x0) [ 1909.933968][ C1] sd 0:0:1:0: tag#338 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1909.942973][ C1] sd 0:0:1:0: tag#338 CDB[20]: ba 05:42:31 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030022000505d25a80648c63940d6c24fc6004000f400a000a00053582c137153e370248038047000000", 0x2c}], 0x1}, 0x0) [ 1910.136534][ C1] sd 0:0:1:0: tag#366 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1910.146359][ C1] sd 0:0:1:0: tag#366 CDB: opcode=0xe5 (vendor) [ 1910.152629][ C1] sd 0:0:1:0: tag#366 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1910.161668][ C1] sd 0:0:1:0: tag#366 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1910.170679][ C1] sd 0:0:1:0: tag#366 CDB[20]: ba [ 1910.193652][ T26] audit: type=1800 audit(1634881351.024:3433): pid=24949 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=14595 res=0 errno=0 [ 1910.215302][ T26] audit: type=1800 audit(1634881351.044:3434): pid=24949 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=14595 res=0 errno=0 05:42:31 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x1c, 0x4, 0x4, 0x600000}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:31 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x1, &(0x7f0000000180)=0x0) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x105a00) r5 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r5, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000001c00)={0x0, [], 0xe0, "cf146a61f70946"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, 0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x1b000000, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) creat(&(0x7f0000000000)='./bus\x00', 0x0) [ 1910.384131][ T26] audit: type=1800 audit(1634881351.344:3435): pid=24958 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=14033 res=0 errno=0 [ 1910.465142][ T26] audit: type=1800 audit(1634881351.384:3436): pid=24958 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=14033 res=0 errno=0 [ 1910.485326][ C0] sd 0:0:1:0: tag#361 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1910.496256][ C0] sd 0:0:1:0: tag#361 CDB: opcode=0xe5 (vendor) [ 1910.502555][ C0] sd 0:0:1:0: tag#361 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 05:42:31 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030022000505d25a80648c63940d6c24fc6004000f400a000a00053582c137153e370248038047000000d1", 0x2d}], 0x1}, 0x0) [ 1910.511595][ C0] sd 0:0:1:0: tag#361 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1910.520651][ C0] sd 0:0:1:0: tag#361 CDB[20]: ba 05:42:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) 05:42:31 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x1c, 0x4, 0x4, 0x600000}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:31 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=@newpolicy={0xb8, 0x13, 0x73d, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x30, 0x0}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) [ 1910.866117][ C0] sd 0:0:1:0: tag#368 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1910.875974][ C0] sd 0:0:1:0: tag#368 CDB: opcode=0xe5 (vendor) [ 1910.882253][ C0] sd 0:0:1:0: tag#368 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1910.891316][ C0] sd 0:0:1:0: tag#368 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1910.900329][ C0] sd 0:0:1:0: tag#368 CDB[20]: ba 05:42:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x39000, 0x0) write(r3, &(0x7f0000000100)="b1", 0x19000) pipe(0x0) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 05:42:31 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030022000505d25a80648c63940d6c24fc6004000f400a000a00053582c137153e370248038047000000d1", 0x2d}], 0x1}, 0x0) 05:42:31 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x1, &(0x7f0000000180)=0x0) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x105a00) r5 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r5, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000001c00)={0x0, [], 0xe0, "cf146a61f70946"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, 0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x1b000000, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) creat(&(0x7f0000000000)='./bus\x00', 0x0) 05:42:32 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=@newpolicy={0xb8, 0x13, 0x73d, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x30, 0x0}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 05:42:32 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={0x0}, 0x8}, 0x0) 05:42:32 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x1c, 0x4, 0x4, 0x600000}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:32 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030022000505d25a80648c63940d6c24fc6004000f400a000a00053582c137153e370248038047000000d1", 0x2d}], 0x1}, 0x0) 05:42:32 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x3, r0, 0x0, 0x0, 0x0) [ 1911.415359][ C0] sd 0:0:1:0: tag#333 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1911.425211][ C0] sd 0:0:1:0: tag#333 CDB: opcode=0xe5 (vendor) [ 1911.431480][ C0] sd 0:0:1:0: tag#333 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1911.440537][ C0] sd 0:0:1:0: tag#333 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1911.449545][ C0] sd 0:0:1:0: tag#333 CDB[20]: ba 05:42:32 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f0000000440)) 05:42:32 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002880)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) [ 1911.670207][ T5453] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 05:42:32 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x1, &(0x7f0000000180)=0x0) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x105a00) r5 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r5, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000001c00)={0x0, [], 0xe0, "cf146a61f70946"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, 0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x1b000000, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) creat(&(0x7f0000000000)='./bus\x00', 0x0) 05:42:32 executing program 1: symlinkat(&(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000002c0)='.\x00') 05:42:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x39000, 0x0) write(r2, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x10000, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 05:42:33 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$unlink(0x9, r0, 0xfffffffffffffffc) 05:42:33 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x1c, 0x4, 0x4, 0x600000}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) [ 1912.100035][ C1] sd 0:0:1:0: tag#320 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1912.109874][ C1] sd 0:0:1:0: tag#320 CDB: opcode=0xe5 (vendor) [ 1912.116234][ C1] sd 0:0:1:0: tag#320 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1912.125237][ C1] sd 0:0:1:0: tag#320 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1912.134221][ C1] sd 0:0:1:0: tag#320 CDB[20]: ba 05:42:33 executing program 2: r0 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8924, &(0x7f0000000000)={'lo\x00'}) 05:42:33 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0x400, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) [ 1912.315624][ T9754] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 05:42:33 executing program 5: lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x200030, &(0x7f0000000580)={[], [{@euid_eq={'euid', 0x3d, 0xee01}}, {@smackfshat}, {@uid_eq}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@hash}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 05:42:33 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x1c, 0x4, 0x4, 0x600000}, 0x40) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000001540)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000200)) 05:42:33 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x1, &(0x7f0000000180)=0x0) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x105a00) r5 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r5, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000001c00)={0x0, [], 0xe0, "cf146a61f70946"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, 0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x1b000000, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 05:42:33 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) 05:42:33 executing program 5: syz_mount_image$vfat(&(0x7f0000000140), 0x0, 0x0, 0x1, &(0x7f00000004c0)=[{&(0x7f00000001c0)='i', 0x1, 0xffffffffffffffff}], 0x0, &(0x7f0000000580)) [ 1912.738978][T25042] loop1: detected capacity change from 0 to 512 05:42:33 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x1c, 0x4, 0x4, 0x600000}, 0x40) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) [ 1912.833578][T25042] EXT4-fs error (device loop1): ext4_fill_super:4814: inode #2: comm syz-executor.1: iget: root inode unallocated [ 1912.861998][T25042] EXT4-fs (loop1): get root inode failed [ 1912.867930][T25042] EXT4-fs (loop1): mount failed [ 1912.892581][ C0] sd 0:0:1:0: tag#326 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1912.902417][ C0] sd 0:0:1:0: tag#326 CDB: opcode=0xe5 (vendor) [ 1912.908858][ C0] sd 0:0:1:0: tag#326 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1912.917902][ C0] sd 0:0:1:0: tag#326 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1912.926958][ C0] sd 0:0:1:0: tag#326 CDB[20]: ba [ 1913.069466][T25042] loop1: detected capacity change from 0 to 512 [ 1913.109955][T25057] loop5: detected capacity change from 0 to 16383 [ 1913.121899][T25042] EXT4-fs error (device loop1): ext4_fill_super:4814: inode #2: comm syz-executor.1: iget: root inode unallocated [ 1913.277574][T25042] EXT4-fs (loop1): get root inode failed [ 1913.283342][T25042] EXT4-fs (loop1): mount failed 05:42:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x39000, 0x0) write(r2, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x10000, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 05:42:34 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x1, &(0x7f0000000180)) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x105a00) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000001c00)={0x0, [], 0xe0, "cf146a61f70946"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, 0x0) 05:42:34 executing program 2: syz_mount_image$vfat(&(0x7f0000001d00), &(0x7f0000001d40)='./file0\x00', 0x0, 0x0, &(0x7f0000001f00), 0x0, &(0x7f0000001f80)={[], [{@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) 05:42:34 executing program 5: clone(0x22100100, 0x0, &(0x7f0000002600), 0x0, &(0x7f0000002680)='n') 05:42:34 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x1c, 0x4, 0x4, 0x600000}, 0x40) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:34 executing program 1: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) setitimer(0x2, &(0x7f0000000040)={{0x0, r0/1000+60000}, {0x0, 0x2710}}, 0x0) [ 1913.454335][ T26] kauditd_printk_skb: 8 callbacks suppressed [ 1913.454352][ T26] audit: type=1800 audit(1634881354.424:3445): pid=25068 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=14355 res=0 errno=0 [ 1913.528468][T25071] FAT-fs (loop2): Unrecognized mount option "rootcontext=user_u" or missing value [ 1913.558048][ C1] sd 0:0:1:0: tag#341 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1913.567943][ C1] sd 0:0:1:0: tag#341 CDB: opcode=0xe5 (vendor) 05:42:34 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x2, 0x0) [ 1913.574219][ C1] sd 0:0:1:0: tag#341 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1913.582656][ T26] audit: type=1800 audit(1634881354.464:3446): pid=25068 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=14355 res=0 errno=0 [ 1913.583316][ C1] sd 0:0:1:0: tag#341 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1913.613283][ C1] sd 0:0:1:0: tag#341 CDB[20]: ba [ 1913.701873][T25071] FAT-fs (loop2): Unrecognized mount option "rootcontext=user_u" or missing value 05:42:34 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:34 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000002c0)='ns/pid\x00') 05:42:34 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x1, &(0x7f0000000180)) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x105a00) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000001c00)={0x0, [], 0xe0, "cf146a61f70946"}) 05:42:34 executing program 5: syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x101080) 05:42:34 executing program 1: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0xc3528b0f34f7219a, 0x0) [ 1914.196619][ T26] audit: type=1800 audit(1634881355.174:3447): pid=25103 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=14889 res=0 errno=0 [ 1914.217947][ T26] audit: type=1800 audit(1634881355.174:3448): pid=25103 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=14889 res=0 errno=0 [ 1914.227310][ C1] sd 0:0:1:0: tag#377 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1914.248893][ C1] sd 0:0:1:0: tag#377 CDB: opcode=0xe5 (vendor) [ 1914.255225][ C1] sd 0:0:1:0: tag#377 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1914.264186][ C1] sd 0:0:1:0: tag#377 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1914.273214][ C1] sd 0:0:1:0: tag#377 CDB[20]: ba [ 1914.373684][ T1197] ieee802154 phy0 wpan0: encryption failed: -22 [ 1914.380082][ T1197] ieee802154 phy1 wpan1: encryption failed: -22 05:42:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x39000, 0x0) write(r2, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x10000, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 05:42:35 executing program 2: capget(&(0x7f0000000140)={0x20071026}, &(0x7f0000000180)) 05:42:35 executing program 5: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000002180)={0x1, "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"}, 0xfd1, 0x0) 05:42:35 executing program 1: r0 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/23) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000100)=""/65) 05:42:35 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:35 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x1, &(0x7f0000000180)) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x105a00) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) 05:42:35 executing program 2: r0 = eventfd2(0x2, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffffe, 0x8) read$eventfd(r0, &(0x7f0000000040), 0x8) [ 1914.697626][ T26] audit: type=1800 audit(1634881355.674:3449): pid=25124 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=14891 res=0 errno=0 [ 1914.719050][ T26] audit: type=1800 audit(1634881355.674:3450): pid=25124 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=14891 res=0 errno=0 [ 1914.773363][ C1] sd 0:0:1:0: tag#348 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1914.783258][ C1] sd 0:0:1:0: tag#348 CDB: opcode=0xe5 (vendor) [ 1914.789702][ C1] sd 0:0:1:0: tag#348 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1914.798721][ C1] sd 0:0:1:0: tag#348 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1914.807712][ C1] sd 0:0:1:0: tag#348 CDB[20]: ba 05:42:35 executing program 1: futex(0x0, 0xc, 0x0, 0x0, &(0x7f0000000280), 0x0) 05:42:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:36 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x1, &(0x7f0000000180)) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x105a00) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) 05:42:36 executing program 1: syz_emit_ethernet(0x1a, &(0x7f0000000000)={@dev, @broadcast, @val={@void, {0x8100, 0x0, 0x1}}, {@mpls_uc={0x8847, {[], @generic="8ac53ef5d9c4930e"}}}}, 0x0) 05:42:36 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) accept(r0, 0x0, 0x0) [ 1915.207306][ T26] audit: type=1800 audit(1634881356.184:3451): pid=25137 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=14891 res=0 errno=0 [ 1915.329538][ T26] audit: type=1800 audit(1634881356.204:3452): pid=25137 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=14891 res=0 errno=0 05:42:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x39000, 0x0) write(r3, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 05:42:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 05:42:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:36 executing program 2: timer_create(0x2c0dc31fa2c5371b, 0x0, &(0x7f00000011c0)) 05:42:36 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x1, &(0x7f0000000180)) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x105a00) 05:42:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000140)=0x3, 0x4) [ 1915.885490][ T26] audit: type=1800 audit(1634881356.864:3453): pid=25158 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=14892 res=0 errno=0 05:42:36 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x28, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) 05:42:37 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x81) 05:42:37 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000780), 0x32042, 0x0) 05:42:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:37 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x1, &(0x7f0000000180)) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x105a00) 05:42:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='cubic\x00', 0x6) [ 1916.425072][ T26] audit: type=1800 audit(1634881357.404:3454): pid=25177 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=14433 res=0 errno=0 05:42:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x39000, 0x0) write(r3, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 05:42:37 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/consoles\x00', 0x0, 0x0) read$eventfd(r0, 0x0, 0x0) 05:42:37 executing program 5: sched_rr_get_interval(0x0, &(0x7f0000000180)) 05:42:37 executing program 1: futex(0x0, 0x10b, 0x0, 0x0, &(0x7f00000000c0), 0x0) 05:42:37 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x1, &(0x7f0000000180)) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x105a00) 05:42:37 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:38 executing program 5: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) 05:42:38 executing program 1: pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) 05:42:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000600)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x4}]}, 0x24}}, 0x0) 05:42:38 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:38 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x1, &(0x7f0000000180)) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x105a00) 05:42:38 executing program 1: sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0xce6e1dcbfb5ca014) [ 1917.435001][ T8901] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 05:42:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x39000, 0x0) write(r3, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 05:42:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000600)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x4}]}, 0x24}}, 0x0) 05:42:38 executing program 5: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x0, 0x0, &(0x7f0000000040)={0x1}, 0x0, &(0x7f0000000100)={0x0, r0+10000000}, 0x0) 05:42:38 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x1, &(0x7f0000000180)) creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x105a00) 05:42:38 executing program 1: futex(&(0x7f0000000040), 0x10b, 0x0, &(0x7f0000000080)={0x0, 0x3938700}, &(0x7f00000000c0), 0x0) 05:42:38 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) [ 1918.074669][ T5453] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 05:42:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000600)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x4}]}, 0x24}}, 0x0) 05:42:39 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000280)={'erspan0\x00', 0x0}) 05:42:39 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:39 executing program 1: futex(&(0x7f0000000040), 0x10b, 0x0, &(0x7f0000000080)={0x0, 0x3938700}, &(0x7f00000000c0), 0x0) 05:42:39 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x1, &(0x7f0000000180)) creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x105a00) 05:42:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000600)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x4}]}, 0x24}}, 0x0) [ 1918.694654][ T26] kauditd_printk_skb: 7 callbacks suppressed [ 1918.694672][ T26] audit: type=1800 audit(1634881359.664:3462): pid=25245 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=14906 res=0 errno=0 [ 1918.777292][ T26] audit: type=1800 audit(1634881359.704:3463): pid=25245 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=14906 res=0 errno=0 05:42:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x39000, 0x0) write(r3, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r4, 0x0, 0x0, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 05:42:40 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x402) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x0) 05:42:40 executing program 1: futex(&(0x7f0000000040), 0x10b, 0x0, &(0x7f0000000080)={0x0, 0x3938700}, &(0x7f00000000c0), 0x0) 05:42:40 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:40 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x800) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f0000000100)) 05:42:40 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x1, &(0x7f0000000180)) creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x105a00) 05:42:40 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/uts\x00') [ 1919.144638][ T26] audit: type=1800 audit(1634881360.114:3464): pid=25257 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15201 res=0 errno=0 [ 1919.166128][ T26] audit: type=1800 audit(1634881360.124:3465): pid=25257 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15201 res=0 errno=0 05:42:40 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x1, &(0x7f0000000180)) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x105a00) 05:42:40 executing program 2: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0xfffffffffffffe2e) 05:42:40 executing program 1: futex(&(0x7f0000000040), 0x10b, 0x0, &(0x7f0000000080)={0x0, 0x3938700}, &(0x7f00000000c0), 0x0) 05:42:40 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:40 executing program 5: ioprio_get$uid(0x3, 0xee00) [ 1919.636887][ T26] audit: type=1800 audit(1634881360.614:3466): pid=25279 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15249 res=0 errno=0 05:42:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x39000, 0x0) write(r3, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r4, 0x0, 0x0, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 05:42:41 executing program 2: io_setup(0x0, &(0x7f0000000880)) 05:42:41 executing program 5: ioprio_get$uid(0x3, 0xee00) 05:42:41 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x8922, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @broadcast}, @empty}}) 05:42:41 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x1, &(0x7f0000000180)) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x105a00) 05:42:41 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) [ 1920.346609][T25298] ip6tnl0: mtu greater than device maximum 05:42:41 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x9, 0x3, 0x2b0, 0x0, 0xffffffff, 0xffffffff, 0x140, 0xffffffff, 0x218, 0xffffffff, 0xffffffff, 0x218, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0xf8, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'vcan0\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}, @common=@ah={{0x30}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x310) 05:42:41 executing program 5: ioprio_get$uid(0x3, 0xee00) 05:42:41 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x8935, &(0x7f0000000240)={0x0, {0x2, 0x0, @local}, {0x2, 0x0, @multicast2}, {0x2, 0x0, @empty}}) 05:42:41 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:41 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x1, &(0x7f0000000180)) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1000f4) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x105a00) [ 1920.541061][T25304] x_tables: duplicate underflow at hook 3 05:42:41 executing program 2: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000500)=""/248, 0xf8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x5}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc058534b, &(0x7f0000000300)) tkill(r0, 0x7) 05:42:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x39000, 0x0) write(r3, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r4, 0x0, 0x0, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 05:42:42 executing program 5: ioprio_get$uid(0x3, 0xee00) 05:42:42 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:42 executing program 1: io_setup(0x7fff, &(0x7f0000000200)=0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) io_submit(r0, 0x2, &(0x7f0000000600)=[&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x100}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 05:42:42 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1000f4) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x105a00) 05:42:42 executing program 2: syz_emit_ethernet(0x2ae, &(0x7f0000000200)={@broadcast, @random="f1c4a792f326", @val, {@ipv6}}, 0x0) 05:42:42 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x1269, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "2ef102148ede04db9c95c9e75753ca73d9f3d6e7955ce75afaf2ae715f83a644a4ab9e483a751616b96a93d515ee9ec606eeced9115bd18035f1bd203632e5e3", "2eea15c5dfadb3a65bc3dca431a6636d5984ef2823123a0444959eb42a404513dd7db5a58760523e02c6a49818fef2ff309dfe8b75a2c00c22c182f89e5e3e00", "c4f720d9591405518bce0e4aca18f8cfc422b82360f53223ca4496e20028c4bc"}) 05:42:42 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fcntl$getflags(r0, 0x401) 05:42:42 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:42 executing program 2: set_mempolicy(0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='cgroup\x00') pread64(r0, &(0x7f0000001240)=""/102400, 0x200000, 0x0) 05:42:42 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1000f4) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x105a00) 05:42:42 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000000000000000004dd6000000000a20000000000a010000000000000000000000001e0900010073797a300000000070000000120a0100001f34e47f5d4b0000000000040004800900020073797a30002e37000900010073797a3000000000080003400000000022000200b717fa41a1c9efdf68017165e8b182d9b7", @ANYRES64], 0xb8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 1921.890660][T25360] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1922.030890][T25360] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1922.068803][T25364] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 05:42:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x39000, 0x0) write(r2, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x10000, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 05:42:43 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xf, 0x1, &(0x7f0000000000)=@raw=[@jmp], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:42:43 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:43 executing program 2: set_mempolicy(0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='cgroup\x00') pread64(r0, &(0x7f0000001240)=""/102400, 0x200000, 0x0) 05:42:43 executing program 3: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1000f4) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x105a00) 05:42:43 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000000000000000004dd6000000000a20000000000a010000000000000000000000001e0900010073797a300000000070000000120a0100001f34e47f5d4b0000000000040004800900020073797a30002e37000900010073797a3000000000080003400000000022000200b717fa41a1c9efdf68017165e8b182d9b7", @ANYRES64], 0xb8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 05:42:43 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:43 executing program 2: set_mempolicy(0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='cgroup\x00') pread64(r0, &(0x7f0000001240)=""/102400, 0x200000, 0x0) [ 1922.590340][T25384] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 05:42:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0x31, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 05:42:43 executing program 3: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x105a00) [ 1922.718976][T25384] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 05:42:43 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000000000000000004dd6000000000a20000000000a010000000000000000000000001e0900010073797a300000000070000000120a0100001f34e47f5d4b0000000000040004800900020073797a30002e37000900010073797a3000000000080003400000000022000200b717fa41a1c9efdf68017165e8b182d9b7", @ANYRES64], 0xb8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 05:42:43 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) [ 1923.020062][T25401] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1923.109419][T25401] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1923.185791][ T5453] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 05:42:44 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x39000, 0x0) write(r2, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x10000, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 05:42:44 executing program 2: set_mempolicy(0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='cgroup\x00') pread64(r0, &(0x7f0000001240)=""/102400, 0x200000, 0x0) 05:42:44 executing program 5: geteuid() mknod$loop(&(0x7f0000003a00)='./file2\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000004dc0)='./file2\x00', &(0x7f0000004e00)='system.posix_acl_access\x00', &(0x7f000000fbc0)={{}, {}, [{}, {}, {}, {}], {}, [{0x8, 0x1}, {0x8, 0x7}, {0x8, 0x3}, {}, {0x8, 0x1}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x0) 05:42:44 executing program 3: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x105a00) 05:42:44 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000000000000000004dd6000000000a20000000000a010000000000000000000000001e0900010073797a300000000070000000120a0100001f34e47f5d4b0000000000040004800900020073797a30002e37000900010073797a3000000000080003400000000022000200b717fa41a1c9efdf68017165e8b182d9b7", @ANYRES64], 0xb8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 05:42:44 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:44 executing program 3: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x105a00) [ 1923.616521][T25423] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 05:42:44 executing program 2: set_mempolicy(0x1, 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000001240)=""/102400, 0x200000, 0x0) 05:42:44 executing program 5: syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)) [ 1923.790391][T25423] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1923.824881][ T9754] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 05:42:44 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:44 executing program 3: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x105a00) 05:42:44 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000000000000000004dd6000000000a20000000000a010000000000000000000000001e0900010073797a300000000070000000120a0100001f34e47f5d4b0000000000040004800900020073797a30002e37000900010073797a3000000000080003400000000022000200b717fa41a1c9efdf68017165e8b182d9b7", @ANYRES64], 0xb8}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 05:42:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x39000, 0x0) write(r2, &(0x7f0000000100)="b1", 0x19000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x10000, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 05:42:45 executing program 3: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) 05:42:45 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000000000000000004dd6000000000a20000000000a010000000000000000000000001e0900010073797a300000000070000000120a0100001f34e47f5d4b0000000000040004800900020073797a30002e37000900010073797a3000000000080003400000000022000200b717fa41a1c9efdf68017165e8b182d9b7", @ANYRES64], 0xb8}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 05:42:45 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg(r0, &(0x7f0000003880)={0x0, 0x0, &(0x7f0000003800)=[{&(0x7f0000002500)="637fe26476091e30a43bcdb5d7519b4cb058c085e720c037538c563879ef6465be8e3f7b5b747506f0312f7385fdb2e695ca8c338367189b001845054a25e92bf8d1f9ff6509824e80ddda9b45dd3f4cfb4c7b59d2ae5ad41b303fbefd5013c89ab1bcd235f0b5e5f376db2b4409d92e5b800c2e6bde0d3032e2002d8ad1884789101377505e918c1d461804907376a10f32b3d4437fcfa2860754a7fcf22bf0d9f074be7e3638a0c343097a7fefc13b1433dfcfd170886de62101f482ede1a1796f9e70a057304e30c5a92ba71d5bd1172ede0a9476cfac0e670f8624fdc70bbdc281afd64dd1ad70a25b", 0xeb}, {&(0x7f0000002600)="1c9cdcefd8eaa2c4fc377c59161339131cc33227dbf005adb24e5e53fe062e78c38f57091863bf81e66bce9558316ef9061424e73a8469230a9441ef74b295676d03062d75edc80a38b0ce3984696c753c9864db0ccae9337fdcf4f507b300dd9ca9098cb7c22ec01f7ad8278abbd5", 0x6f}, {&(0x7f0000002680)="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", 0xd67}], 0x3}, 0x0) 05:42:45 executing program 2: set_mempolicy(0x1, 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000001240)=""/102400, 0x200000, 0x0) 05:42:45 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:45 executing program 3: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) 05:42:45 executing program 5: set_mempolicy(0x0, &(0x7f0000000000)=0x3, 0x9) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r2}, {0x0, r2}, {r1}, {r1}, {r1, r2}, {}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {r0, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r0}, {0x0, r2}, {}, {}, {r0, r2}, {r1}, {}, {0x0, r2}, {r1, r2}, {0x0, r2}, {r0, r2}, {0x0, 0x0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {0x0, r2}, {r1}, {0x0, r2}, {}, {0x0, r2}, {0x0, r2}, {r0, r2}, {}, {}, {r0}, {}, {0x0, r2}, {}, {}, {0x0, r2}, {0x0, r2}, {0x0, r2}, {}, {0x0, r2}, {0x0, r2}, {0x0, r2}, {r1}, {r0}, {}, {r0}, {}, {}, {0x0, r2}, {}, {r1}, {r0}, {}, {}, {}, {0x0, r2}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {r0}, {0x0, r2}, {}, {r1}, {r0, r2}, {0x0, r2}, {r0}, {r1, r2}, {0x0, r2}, {0x0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {0x0, r2}, {r0, r2}, {}, {0x0, r2}, {0x0, r2}, {r1}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {r0}, {r0, r2}, {}, {}, {}, {0x0, r2}, {}, {r1}, {}, {}, {r0, r2}, {0x0, r2}, {r1, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1}, {}, {}, {r0}, {0x0, r2}, {r1}, {}, {0x0, r2}, {r1, r2}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {r1}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {0x0, r2}, {}, {r1}, {}, {}, {}, {r0}, {}, {}, {r0, r2}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {r1}, {0x0, r2}, {0x0, r2}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {r1}, {}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {0x0, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {r0}, {r1}, {r1, 0x0}, {}, {}, {}, {}, {r0}, {r1}, {}, {r0}, {}, {}, {}, {r1, r2}, {}, {}, {r1}, {r1}, {}, {}, {r1}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0, r2}, {r1, r2}, {r1, 0x0}, {r0}, {}, {}, {r1}, {r0}, {}, {}, {}, {}, {r1}, {}, {}, {r1}, {}, {}, {}, {}, {}, {0x0, r2}], 0x1, "2156816c73038c"}) r7 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r7, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x11, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c92", 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r8, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r8, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2a4581, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r4, @ANYBLOB="080000000000000007001972039c6f6cca394fae0000000000001f0000000000001001000100000000000004000000000000b50f0001000000000700000028f30000020000000200000005000000000000000000000000000000a64700000000000007000000000000003800000000000000000000000000000000000000000000000000000000000000008000"/160]) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x0, [{0x0, r11}, {0x0, r11}, {r10}, {}, {r10}, {}, {}, {0x0, r11}, {}, {r10}, {}, {}, {r9, r11}, {0x0, r11}, {}, {0x0, r11}, {0x0, r11}, {}, {}, {}, {0x0, r11}, {r10}, {0x0, r11}, {0x0, r11}, {r10}, {0x0, r11}, {r9}, {}, {r9}, {0x0, r11}, {}, {}, {}, {r10}, {}, {}, {r10}, {}, {r9, r11}, {}, {}, {}, {}, {0x0, r11}, {r10}, {0x0, r11}, {r10}, {0x0, r11}, {}, {r9}, {0x0, r11}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {0x0, r11}, {}, {0x0, r11}, {0x0, r11}, {}, {}, {}, {0x0, r11}, {r10}, {r9, r11}, {}, {}, {}, {}, {0x0, r11}, {}, {r10}, {r9}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {0x0, r11}, {r9}, {0x0, r11}, {0x0, r11}, {0x0, r11}, {r9, r11}, {}, {}, {0x0, r11}, {}, {r9}, {0x0, r11}, {}, {r10}, {r9, r11}, {0x0, r11}, {}, {r10, r11}, {0x0, r11}, {0x0, r11}, {0x0, r11}, {}, {0x0, r11}, {r9}, {0x0, r11}, {}, {0x0, r11}, {0x0, r11}, {}, {0x0, r3}, {r9}, {r10}, {0x0, r5}, {r9}, {}, {}, {}, {r9}, {r9, r11}, {}, {}, {}, {0x0, r11}, {0x0, r11}, {0x0, r11}, {}, {}, {r9, r11}, {}, {r10, r11}, {r9, r11}, {r10, r11}, {}, {}, {}, {}, {}, {0x0, r11}, {r9}, {0x0, r11}, {0x0, r6}, {}, {0x0, r11}, {r10}, {0x0, r11}, {}, {}, {0x0, r11}, {r10}, {0x0, r11}, {r10}, {}, {}, {}, {}, {0x0, r11}, {}, {r10}, {}, {}, {}, {r10}, {0x0, r11}, {}, {}, {}, {}, {0x0, r11}, {r9, r11}, {r10}, {0x0, r11}, {r9}, {}, {r9}, {0x0, r11}, {r10}, {0x0, r11}, {r9}, {0x0, r11}, {0x0, r11}, {}, {}, {}, {r10}, {r9}, {}, {}, {r9}, {}, {0x0, r11}, {0x0, r11}, {r10, r11}, {0x0, r11}, {}, {r10, r11}, {r9, r11}, {r10}, {r10, r11}, {}, {r12}, {r9}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {0x0, r11}, {r10}, {0x0, r11}, {}, {r10}, {r10}, {}, {}, {}, {0x0, r11}, {0x0, r11}, {0x0, r11}, {r9}, {}, {}, {}, {}, {r10}, {r9}, {0x0, r11}, {r9}, {r10, r11}, {0x0, r11}, {r10, r11}, {r10}, {}, {}, {}, {r10}, {r9}, {0x0, r11}, {}, {0x0, r11}, {r10}, {}, {r9}, {0x0, r11}, {r10, r11}, {r10}, {}, {}, {}, {}, {0x0, r11}], 0x0, "2156816c73038c"}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0xa001071c, 0x4ca31, 0xffffffffffffffff, 0x0) r13 = epoll_create1(0x0) r14 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r13, 0x1, r14, &(0x7f0000000040)={0xe0000019}) epoll_ctl$EPOLL_CTL_MOD(r13, 0x3, r14, &(0x7f0000000080)) epoll_wait(r13, &(0x7f0000000000)=[{}], 0x1, 0x0) 05:42:45 executing program 2: set_mempolicy(0x1, 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000001240)=""/102400, 0x200000, 0x0) 05:42:45 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000000000000000004dd6000000000a20000000000a010000000000000000000000001e0900010073797a300000000070000000120a0100001f34e47f5d4b0000000000040004800900020073797a30002e37000900010073797a3000000000080003400000000022000200b717fa41a1c9efdf68017165e8b182d9b7", @ANYRES64], 0xb8}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 05:42:45 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:45 executing program 3: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) 05:42:46 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='cgroup\x00') pread64(r0, &(0x7f0000001240)=""/102400, 0x200000, 0x0) 05:42:46 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 05:42:46 executing program 4: openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) 05:42:47 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0'}, 0xb) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) mount$9p_xen(0x0, &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0) 05:42:47 executing program 2: r0 = syz_open_procfs(0x0, 0x0) pread64(r0, &(0x7f0000001240)=""/102400, 0x200000, 0x0) 05:42:47 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:47 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 05:42:47 executing program 5: set_mempolicy(0x0, &(0x7f0000000000)=0x3, 0x9) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r2}, {0x0, r2}, {r1}, {r1}, {r1, r2}, {}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {r0, r2}, {0x0, r2}, {}, {r1, r2}, {0x0, r2}, {}, {}, {}, {0x0, r2}, {r1}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {}, {r0}, {0x0, r2}, {}, {}, {r0, r2}, {r1}, {}, {0x0, r2}, {r1, r2}, {0x0, r2}, {r0, r2}, {0x0, 0x0}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {0x0, r2}, {r1}, {0x0, r2}, {}, {0x0, r2}, {0x0, r2}, {r0, r2}, {}, {}, {r0}, {}, {0x0, r2}, {}, {}, {0x0, r2}, {0x0, r2}, {0x0, r2}, {}, {0x0, r2}, {0x0, r2}, {0x0, r2}, {r1}, {r0}, {}, {r0}, {}, {}, {0x0, r2}, {}, {r1}, {r0}, {}, {}, {}, {0x0, r2}, {r1}, {}, {}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {}, {r0}, {0x0, r2}, {}, {r1}, {r0, r2}, {0x0, r2}, {r0}, {r1, r2}, {0x0, r2}, {0x0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {0x0, r2}, {r0, r2}, {}, {0x0, r2}, {0x0, r2}, {r1}, {}, {0x0, r2}, {r0}, {0x0, r2}, {}, {r0}, {r0, r2}, {}, {}, {}, {0x0, r2}, {}, {r1}, {}, {}, {r0, r2}, {0x0, r2}, {r1, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r1, r2}, {r1}, {}, {}, {r0}, {0x0, r2}, {r1}, {}, {0x0, r2}, {r1, r2}, {0x0, r2}, {}, {}, {0x0, r2}, {r1}, {}, {r1}, {}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {0x0, r2}, {}, {r1}, {}, {}, {}, {r0}, {}, {}, {r0, r2}, {}, {0x0, r2}, {r0}, {}, {}, {0x0, r2}, {r1}, {0x0, r2}, {0x0, r2}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {r1}, {}, {}, {}, {}, {0x0, r2}, {0x0, r2}, {0x0, r2}, {r1, r2}, {0x0, r2}, {}, {r1, r2}, {r0}, {r1}, {r1, 0x0}, {}, {}, {}, {}, {r0}, {r1}, {}, {r0}, {}, {}, {}, {r1, r2}, {}, {}, {r1}, {r1}, {}, {}, {r1}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {r1, r2}, {r0, r2}, {r1, r2}, {r1, 0x0}, {r0}, {}, {}, {r1}, {r0}, {}, {}, {}, {}, {r1}, {}, {}, {r1}, {}, {}, {}, {}, {}, {0x0, r2}], 0x1, "2156816c73038c"}) r7 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r7, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x11, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c92", 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r8, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r8, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2a4581, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r4, @ANYBLOB="080000000000000007001972039c6f6cca394fae0000000000001f0000000000001001000100000000000004000000000000b50f0001000000000700000028f30000020000000200000005000000000000000000000000000000a64700000000000007000000000000003800000000000000000000000000000000000000000000000000000000000000008000"/160]) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x0, [{0x0, r11}, {0x0, r11}, {r10}, {}, {r10}, {}, {}, {0x0, r11}, {}, {r10}, {}, {}, {r9, r11}, {0x0, r11}, {}, {0x0, r11}, {0x0, r11}, {}, {}, {}, {0x0, r11}, {r10}, {0x0, r11}, {0x0, r11}, {r10}, {0x0, r11}, {r9}, {}, {r9}, {0x0, r11}, {}, {}, {}, {r10}, {}, {}, {r10}, {}, {r9, r11}, {}, {}, {}, {}, {0x0, r11}, {r10}, {0x0, r11}, {r10}, {0x0, r11}, {}, {r9}, {0x0, r11}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {0x0, r11}, {}, {0x0, r11}, {0x0, r11}, {}, {}, {}, {0x0, r11}, {r10}, {r9, r11}, {}, {}, {}, {}, {0x0, r11}, {}, {r10}, {r9}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {0x0, r11}, {r9}, {0x0, r11}, {0x0, r11}, {0x0, r11}, {r9, r11}, {}, {}, {0x0, r11}, {}, {r9}, {0x0, r11}, {}, {r10}, {r9, r11}, {0x0, r11}, {}, {r10, r11}, {0x0, r11}, {0x0, r11}, {0x0, r11}, {}, {0x0, r11}, {r9}, {0x0, r11}, {}, {0x0, r11}, {0x0, r11}, {}, {0x0, r3}, {r9}, {r10}, {0x0, r5}, {r9}, {}, {}, {}, {r9}, {r9, r11}, {}, {}, {}, {0x0, r11}, {0x0, r11}, {0x0, r11}, {}, {}, {r9, r11}, {}, {r10, r11}, {r9, r11}, {r10, r11}, {}, {}, {}, {}, {}, {0x0, r11}, {r9}, {0x0, r11}, {0x0, r6}, {}, {0x0, r11}, {r10}, {0x0, r11}, {}, {}, {0x0, r11}, {r10}, {0x0, r11}, {r10}, {}, {}, {}, {}, {0x0, r11}, {}, {r10}, {}, {}, {}, {r10}, {0x0, r11}, {}, {}, {}, {}, {0x0, r11}, {r9, r11}, {r10}, {0x0, r11}, {r9}, {}, {r9}, {0x0, r11}, {r10}, {0x0, r11}, {r9}, {0x0, r11}, {0x0, r11}, {}, {}, {}, {r10}, {r9}, {}, {}, {r9}, {}, {0x0, r11}, {0x0, r11}, {r10, r11}, {0x0, r11}, {}, {r10, r11}, {r9, r11}, {r10}, {r10, r11}, {}, {r12}, {r9}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {0x0, r11}, {r10}, {0x0, r11}, {}, {r10}, {r10}, {}, {}, {}, {0x0, r11}, {0x0, r11}, {0x0, r11}, {r9}, {}, {}, {}, {}, {r10}, {r9}, {0x0, r11}, {r9}, {r10, r11}, {0x0, r11}, {r10, r11}, {r10}, {}, {}, {}, {r10}, {r9}, {0x0, r11}, {}, {0x0, r11}, {r10}, {}, {r9}, {0x0, r11}, {r10, r11}, {r10}, {}, {}, {}, {}, {0x0, r11}], 0x0, "2156816c73038c"}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0xa001071c, 0x4ca31, 0xffffffffffffffff, 0x0) r13 = epoll_create1(0x0) r14 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r13, 0x1, r14, &(0x7f0000000040)={0xe0000019}) epoll_ctl$EPOLL_CTL_MOD(r13, 0x3, r14, &(0x7f0000000080)) epoll_wait(r13, &(0x7f0000000000)=[{}], 0x1, 0x0) 05:42:47 executing program 3: mknod$loop(&(0x7f0000003a00)='./file2\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000004dc0)='./file2\x00', &(0x7f0000004e00)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 05:42:47 executing program 2: r0 = syz_open_procfs(0x0, 0x0) pread64(r0, &(0x7f0000001240)=""/102400, 0x200000, 0x0) 05:42:47 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0'}, 0xb) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) mount$9p_xen(0x0, &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0) 05:42:47 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 05:42:47 executing program 2: r0 = syz_open_procfs(0x0, 0x0) pread64(r0, &(0x7f0000001240)=""/102400, 0x200000, 0x0) 05:42:47 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:48 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0'}, 0xb) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) mount$9p_xen(0x0, &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0) 05:42:48 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0'}, 0xb) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) mount$9p_xen(0x0, &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0) 05:42:48 executing program 2: syz_open_procfs(0x0, &(0x7f0000000040)='cgroup\x00') pread64(0xffffffffffffffff, &(0x7f0000001240)=""/102400, 0x200000, 0x0) 05:42:48 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 1927.665554][ T5] kworker/dying (5) used greatest stack depth: 21632 bytes left 05:42:48 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0'}, 0xb) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) mount$9p_xen(0x0, &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0) 05:42:48 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0'}, 0xb) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) mount$9p_xen(0x0, &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0) 05:42:48 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:48 executing program 2: syz_open_procfs(0x0, &(0x7f0000000040)='cgroup\x00') pread64(0xffffffffffffffff, &(0x7f0000001240)=""/102400, 0x200000, 0x0) 05:42:48 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 05:42:49 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0'}, 0xb) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) mount$9p_xen(0x0, &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0) 05:42:49 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 05:42:49 executing program 2: syz_open_procfs(0x0, &(0x7f0000000040)='cgroup\x00') pread64(0xffffffffffffffff, &(0x7f0000001240)=""/102400, 0x200000, 0x0) 05:42:49 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0'}, 0xb) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) mount$9p_xen(0x0, &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0) 05:42:49 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0'}, 0xb) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) mount$9p_xen(0x0, &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0) 05:42:49 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:49 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0'}, 0xb) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) mount$9p_xen(0x0, &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0) 05:42:49 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 05:42:49 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='cgroup\x00') pread64(r0, 0x0, 0x0, 0x0) 05:42:49 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0'}, 0xb) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) 05:42:49 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 05:42:49 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0'}, 0xb) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) 05:42:49 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0'}, 0xb) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) 05:42:49 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='cgroup\x00') pread64(r0, 0x0, 0x0, 0x0) 05:42:49 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 05:42:49 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) [ 1928.945085][ T5453] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 05:42:50 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) 05:42:50 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='cgroup\x00') pread64(r0, 0x0, 0x0, 0x0) 05:42:50 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={0x0, 0xb8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 05:42:50 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0'}, 0xb) 05:42:50 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0'}, 0xb) 05:42:50 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:50 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) 05:42:50 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={0x0, 0xb8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 05:42:50 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x9, 0x0, "b0477ec6ce1bce00"}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)=0x47) 05:42:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000140), 0x0, 0x0, 0x1, &(0x7f00000004c0)=[{&(0x7f00000001c0)='i', 0x1}], 0x0, &(0x7f0000000580)={[{@shortname_winnt}], [{@appraise}]}) 05:42:50 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={0x0, 0xb8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 05:42:50 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) 05:42:50 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:51 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000000000000000004dd6000000000a20000000000a010000000000000000000000001e0900010073797a300000000070000000120a0100001f34e47f5d4b0000000000040004800900020073797a30002e37000900010073797a3000000000080003400000000022000200b717fa41a1c9efdf68017165e8b182d9b7"], 0xb8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 05:42:51 executing program 2: socketpair(0x5, 0x0, 0x0, &(0x7f0000004e40)) [ 1930.246388][T25651] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 05:42:51 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) 05:42:51 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0'}, 0xb) 05:42:51 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) [ 1930.382512][T25651] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 05:42:51 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:51 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000001d40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(&(0x7f00000036c0)='./file0\x00', &(0x7f0000003700)='./file0\x00', &(0x7f0000003740), 0x0, 0x0) 05:42:51 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000000000000000004dd6000000000a20000000000a010000000000000000000000001e0900010073797a300000000070000000120a0100001f34e47f5d4b0000000000040004800900020073797a30002e37000900010073797a3000000000080003400000000022000200b717fa41a1c9efdf68017165e8b182d9b7"], 0xb8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 05:42:51 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) 05:42:51 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) 05:42:51 executing program 2: openat$autofs(0xffffffffffffff9c, 0x0, 0x1210c0, 0x0) [ 1930.739060][T25670] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 05:42:51 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) [ 1930.851058][T25670] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 05:42:51 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) 05:42:52 executing program 3: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x5412, &(0x7f00000000c0)=0x13) 05:42:52 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000000000000000004dd6000000000a20000000000a010000000000000000000000001e0900010073797a300000000070000000120a0100001f34e47f5d4b0000000000040004800900020073797a30002e37000900010073797a3000000000080003400000000022000200b717fa41a1c9efdf68017165e8b182d9b7"], 0xb8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 1931.331159][T25690] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 05:42:52 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0'}, 0xb) 05:42:52 executing program 2: r0 = socket$inet(0x2, 0x3, 0x5) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00'}) 05:42:52 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) 05:42:52 executing program 3: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x5412, &(0x7f00000000c0)=0x13) 05:42:52 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) [ 1931.445091][T25690] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 05:42:52 executing program 2: clock_gettime(0x0, &(0x7f0000001300)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001340)={0x0, r0+10000000}) 05:42:52 executing program 3: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x5412, &(0x7f00000000c0)=0x13) 05:42:52 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYRES64], 0xb8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 05:42:52 executing program 4: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000180)) 05:42:52 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:52 executing program 3: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x5412, &(0x7f00000000c0)=0x13) 05:42:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x6) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000040)={0x50, 0x14, 0x1, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x39, 0x1, "4cf901c1908e81a4eb30e84c1f6adbc2d80a2d2e47a5be833797f1ffafb34ac699ad1accdf205f64bc4b1356ffbfa24883c96f6bf2"}]}, 0x50}}, 0x0) 05:42:53 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0'}, 0xb) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) 05:42:53 executing program 4: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000180)) 05:42:53 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYRES64], 0xb8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 05:42:53 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:53 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/uts\x00') 05:42:53 executing program 3: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x5412, &(0x7f00000000c0)=0x13) 05:42:53 executing program 3: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x5412, &(0x7f00000000c0)=0x13) 05:42:53 executing program 2: r0 = socket$inet(0x2, 0x3, 0x5) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000300)=@security={'security\x00', 0xe, 0x4, 0x2a4, 0xffffffff, 0x0, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x2d4, 0x2d4, 0x2d4, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x94}, @common=@inet=@TCPMSS={0x24}}, {{@ip={@rand_addr, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'vcan0\x00', 'syzkaller0\x00', {}, {}, 0x0, 0x0, 0x98}, 0x0, 0x70, 0xb0}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'caif0\x00', 'vlan1\x00'}, 0x0, 0x70, 0xcc}, @common=@CLUSTERIP={0x5c, 'CLUSTERIP\x00', 0x0, {0x0, @local}}}], {{'\x00', 0x0, 0x70, 0x94}, {0x24}}}}, 0x300) 05:42:53 executing program 4: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000180)) 05:42:53 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYRES64], 0xb8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 05:42:53 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:54 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, 0x0) [ 1933.424590][ T8901] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 05:42:54 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0'}, 0xb) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) 05:42:54 executing program 2: modify_ldt$read_default(0x2, &(0x7f0000000000)=""/48, 0x30) 05:42:54 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) 05:42:54 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES64], 0xb8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 05:42:54 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:54 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, 0x0) 05:42:54 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, 0x0) 05:42:54 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={@local}) 05:42:54 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES64], 0xb8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 05:42:54 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) 05:42:55 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) [ 1934.064112][ T9754] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 05:42:55 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES64], 0xb8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 05:42:55 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0'}, 0xb) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) 05:42:55 executing program 3: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) 05:42:55 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) 05:42:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000002c0)={'wlan1\x00'}) 05:42:55 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000000000000000004dd6000000000a20000000000a010000000000000000000000001e0900010073797a300000000070000000120a0100001f34e47f", @ANYRES64], 0xb8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 05:42:55 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) [ 1934.807315][T25803] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 05:42:55 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) 05:42:55 executing program 2: futimesat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', &(0x7f0000000080)={{0x0, 0xea60}, {0x77359400}}) 05:42:56 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000000000000000004dd6000000000a20000000000a010000000000000000000000001e0900010073797a300000000070000000120a0100001f34e47f", @ANYRES64], 0xb8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 05:42:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)={0x18, 0x14, 0x1, 0x0, 0x0, {0xa}, [@INET_DIAG_REQ_BYTECODE={0x4}]}, 0x18}}, 0x0) 05:42:56 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:56 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) [ 1935.219324][T25819] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 05:42:56 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0'}, 0xb) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) 05:42:56 executing program 2: r0 = socket$inet(0x2, 0x3, 0x5) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000080)=@mangle={'mangle\x00', 0x1f, 0x6, 0x420, 0x0, 0x38c, 0x2b0, 0x14c, 0x0, 0x38c, 0x38c, 0x38c, 0x38c, 0x38c, 0x6, 0x0, {[{{@ip={@broadcast, @dev, 0x0, 0x0, 'wg1\x00', 'batadv_slave_1\x00'}, 0x0, 0x70, 0x94}, @ECN={0x24, 'ECN\x00', 0x0, {0x0, 0x20}}}, {{@uncond, 0x0, 0x94, 0xb8, 0x0, {}, [@common=@ttl={{0x24}}]}, @TTL={0x24}}, {{@ip={@empty, @local, 0x0, 0x0, 'wg2\x00', 'macvlan1\x00'}, 0x0, 0x70, 0xa0}, @common=@inet=@SET2={0x30}}, {{@ip={@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'veth0_vlan\x00', 'netdevsim0\x00'}, 0x0, 0x94, 0xc4, 0x0, {}, [@common=@ttl={{0x24}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @empty}}}, {{@uncond, 0x0, 0xb8, 0xdc, 0x0, {}, [@inet=@rpfilter={{0x24}}, @inet=@rpfilter={{0x24}}]}, @TTL={0x24}}], {{'\x00', 0x0, 0x70, 0x94}, {0x24}}}}, 0x47c) 05:42:56 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000000000000000004dd6000000000a20000000000a010000000000000000000000001e0900010073797a300000000070000000120a0100001f34e47f", @ANYRES64], 0xb8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 05:42:56 executing program 3: r0 = fork() ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace(0x4207, r0) fork() ptrace$getregs(0xe, r0, 0x0, &(0x7f0000000080)=""/210) 05:42:56 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) 05:42:56 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) [ 1935.819796][T25837] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 05:42:56 executing program 2: r0 = socket$inet(0x2, 0x3, 0x5) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0x1e8, 0x1e8, 0xf8, 0xffffffff, 0xffffffff, 0x2c4, 0x2c4, 0x2c4, 0xffffffff, 0x4, 0x0, {[{{@ip={@rand_addr, @empty, 0x0, 0x0, 'vxcan1\x00', 'syzkaller0\x00'}, 0x0, 0xd4, 0xf8, 0x0, {}, [@common=@unspec=@physdev={{0x64}, {'veth1_macvtap\x00', {}, 'gretap0\x00', {}, 0x0, 0x6}}]}, @common=@inet=@SYNPROXY={0x24}}, {{@uncond, 0x0, 0x94, 0xf0, 0x0, {}, [@common=@ttl={{0x24}}]}, @common=@CLUSTERIP={0x5c}}, {{@ip={@broadcast, @loopback, 0x0, 0x0, 'geneve1\x00', 'batadv_slave_0\x00'}, 0x0, 0x94, 0xdc, 0x0, {}, [@common=@ttl={{0x24}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@remote, 'batadv_slave_0\x00'}}}], {{'\x00', 0x0, 0x70, 0x94}, {0x24}}}}, 0x3b4) 05:42:57 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0'}, 0xb) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) 05:42:57 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000000000000000004dd6000000000a20000000000a010000000000000000000000001e0900010073797a300000000070000000120a0100001f34e47f5d4b0000000000040004800900020073797a30002e37000900010073797a3000", @ANYRES64], 0xb8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 05:42:57 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x9, 0x3, 0x224, 0xd8, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x190, 0xffffffff, 0xffffffff, 0x190, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'syz_tun\x00'}}}], {{'\x00', 0x0, 0x70, 0x94}, {0x24}}}}, 0x280) 05:42:57 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) 05:42:57 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:57 executing program 3: r0 = fork() ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace(0x4207, r0) fork() ptrace$getregs(0xe, r0, 0x0, &(0x7f0000000080)=""/210) 05:42:57 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0'}, 0xb) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) [ 1936.437929][T25859] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.1'. 05:42:57 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) 05:42:57 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x0) 05:42:57 executing program 5: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)={'#! ', './file0'}, 0xb) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000180)) 05:42:57 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000000000000000004dd6000000000a20000000000a010000000000000000000000001e0900010073797a300000000070000000120a0100001f34e47f5d4b0000000000040004800900020073797a30002e37000900010073797a3000", @ANYRES64], 0xb8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 05:42:57 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) accept4(r0, &(0x7f0000000300)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, 0x0, 0x0) 05:42:57 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) [ 1936.864751][T25878] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.1'. 05:42:57 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) 05:42:57 executing program 5: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)={'#! ', './file0'}, 0xb) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000180)) 05:42:58 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000000000000000004dd6000000000a20000000000a010000000000000000000000001e0900010073797a300000000070000000120a0100001f34e47f5d4b0000000000040004800900020073797a30002e37000900010073797a3000", @ANYRES64], 0xb8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 05:42:58 executing program 3: r0 = fork() ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace(0x4207, r0) fork() ptrace$getregs(0xe, r0, 0x0, &(0x7f0000000080)=""/210) 05:42:58 executing program 2: socket(0x10, 0x2, 0x8) 05:42:58 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, 0x0) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) 05:42:58 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) [ 1937.296762][T25897] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.1'. 05:42:58 executing program 5: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)={'#! ', './file0'}, 0xb) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000180)) 05:42:58 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000d500000000001000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) readlink(0x0, &(0x7f00000004c0)=""/165, 0xa5) 05:42:58 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000000000000000004dd6000000000a20000000000a010000000000000000000000001e0900010073797a300000000070000000120a0100001f34e47f5d4b0000000000040004800900020073797a30002e37000900010073797a3000000000080003400000000022000200b7", @ANYRES64], 0xb8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 05:42:58 executing program 3: r0 = fork() ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace(0x4207, r0) fork() ptrace$getregs(0xe, r0, 0x0, &(0x7f0000000080)=""/210) 05:42:58 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, 0x0) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) 05:42:58 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:58 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0'}, 0xb) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) [ 1937.743103][T25915] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 05:42:58 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000d500000000001000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) readlink(0x0, &(0x7f00000004c0)=""/165, 0xa5) 05:42:58 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, 0x0) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) [ 1937.966800][T25915] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 05:42:59 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0'}, 0xb) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) 05:42:59 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f00000000c0)=0x27df, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000010da0)) r1 = socket$packet(0x11, 0x2, 0x300) dup2(r1, r0) 05:42:59 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000000000000000004dd6000000000a20000000000a010000000000000000000000001e0900010073797a300000000070000000120a0100001f34e47f5d4b0000000000040004800900020073797a30002e37000900010073797a3000000000080003400000000022000200b7", @ANYRES64], 0xb8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 05:42:59 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, 0x0, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:59 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) 05:42:59 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0'}, 0xb) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) 05:42:59 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000d500000000001000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) readlink(0x0, &(0x7f00000004c0)=""/165, 0xa5) [ 1938.385410][T25944] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1938.513841][T25944] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1938.547574][ T10] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 05:42:59 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, 0x0, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:42:59 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) 05:42:59 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000d500000000001000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) readlink(0x0, &(0x7f00000004c0)=""/165, 0xa5) 05:42:59 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0'}, 0xb) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) 05:42:59 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000000000000000004dd6000000000a20000000000a010000000000000000000000001e0900010073797a300000000070000000120a0100001f34e47f5d4b0000000000040004800900020073797a30002e37000900010073797a3000000000080003400000000022000200b7", @ANYRES64], 0xb8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 1938.924516][T25963] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 05:43:00 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0'}, 0xb) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) [ 1939.063795][T25963] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 05:43:00 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000480), r0) sendmsg$IEEE802154_SET_MACPARAMS(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, r2, 0x1}, 0x14}}, 0x0) 05:43:00 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(r0, &(0x7f0000001100)={'syz1', "8a0f92e944ed7b494bc1f2337f043e5c0d5bf4588a"}, 0x19) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000100)=0x1ff5, 0x4) recvmmsg(r0, &(0x7f00000010c0)=[{{0x0, 0x2400, 0x0, 0x0, 0x0, 0xfc00000000000000}}], 0x300, 0x0, 0x0) 05:43:00 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) 05:43:00 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, 0x0, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:43:00 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000000000000000004dd6000000000a20000000000a010000000000000000000000001e0900010073797a300000000070000000120a0100001f34e47f5d4b0000000000040004800900020073797a30002e37000900010073797a3000000000080003400000000022000200b717fa41a1c9efdf68", @ANYRES64], 0xb8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 05:43:00 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0'}, 0xb) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) 05:43:00 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0'}, 0xb) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) 05:43:00 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000180)) [ 1939.874834][ T10] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 05:43:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff004000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000440)=ANY=[@ANYBLOB="3000000024005f870b0e00000000110000000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000c000100696e6772657373"], 0x30}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=@newtfilter={0x24, 0x2a, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0x2}}}, 0x24}}, 0x0) 05:43:00 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:43:00 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000000000000000004dd6000000000a20000000000a010000000000000000000000001e0900010073797a300000000070000000120a0100001f34e47f5d4b0000000000040004800900020073797a30002e37000900010073797a3000000000080003400000000022000200b717fa41a1c9efdf68", @ANYRES64], 0xb8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 05:43:01 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000180)) 05:43:01 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff004000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000440)=ANY=[@ANYBLOB="3000000024005f870b0e00000000110000000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000c000100696e6772657373"], 0x30}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=@newtfilter={0x24, 0x2a, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0x2}}}, 0x24}}, 0x0) 05:43:01 executing program 2: syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') 05:43:01 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000180)) 05:43:01 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:43:01 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000000000000000004dd6000000000a20000000000a010000000000000000000000001e0900010073797a300000000070000000120a0100001f34e47f5d4b0000000000040004800900020073797a30002e37000900010073797a3000000000080003400000000022000200b717fa41a1c9efdf68", @ANYRES64], 0xb8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 05:43:01 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff004000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000440)=ANY=[@ANYBLOB="3000000024005f870b0e00000000110000000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000c000100696e6772657373"], 0x30}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=@newtfilter={0x24, 0x2a, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0x2}}}, 0x24}}, 0x0) 05:43:01 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0'}, 0xb) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) 05:43:01 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) ioctl$TIOCSTI(r0, 0x5412, 0x0) 05:43:01 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000600), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x28}}, 0x0) 05:43:01 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:43:01 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000000000000000004dd6000000000a20000000000a010000000000000000000000001e0900010073797a300000000070000000120a0100001f34e47f5d4b0000000000040004800900020073797a30002e37000900010073797a3000000000080003400000000022000200b717fa41a1c9efdf68017165e8", @ANYRES64], 0xb8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 05:43:01 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff004000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000440)=ANY=[@ANYBLOB="3000000024005f870b0e00000000110000000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000c000100696e6772657373"], 0x30}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=@newtfilter={0x24, 0x2a, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0x2}}}, 0x24}}, 0x0) 05:43:02 executing program 2: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r1, 0x0) setregid(r1, 0xffffffffffffffff) [ 1941.020367][T26057] __nla_validate_parse: 10 callbacks suppressed [ 1941.020389][T26057] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 05:43:02 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) ioctl$TIOCSTI(r0, 0x5412, 0x0) [ 1941.090220][T26062] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1941.187341][T26057] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 05:43:02 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, 0x0}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:43:02 executing program 3: rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000040)) 05:43:02 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) ioctl$TIOCSTI(r0, 0x5412, 0x0) 05:43:02 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000000000000000004dd6000000000a20000000000a010000000000000000000000001e0900010073797a300000000070000000120a0100001f34e47f5d4b0000000000040004800900020073797a30002e37000900010073797a3000000000080003400000000022000200b717fa41a1c9efdf68017165e8", @ANYRES64], 0xb8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 1941.555599][T26087] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1941.670120][T26087] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 05:43:02 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0'}, 0xb) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) 05:43:02 executing program 2: mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x30, 0xffffffffffffffff, 0x0) 05:43:02 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), r0) sendmsg$IEEE802154_LIST_IFACE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x621, 0x0, 0x0, {0x13}}, 0x14}}, 0x0) 05:43:02 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_DEV(r3, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000800)={0x0}}, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r0) sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(0xffffffffffffffff, 0x0, 0x20000810) sendmsg$NLBL_MGMT_C_VERSION(r1, &(0x7f0000000740)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x44, 0x0, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x15}}}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @private0}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @dev={0xac, 0x14, 0x14, 0x2c}}]}, 0x44}}, 0x4084) 05:43:02 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, 0x0}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:43:02 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000000000000000004dd6000000000a20000000000a010000000000000000000000001e0900010073797a300000000070000000120a0100001f34e47f5d4b0000000000040004800900020073797a30002e37000900010073797a3000000000080003400000000022000200b717fa41a1c9efdf68017165e8", @ANYRES64], 0xb8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 1942.009477][T26104] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 05:43:03 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000500)='./bus\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000007840), 0x24, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) chdir(&(0x7f0000000540)='./bus\x00') rename(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000440)='./file0\x00') 05:43:03 executing program 2: r0 = socket(0x10, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff004000", @ANYBLOB="01000000010000001c0012000c0001006272696467"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000440)=ANY=[@ANYBLOB="3000000024005f870b0e00000000110000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000c000100696e6772"], 0x30}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=@newtfilter={0x4c, 0x2a, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0x1}}, [@filter_kind_options=@f_bpf={{0x8}, {0x20, 0x2, [@TCA_BPF_OPS={{0x6, 0x4, 0x2}, {0x14, 0x5, [{0x45, 0x0, 0x2}, {}]}}]}}]}, 0x4c}}, 0x0) [ 1942.154306][T26104] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 05:43:03 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$uinput_user_dev(r0, 0x0, 0x0) 05:43:03 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, 0x0}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:43:03 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000000000000000004dd6000000000a20000000000a010000000000000000000000001e0900010073797a300000000070000000120a0100001f34e47f5d4b0000000000040004800900020073797a30002e37000900010073797a3000000000080003400000000022000200b717fa41a1c9efdf68017165e8b182", @ANYRES64], 0xb8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 1942.342525][T26114] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. [ 1942.380105][T26118] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1942.390918][T26118] IPv6: ADDRCONF(NETDEV_CHANGE): Y­4`Ò˜: link becomes ready 05:43:03 executing program 4: openat(0xffffffffffffff9c, 0x0, 0x1500, 0x20) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0xd8, 0x5002004a, 0x0, 0x0, 0x0, 0x1e8, 0x3c8, 0x3c8, 0x1e8, 0x3c8, 0x3, 0x0, {[{{@ip={@private, @empty, 0x0, 0x0, 'vlan0\x00', 'gretap0\x00'}, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x1, 0x0, 0x0, 0x0, 'syz1\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x110, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'vxcan1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6}}}]}, @unspec=@CT0={0x48}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x12) wait4(0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000000), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000100), &(0x7f0000000140)) [ 1942.500045][T26125] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1942.577508][T26119] overlayfs: 'file0' not a directory [ 1942.629432][T26114] overlayfs: filesystem on './bus' not supported as upperdir [ 1942.675979][T26125] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1942.723451][T26131] xt_hashlimit: overflow, try lower: 0/0 [ 1942.739883][T26132] ptrace attach of "/root/syz-executor.4 exec"[26131] was attempted by "/root/syz-executor.4 exec"[26132] [ 1942.782641][T26131] xt_hashlimit: overflow, try lower: 0/0 05:43:03 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, 0x0) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0'}, 0xb) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) 05:43:03 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}], 0x2}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:43:03 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x1, &(0x7f0000000000)=@raw=[@call], &(0x7f0000000180)='GPL\x00', 0x2, 0xe8, &(0x7f0000000280)=""/232, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:43:03 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000500)='./bus\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000007840), 0x24, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) chdir(&(0x7f0000000540)='./bus\x00') rename(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000440)='./file0\x00') 05:43:03 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000000000000000004dd6000000000a20000000000a010000000000000000000000001e0900010073797a300000000070000000120a0100001f34e47f5d4b0000000000040004800900020073797a30002e37000900010073797a3000000000080003400000000022000200b717fa41a1c9efdf68017165e8b182", @ANYRES64], 0xb8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 05:43:03 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000d500000000001000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) pread64(0xffffffffffffffff, 0x0, 0x5e, 0xffffffffffffffc0) 05:43:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff004000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000440)=ANY=[@ANYBLOB="3000000024005f870b0e00000000110000000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000c000100696e6772657373"], 0x30}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=@newtfilter={0x4c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x1}}, [@filter_kind_options=@f_bpf={{0x8}, {0x20, 0x2, [@TCA_BPF_OPS={{0x6, 0x4, 0x2}, {0x14, 0x5, [{0x4d, 0x0, 0x2}, {}]}}]}}]}, 0x4c}}, 0x0) 05:43:04 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000d500000000001000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) pread64(0xffffffffffffffff, 0x0, 0x5e, 0xffffffffffffffc0) 05:43:04 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000000000000000004dd6000000000a20000000000a010000000000000000000000001e0900010073797a300000000070000000120a0100001f34e47f5d4b0000000000040004800900020073797a30002e37000900010073797a3000000000080003400000000022000200b717fa41a1c9efdf68017165e8b182", @ANYRES64], 0xb8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 05:43:04 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}], 0x2}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) [ 1943.386228][T26150] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 05:43:04 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000d500000000001000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) pread64(0xffffffffffffffff, 0x0, 0x5e, 0xffffffffffffffc0) 05:43:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff004000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000440)=ANY=[@ANYBLOB="3000000024005f870b0e00000000110000000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000c000100696e6772657373"], 0x30}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=@newtfilter={0x4c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x1}}, [@filter_kind_options=@f_bpf={{0x8}, {0x20, 0x2, [@TCA_BPF_OPS={{0x6, 0x4, 0x2}, {0x14, 0x5, [{0x4d, 0x0, 0x2}, {}]}}]}}]}, 0x4c}}, 0x0) 05:43:05 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000000000000000004dd6000000000a20000000000a010000000000000000000000001e0900010073797a300000000070000000120a0100001f34e47f5d4b0000000000040004800900020073797a30002e37000900010073797a3000000000080003400000000022000200b717fa41a1c9efdf68017165e8b182d9", @ANYRES64], 0xb8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 05:43:05 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, 0x0) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0'}, 0xb) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) 05:43:05 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}], 0x2}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:43:05 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000500)='./bus\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000007840), 0x24, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) chdir(&(0x7f0000000540)='./bus\x00') rename(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000440)='./file0\x00') 05:43:05 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000d500000000001000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) pread64(0xffffffffffffffff, 0x0, 0x5e, 0xffffffffffffffc0) 05:43:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff004000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000440)=ANY=[@ANYBLOB="3000000024005f870b0e00000000110000000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000c000100696e6772657373"], 0x30}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=@newtfilter={0x4c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x1}}, [@filter_kind_options=@f_bpf={{0x8}, {0x20, 0x2, [@TCA_BPF_OPS={{0x6, 0x4, 0x2}, {0x14, 0x5, [{0x4d, 0x0, 0x2}, {}]}}]}}]}, 0x4c}}, 0x0) [ 1944.323769][ T8901] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 05:43:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff004000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000440)=ANY=[@ANYBLOB="3000000024005f870b0e00000000110000000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000c000100696e6772657373"], 0x30}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=@newtfilter={0x44, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x1}}, [@filter_kind_options=@f_bpf={{0x8}, {0x18, 0x2, [@TCA_BPF_OPS={{0x6, 0x4, 0x1}, {0xc, 0x6, [{}]}}]}}]}, 0x44}}, 0x0) 05:43:05 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {0x0}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:43:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff004000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000440)=ANY=[@ANYBLOB="3000000024005f870b0e00000000110000000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000c000100696e6772657373"], 0x30}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=@newtfilter={0x4c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x1}}, [@filter_kind_options=@f_bpf={{0x8}, {0x20, 0x2, [@TCA_BPF_OPS={{0x6, 0x4, 0x2}, {0x14, 0x5, [{0x4d, 0x0, 0x2}, {}]}}]}}]}, 0x4c}}, 0x0) [ 1944.499489][T26188] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 05:43:05 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000000000000000004dd6000000000a20000000000a010000000000000000000000001e0900010073797a300000000070000000120a0100001f34e47f5d4b0000000000040004800900020073797a30002e37000900010073797a3000000000080003400000000022000200b717fa41a1c9efdf68017165e8b182d9", @ANYRES64], 0xb8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 1944.663008][T26201] netlink: 'syz-executor.4': attribute type 6 has an invalid length. [ 1944.776560][T26207] netlink: 'syz-executor.4': attribute type 6 has an invalid length. 05:43:05 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000500)='./bus\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000007840), 0x24, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) chdir(&(0x7f0000000540)='./bus\x00') rename(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000440)='./file0\x00') 05:43:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff004000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000440)=ANY=[@ANYBLOB="3000000024005f870b0e00000000110000000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000c000100696e6772657373"], 0x30}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=@newtfilter={0x44, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x1}}, [@filter_kind_options=@f_bpf={{0x8}, {0x18, 0x2, [@TCA_BPF_OPS={{0x6, 0x4, 0x1}, {0xc, 0x6, [{}]}}]}}]}, 0x44}}, 0x0) 05:43:05 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {0x0}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) [ 1945.232071][T26219] netlink: 'syz-executor.4': attribute type 6 has an invalid length. 05:43:06 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, 0x0) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0'}, 0xb) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) 05:43:06 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f00000021c0)=[{{&(0x7f0000000180)=@caif=@dgm={0x25, 0x3}, 0x80, 0x0, 0x0, &(0x7f0000001800)=[{0x10}], 0x10}}], 0x1, 0x0) 05:43:06 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000000000000000004dd6000000000a20000000000a010000000000000000000000001e0900010073797a300000000070000000120a0100001f34e47f5d4b0000000000040004800900020073797a30002e37000900010073797a3000000000080003400000000022000200b717fa41a1c9efdf68017165e8b182d9", @ANYRES64], 0xb8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 05:43:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff004000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000440)=ANY=[@ANYBLOB="3000000024005f870b0e00000000110000000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000c000100696e6772657373"], 0x30}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=@newtfilter={0x44, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x1}}, [@filter_kind_options=@f_bpf={{0x8}, {0x18, 0x2, [@TCA_BPF_OPS={{0x6, 0x4, 0x1}, {0xc, 0x6, [{}]}}]}}]}, 0x44}}, 0x0) 05:43:06 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {0x0}, {0x0}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) [ 1945.365489][T26225] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. [ 1945.583197][ T4020] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 05:43:06 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, 0x0) [ 1945.642456][T26231] netlink: 'syz-executor.4': attribute type 6 has an invalid length. 05:43:06 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f00000021c0)=[{{&(0x7f0000000180)=@caif=@dgm={0x25, 0x3}, 0x80, 0x0, 0x0, &(0x7f0000001800)=[{0x10}], 0x10}}], 0x1, 0x0) 05:43:06 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {&(0x7f0000000640)}], 0x2}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:43:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff004000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000440)=ANY=[@ANYBLOB="3000000024005f870b0e00000000110000000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000c000100696e6772657373"], 0x30}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=@newtfilter={0x44, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x1}}, [@filter_kind_options=@f_bpf={{0x8}, {0x18, 0x2, [@TCA_BPF_OPS={{0x6, 0x4, 0x1}, {0xc, 0x6, [{}]}}]}}]}, 0x44}}, 0x0) 05:43:06 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000000000000000004dd6000000000a20000000000a010000000000000000000000001e0900010073797a300000000070000000120a0100001f34e47f5d4b0000000000040004800900020073797a30002e37000900010073797a3000000000080003400000000022000200b717fa41a1c9efdf68017165e8b182d9b7", @ANYRES64], 0xb8}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 05:43:06 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0), 0x200000, 0x0) 05:43:07 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000000000000000004dd6000000000a20000000000a010000000000000000000000001e0900010073797a300000000070000000120a0100001f34e47f5d4b0000000000040004800900020073797a30002e37000900010073797a3000000000080003400000000022000200b717fa41a1c9efdf68017165e8b182d9b7", @ANYRES64], 0xb8}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 1946.113709][T26253] netlink: 'syz-executor.4': attribute type 6 has an invalid length. 05:43:07 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0'}, 0xb) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) 05:43:07 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f00000021c0)=[{{&(0x7f0000000180)=@caif=@dgm={0x25, 0x3}, 0x80, 0x0, 0x0, &(0x7f0000001800)=[{0x10}], 0x10}}], 0x1, 0x0) 05:43:07 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x10008, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') creat(&(0x7f0000000040)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x4c03e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) 05:43:07 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x1}, 0x40) 05:43:07 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {&(0x7f0000000640)}], 0x2}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:43:07 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000000000000000004dd6000000000a20000000000a010000000000000000000000001e0900010073797a300000000070000000120a0100001f34e47f5d4b0000000000040004800900020073797a30002e37000900010073797a3000000000080003400000000022000200b717fa41a1c9efdf68017165e8b182d9b7", @ANYRES64], 0xb8}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 1946.553743][T26269] loop4: detected capacity change from 0 to 16 05:43:07 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, r1, 0x1, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz1\x00'}}}}, 0x34}}, 0x0) 05:43:07 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000000000000000004dd6000000000a20000000000a010000000000000000000000001e0900010073797a300000000070000000120a0100001f34e47f5d4b0000000000040004800900020073797a30002e37000900010073797a3000000000080003400000000022000200b717fa41a1c9efdf68017165e8b182d9b7", @ANYRES64], 0xb8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, 0x0, 0x0) [ 1946.647917][ T26] audit: type=1800 audit(1634881387.626:3467): pid=26269 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="loop4" ino=131 res=0 errno=0 [ 1946.669017][ T26] audit: type=1800 audit(1634881387.636:3468): pid=26269 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="loop4" ino=131 res=0 errno=0 [ 1946.763236][ T26] audit: type=1800 audit(1634881387.666:3469): pid=26269 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="loop4" ino=131 res=0 errno=0 [ 1946.784862][ T26] audit: type=1800 audit(1634881387.676:3470): pid=26278 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="loop4" ino=131 res=0 errno=0 05:43:07 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f00000021c0)=[{{&(0x7f0000000180)=@caif=@dgm={0x25, 0x3}, 0x80, 0x0, 0x0, &(0x7f0000001800)=[{0x10}], 0x10}}], 0x1, 0x0) 05:43:07 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="71775736a2f1e050abd1810f58dd5fb09f41ceceb6f696a4b2a27c8c7c65815f784f0966cb01678fa25deecd2043474525af6cbe09707da25b2f436185522e8c2ebfb91afa17d6d41c4b6c22cdce478d2377bc2eada87b9b6331d1074b117e647296d1b84714cad4aee04613b047a617efc6a255dd95fba416bb75d6d3b669cb3d8fb39a2392c83e2cd3192ba4a1a111043c7476659956fd21fe68bfefab9c2c", 0xa0}, {&(0x7f0000000640)}], 0x2}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:43:07 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000040)=@framed={{}, [@map_val]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xc3, &(0x7f0000000280)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1946.877447][T26283] tipc: Enabling of bearer rejected, failed to enable media 05:43:07 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0'}, 0xb) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) [ 1946.937746][T26285] tipc: Enabling of bearer rejected, failed to enable media 05:43:08 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000000000000000004dd6000000000a20000000000a010000000000000000000000001e0900010073797a300000000070000000120a0100001f34e47f5d4b0000000000040004800900020073797a30002e37000900010073797a3000000000080003400000000022000200b717fa41a1c9efdf68017165e8b182d9b7", @ANYRES64], 0xb8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, 0x0, 0x0) 05:43:08 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000480)=@framed, &(0x7f0000000040)='GPL\x00', 0x5, 0xd2, &(0x7f0000000280)=""/210, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={@cgroup, r0}, 0x14) 05:43:08 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000180)={'wg0\x00', 0x0}) sendto$packet(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) 05:43:08 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0'}, 0xb) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) 05:43:08 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000000000000000004dd6000000000a20000000000a010000000000000000000000001e0900010073797a300000000070000000120a0100001f34e47f5d4b0000000000040004800900020073797a30002e37000900010073797a3000000000080003400000000022000200b717fa41a1c9efdf68017165e8b182d9b7", @ANYRES64], 0xb8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, 0x0, 0x0) 05:43:08 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff004000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000440)=ANY=[@ANYBLOB="3000000024005f870b0e00000000110000000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000c000100696e6772657373"], 0x30}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=@newtfilter={0x24, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x24}}, 0x0) 05:43:08 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{0x0}, {&(0x7f0000000640)}], 0x2}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:43:08 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)={'#! ', './file0'}, 0xb) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) 05:43:08 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000480)=@framed, &(0x7f0000000040)='GPL\x00', 0x5, 0xd2, &(0x7f0000000280)=""/210, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={@cgroup, r0}, 0x14) [ 1947.494659][T26311] __nla_validate_parse: 20 callbacks suppressed [ 1947.494682][T26311] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 05:43:08 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000000000000000004dd6000000000a20000000000a010000000000000000000000001e0900010073797a300000000070000000120a0100001f34e47f5d4b0000000000040004800900020073797a30002e37000900010073797a3000000000080003400000000022000200b717fa41a1c9efdf68017165e8b182d9b7", @ANYRES64], 0xb8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x8}, 0x0) 05:43:08 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)={'#! ', './file0'}, 0xb) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) 05:43:08 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{0x0}, {&(0x7f0000000640)}], 0x2}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:43:08 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0x0) chdir(&(0x7f0000000180)='./file0\x00') rmdir(&(0x7f0000000080)='./file0\x00') 05:43:08 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000480)=@framed, &(0x7f0000000040)='GPL\x00', 0x5, 0xd2, &(0x7f0000000280)=""/210, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={@cgroup, r0}, 0x14) [ 1947.787795][T26318] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 05:43:08 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff004000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000440)=ANY=[@ANYBLOB="3000000024005f870b0e00000000110000000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000c000100696e6772657373"], 0x30}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=@newtfilter={0x24, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x24}}, 0x0) [ 1947.946039][T26331] loop3: detected capacity change from 0 to 16 05:43:09 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000480)=@framed, &(0x7f0000000040)='GPL\x00', 0x5, 0xd2, &(0x7f0000000280)=""/210, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={@cgroup, r0}, 0x14) 05:43:09 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000000000000000004dd6000000000a20000000000a010000000000000000000000001e0900010073797a300000000070000000120a0100001f34e47f5d4b0000000000040004800900020073797a30002e37000900010073797a3000000000080003400000000022000200b717fa41a1c9efdf68017165e8b182d9b7", @ANYRES64], 0xb8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x8}, 0x0) 05:43:09 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)={'#! ', './file0'}, 0xb) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) 05:43:09 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{0x0}, {&(0x7f0000000640)}], 0x2}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:43:09 executing program 3: syz_io_uring_setup(0x8001, &(0x7f0000000200)={0x0, 0x809, 0x7e}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, 0x0) [ 1948.228261][T26342] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 05:43:09 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000000000000000004dd6000000000a20000000000a010000000000000000000000001e0900010073797a300000000070000000120a0100001f34e47f5d4b0000000000040004800900020073797a30002e37000900010073797a3000000000080003400000000022000200b717fa41a1c9efdf68017165e8b182d9b7", @ANYRES64], 0xb8}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x8}, 0x0) 05:43:09 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) write$uinput_user_dev(r0, 0x0, 0x0) 05:43:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff004000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000440)=ANY=[@ANYBLOB="3000000024005f870b0e00000000110000000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000c000100696e6772657373"], 0x30}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=@newtfilter={0x24, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x24}}, 0x0) 05:43:09 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) write$binfmt_script(r0, 0x0, 0x0) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) 05:43:09 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{0x0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:43:09 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendto$packet(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0xc) 05:43:09 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000001000), 0x210440, 0x0) [ 1948.676324][T26365] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 05:43:09 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) write$binfmt_script(r0, 0x0, 0x0) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) 05:43:09 executing program 4: r0 = syz_usb_connect(0x0, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000bc61b408b4070a0102010000000109022400010000005b090400000219a4b40009050e0200001f000009058202"], 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_connect(0x0, 0x0, 0x0, 0x0) syz_usb_connect$hid(0x0, 0x0, 0x0, 0x0) 05:43:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff004000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000440)=ANY=[@ANYBLOB="3000000024005f870b0e00000000110000000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000c000100696e6772657373"], 0x30}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=@newtfilter={0x24, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x24}}, 0x0) 05:43:09 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) [ 1949.051080][T26383] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 05:43:10 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{0x0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:43:10 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffff7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:43:10 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) write$binfmt_script(r0, 0x0, 0x0) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)) 05:43:10 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0), 0xc) recvmsg(0xffffffffffffffff, 0x0, 0x40030020) bpf$ITER_CREATE(0x21, &(0x7f000000fe40), 0x8) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002400)={0x0, 0x8, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000006fc0)={&(0x7f0000005b80), 0x6e, &(0x7f0000006e40)=[{&(0x7f0000005c00)=""/17, 0x11}, {&(0x7f0000005c40)=""/69, 0x45}, {&(0x7f0000005cc0)=""/178, 0xb2}, {&(0x7f0000005e40)=""/4096, 0x1000}], 0x4, &(0x7f0000006ec0)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x60}, 0x123) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000140)={0x100}, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000f40)=ANY=[@ANYBLOB="b7020000f53f0c10bfa300000000000024020000fffeff7f7a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2e640500000000007502faff07cd02020404000001007d60b7030000001000006a0a00fe000000008500000026000000b70000000000002995000000000000001da5ad3548ebb63d18db6a1c72821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c0ec908abb6e7325ec1956bd8664df3664148a2c96752fe2bb328dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8ef040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdb9a2eeb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b783ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb9f35e4f41a6211e52bb3598e9b5d4f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75bb32935f542127a8f84538a9a311c757f7169f006f3f5c95177fbd0b14b36259e2905ef911785c88a16aae46084d676d8ef8aa6ecc2d32e3f4ee367c5a769c0a606636c9f4a4413c098f4fcc96623b7c373b0ef04d55b846b094bf97e2ef5987b6e09a6a7cab79bffda141f65e7d9ebe3be70c4364333af9a9d91c3e41ac37a63f85ad8f32b70a80cce69df30d3d67d84ccf3f9db9b690111de2ddc4b153c989ef100bbf76063d3f6ffffb73d70e9c3d7b90aecf48e7565efff2dbbb512218c98442406333c890923a797e00b75481739952fe87fde27ce81893f54ec0ea8e792414f639bc9ce1fea3f6ac0d7025759d4b45577c205c70631e8ad585951950e521f4e210b6494e3c52d927195737945cc03d5668483151710de246420a1b6c55b73876a6ed7fd0d9338923789a1edcd8043fe83919088383268324a25df14010c8ed6b8d43400eaa00ff9bc46e1cfecbdc0e451ac53b409d04544d3a7edd4d447d2fb431e226ae182b8dcc86fe09b404e0b7c723d3b19c3dc382fa91fb0fb8f9f3f13296bb1758b24aad0922091d49e2bc408a5a37d2fe7a60b903d2d9fe9d451cafcc8dc389671c2d08b6e264150a6b9445b00cee4585af04fa69e0380be0d66649dcf3bf8a906b029faca75ce34c41aec7aa86e596119109ea8b3087301643baab1c95bb22cedd913b22dcaa197ccc34586dc50bd9f4628e3e757bae32e356521df06f995cb57f97052fc4158250ccecfb47ea8faf509593fadc7eafb613327b052397af1ede94d87590ce90a0a7579766f7ec4fcd3cb0b1a8c531724d5ef6b334803cedaa9cedf16dc3af6e0b67f62a83a256474c97c925d9d447175b535c87dbdeb0dcca5303eed6689ea91e1665c691df736368dde47e6672e93a314c5f60e7b68c2242bd0f0d8c66449d8687dcf2d0f76668b2b9bf8b32b99b7daf34b2d825d192ade90a1162acfe9749d516d014cef5f99126324ea02baea5808c4d69e5749901b09e4902a6f5addc0103756b894418e4591c624a9b2ccabbfb888d413d923b0d7c9d997d6d8e64787c4d397f57a15b6e0b4212b6cb55b9c207bbe08f483b1bea05f41b9a1d3af087047c568ae6ebfc0bb5ec10b6290dc757a4903a88fb2c035b2349b6d2f0c051b8b775152786118384eebd5fc19928ceb713ff09e179c308fbe9bd64374d96ef2447a2a4af5ca0c39e7ca2e801e57560a55e9cfa095cf3f74398219ad1030a79517a88de7596429a20793e12616aa32b3e720c6521fbe93963e9536d16f3db211fca7dd99c0a0125ff8c18119a6926083f4a2c008a9f2a29e30823bf0ec3639cadaf9be9608358e1e5ab17eea477b1754f78f45468c9568471667f82f5e250b979b9f2bd0d1b6bc03d11811ac6eec9a3ecd9e3c325fcabbab3d129c0cced3ce11dafa387a8077927a1ad367c114d0b423e64c6157fac5e4e2168f33541d56780000d0e488a78bef538f870b84798272b8101e0abf1cd64500b79e01d5bbe2e23d2f5ff10047423429981bd9b4ce680e174c266391e3e7699452654e5cd5ada6e025327a1942b5a068f15fa58eaa267d4e0881783dddbdd777f8be0824ffdf6d06c621880dbbbf4408784adee9534f15e8c2e364d3ec67cbb6ab9f2a0f03212972dbd3cc7fcc1808173553a67be48633103809eee0be51d67d7ce230b389607bbfc8270f52984abc1d665367dd4c3b18da1c48f3180f2e0d79e54565fdd9a099b5b5ba2761905b88b7cbfc39c35dd153609da3da263438f12769602c2195245ff83e249119d4f6cabfbdef84ada19ef4a67ed66d7043036515d0be5a231f99e71aba5d5ae04676eff3e85f0844c41bbcfde7a931d1ec55c01f703bfd1b97756bfe55a91f6b379f34a018906339771157c66dbd7471d1beec7f029ef552cf5e92a1a0db21b59355763967ce26a577bc514b6d22a09c385c5ba6caf524e1688fc0f29f8bb35ae7bc8eb5ba51aebdf7d972c3267cedbe77ed70d9c539bc455a6f88b39196c8a224b0ace5d796fea59a07baa34cc270fb096ef330fbebdf872d7d0bc4f9a963355c554abc5cdb91464faabcd09cd9a53f5d1b2ea7e96f428f7cd6735c19c61dc9942d30bf29ef85ed01c2fcd60642c21081e72bf536c70aa40eeff971477b4fde48507b7bad95a496540a4e2e903aae2aac6acd12c312dff7e4a72fd1f94d7c703ab1525c946c54e0da3d7ebfcc8cea2e84c3b310aaea5a1627df898c00a9aaf2d88a36afa4c5b181638431ebb00d6733125ad7f7970beeb256aec06e394e1d1dc5fea4b68a82dc568ca30aea9a1d097f00"/2010], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x143}, 0x48) 05:43:10 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNGETFEATURES(r0, 0x800454cf, 0x0) [ 1949.302472][ T3710] usb 5-1: new high-speed USB device number 37 using dummy_hcd 05:43:10 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{0x0}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:43:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) 05:43:10 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0'}, 0xb) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000180)) [ 1949.562618][ T3710] usb 5-1: Using ep0 maxpacket: 8 [ 1949.702778][ T3710] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0xE has invalid wMaxPacketSize 0 [ 1949.712915][ T3710] usb 5-1: config 0 interface 0 altsetting 0 bulk endpoint 0xE has invalid maxpacket 0 [ 1949.723035][ T3710] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x82 has invalid wMaxPacketSize 0 [ 1949.733016][ T3710] usb 5-1: config 0 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 0 [ 1949.742867][ T3710] usb 5-1: New USB device found, idVendor=07b4, idProduct=010a, bcdDevice= 1.02 [ 1949.751997][ T3710] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 05:43:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x108048, 0x0) [ 1950.063757][ T8901] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 1950.140549][ T3710] usb 5-1: config 0 descriptor?? [ 1950.184051][ T3710] ums-alauda 5-1:0.0: USB Mass Storage device detected [ 1950.224146][ T3710] scsi host1: usb-storage 5-1:0.0 [ 1951.279792][ T4020] scsi 1:0:0:0: Direct-Access Olympus MAUSB-10 (Alauda 0102 PQ: 0 ANSI: 0 CCS [ 1951.289915][ T4020] scsi 1:0:0:1: Direct-Access Olympus MAUSB-10 (Alauda 0102 PQ: 0 ANSI: 0 CCS [ 1951.323459][ T4020] sd 1:0:0:0: Attached scsi generic sg1 type 0 [ 1951.337561][ T9438] usb 5-1: USB disconnect, device number 37 [ 1951.354416][ T10] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 1951.365869][ T8901] sd 1:0:0:0: [sdb] Media removed, stopped polling [ 1951.394271][ T4020] sd 1:0:0:1: Attached scsi generic sg2 type 0 [ 1951.462876][ T8901] sd 1:0:0:0: [sdb] Attached SCSI removable disk [ 1951.489518][ T9754] sd 1:0:0:1: [sdc] Test Unit Ready failed: Result: hostbyte=DID_NO_CONNECT driverbyte=DRIVER_OK [ 1951.542820][ T9754] sd 1:0:0:1: [sdc] Read Capacity(10) failed: Result: hostbyte=DID_NO_CONNECT driverbyte=DRIVER_OK [ 1951.554202][ T9754] sd 1:0:0:1: [sdc] Sense not available. [ 1951.559900][ T9754] sd 1:0:0:1: [sdc] 0 512-byte logical blocks: (0 B/0 B) [ 1951.567484][ T9754] sd 1:0:0:1: [sdc] 0-byte physical blocks [ 1951.679215][ T9754] sd 1:0:0:1: [sdc] Test WP failed, assume Write Enabled [ 1951.710833][ T9754] sd 1:0:0:1: [sdc] Asking for cache data failed [ 1951.717654][ T9754] sd 1:0:0:1: [sdc] Assuming drive cache: write through [ 1951.788315][ T9754] sd 1:0:0:1: [sdc] Test Unit Ready failed: Result: hostbyte=DID_NO_CONNECT driverbyte=DRIVER_OK [ 1951.799978][ T9754] sd 1:0:0:1: [sdc] Read Capacity(10) failed: Result: hostbyte=DID_NO_CONNECT driverbyte=DRIVER_OK [ 1951.810807][ T9754] sd 1:0:0:1: [sdc] Sense not available. [ 1951.817847][ T9754] sd 1:0:0:1: [sdc] Attached SCSI removable disk [ 1951.852686][T26458] sd 1:0:0:1: [sdc] Test Unit Ready failed: Result: hostbyte=DID_NO_CONNECT driverbyte=DRIVER_OK [ 1952.241831][T26458] ================================================================== [ 1952.250404][T26458] BUG: KASAN: use-after-free in blk_mq_sched_tags_teardown+0x2a1/0x2d0 [ 1952.258659][T26458] Read of size 4 at addr ffff88809af5c1e0 by task systemd-udevd/26458 [ 1952.266807][T26458] [ 1952.269128][T26458] CPU: 0 PID: 26458 Comm: systemd-udevd Not tainted 5.15.0-rc6-next-20211021-syzkaller #0 [ 1952.279016][T26458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1952.289069][T26458] Call Trace: [ 1952.292344][T26458] [ 1952.295279][T26458] dump_stack_lvl+0xcd/0x134 [ 1952.299881][T26458] print_address_description.constprop.0.cold+0x8d/0x320 [ 1952.306963][T26458] ? blk_mq_sched_tags_teardown+0x2a1/0x2d0 [ 1952.312959][T26458] ? blk_mq_sched_tags_teardown+0x2a1/0x2d0 [ 1952.318848][T26458] kasan_report.cold+0x83/0xdf [ 1952.323616][T26458] ? blk_mq_sched_tags_teardown+0x2a1/0x2d0 [ 1952.329513][T26458] blk_mq_sched_tags_teardown+0x2a1/0x2d0 [ 1952.335243][T26458] ? dd_depth_updated+0x160/0x160 [ 1952.340355][T26458] blk_mq_exit_sched+0x21f/0x300 [ 1952.345298][T26458] ? lockdep_hardirqs_on+0x79/0x100 [ 1952.350522][T26458] __elevator_exit+0x28/0x40 [ 1952.355190][T26458] blk_release_queue+0x25c/0x490 [ 1952.360138][T26458] kobject_put+0x1c8/0x540 [ 1952.364776][T26458] disk_release+0x173/0x230 [ 1952.369280][T26458] ? block_uevent+0x80/0x80 [ 1952.373780][T26458] device_release+0x9f/0x240 [ 1952.378435][T26458] kobject_put+0x1c8/0x540 [ 1952.382856][T26458] put_device+0x1b/0x30 [ 1952.387022][T26458] blkdev_close+0x6a/0x80 [ 1952.391351][T26458] __fput+0x286/0x9f0 [ 1952.395335][T26458] ? blkdev_fsync+0xa0/0xa0 [ 1952.399858][T26458] task_work_run+0xdd/0x1a0 [ 1952.404373][T26458] exit_to_user_mode_prepare+0x27e/0x290 [ 1952.410008][T26458] syscall_exit_to_user_mode+0x19/0x60 [ 1952.415471][T26458] do_syscall_64+0x42/0xb0 [ 1952.419888][T26458] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1952.425792][T26458] RIP: 0033:0x7fd1239a5270 [ 1952.430204][T26458] Code: 73 01 c3 48 8b 0d 38 7d 20 00 f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 83 3d 59 c1 20 00 00 75 10 b8 03 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 ee fb ff ff 48 89 04 24 [ 1952.449815][T26458] RSP: 002b:00007ffd7bd2a228 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 1952.458228][T26458] RAX: 0000000000000000 RBX: 0000000000000007 RCX: 00007fd1239a5270 [ 1952.466194][T26458] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1952.474170][T26458] RBP: 00007fd12485f710 R08: 000055d3370a9490 R09: 000055d33709b100 [ 1952.482137][T26458] R10: 00007fd12485f8c0 R11: 0000000000000246 R12: 0000000000000000 [ 1952.490104][T26458] R13: 000055d33708c0e0 R14: 0000000000000003 R15: 000000000000000e [ 1952.498085][T26458] [ 1952.501096][T26458] [ 1952.503409][T26458] Allocated by task 3710: [ 1952.507725][T26458] kasan_save_stack+0x1e/0x50 [ 1952.512414][T26458] __kasan_kmalloc+0xa9/0xd0 [ 1952.517000][T26458] scsi_host_alloc+0x2c/0x1120 [ 1952.521829][T26458] usb_stor_probe1+0x45/0x162b [ 1952.526640][T26458] alauda_probe+0x89/0x1d0 [ 1952.531102][T26458] usb_probe_interface+0x315/0x7f0 [ 1952.536235][T26458] really_probe+0x245/0xcc0 [ 1952.540740][T26458] __driver_probe_device+0x338/0x4d0 [ 1952.546019][T26458] driver_probe_device+0x4c/0x1a0 [ 1952.551036][T26458] __device_attach_driver+0x20b/0x2f0 [ 1952.556404][T26458] bus_for_each_drv+0x15f/0x1e0 [ 1952.561247][T26458] __device_attach+0x228/0x4a0 [ 1952.566007][T26458] bus_probe_device+0x1e4/0x290 [ 1952.571024][T26458] device_add+0xc17/0x1ee0 [ 1952.575433][T26458] usb_set_configuration+0x101e/0x1900 [ 1952.580883][T26458] usb_generic_driver_probe+0xba/0x100 [ 1952.586385][T26458] usb_probe_device+0xd9/0x2c0 [ 1952.591143][T26458] really_probe+0x245/0xcc0 [ 1952.595650][T26458] __driver_probe_device+0x338/0x4d0 [ 1952.600930][T26458] driver_probe_device+0x4c/0x1a0 [ 1952.605961][T26458] __device_attach_driver+0x20b/0x2f0 [ 1952.611332][T26458] bus_for_each_drv+0x15f/0x1e0 [ 1952.616183][T26458] __device_attach+0x228/0x4a0 [ 1952.620940][T26458] bus_probe_device+0x1e4/0x290 [ 1952.625782][T26458] device_add+0xc17/0x1ee0 [ 1952.630197][T26458] usb_new_device.cold+0x63f/0x108e [ 1952.635410][T26458] hub_event+0x2357/0x4330 [ 1952.639822][T26458] process_one_work+0x9b2/0x1690 [ 1952.644757][T26458] worker_thread+0x658/0x11f0 [ 1952.649431][T26458] kthread+0x405/0x4f0 [ 1952.653493][T26458] ret_from_fork+0x1f/0x30 [ 1952.657923][T26458] [ 1952.660234][T26458] Freed by task 26458: [ 1952.664300][T26458] kasan_save_stack+0x1e/0x50 [ 1952.668984][T26458] kasan_set_track+0x21/0x30 [ 1952.673603][T26458] kasan_set_free_info+0x20/0x30 [ 1952.678548][T26458] __kasan_slab_free+0xff/0x130 [ 1952.683420][T26458] slab_free_freelist_hook+0x8b/0x1c0 [ 1952.688796][T26458] kfree+0xf6/0x560 [ 1952.692606][T26458] device_release+0x9f/0x240 [ 1952.697199][T26458] kobject_put+0x1c8/0x540 [ 1952.701616][T26458] put_device+0x1b/0x30 [ 1952.705769][T26458] device_release+0x9f/0x240 [ 1952.710359][T26458] kobject_put+0x1c8/0x540 [ 1952.714772][T26458] put_device+0x1b/0x30 [ 1952.718925][T26458] scsi_device_dev_release_usercontext+0x97e/0xdd0 [ 1952.725487][T26458] execute_in_process_context+0x37/0x150 [ 1952.731127][T26458] device_release+0x9f/0x240 [ 1952.735713][T26458] kobject_put+0x1c8/0x540 [ 1952.740130][T26458] put_device+0x1b/0x30 [ 1952.744283][T26458] scsi_device_put+0x74/0xa0 [ 1952.748866][T26458] sd_release+0x124/0x290 [ 1952.753246][T26458] blkdev_put+0x2fb/0x9e0 [ 1952.757570][T26458] blkdev_close+0x6a/0x80 [ 1952.761892][T26458] __fput+0x286/0x9f0 [ 1952.765865][T26458] task_work_run+0xdd/0x1a0 [ 1952.770362][T26458] exit_to_user_mode_prepare+0x27e/0x290 [ 1952.775989][T26458] syscall_exit_to_user_mode+0x19/0x60 [ 1952.781448][T26458] do_syscall_64+0x42/0xb0 [ 1952.785857][T26458] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1952.791761][T26458] [ 1952.794074][T26458] Last potentially related work creation: [ 1952.799772][T26458] kasan_save_stack+0x1e/0x50 [ 1952.804453][T26458] __kasan_record_aux_stack+0xf5/0x120 [ 1952.809909][T26458] insert_work+0x48/0x370 [ 1952.814239][T26458] __queue_work+0x5ca/0xf30 [ 1952.818740][T26458] call_timer_fn+0x1a5/0x6b0 [ 1952.823325][T26458] __run_timers.part.0+0x49f/0xa20 [ 1952.828434][T26458] run_timer_softirq+0xb3/0x1d0 [ 1952.833279][T26458] __do_softirq+0x29b/0x9c2 [ 1952.837790][T26458] [ 1952.840104][T26458] Second to last potentially related work creation: [ 1952.846672][T26458] kasan_save_stack+0x1e/0x50 [ 1952.851350][T26458] __kasan_record_aux_stack+0xf5/0x120 [ 1952.856806][T26458] insert_work+0x48/0x370 [ 1952.861144][T26458] __queue_work+0x5ca/0xf30 [ 1952.865646][T26458] queue_work_on+0xee/0x110 [ 1952.870148][T26458] sg_release+0x242/0x320 [ 1952.874474][T26458] __fput+0x286/0x9f0 [ 1952.878447][T26458] task_work_run+0xdd/0x1a0 [ 1952.882942][T26458] exit_to_user_mode_prepare+0x27e/0x290 [ 1952.888581][T26458] syscall_exit_to_user_mode+0x19/0x60 [ 1952.894045][T26458] do_syscall_64+0x42/0xb0 [ 1952.898456][T26458] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1952.904347][T26458] [ 1952.906667][T26458] The buggy address belongs to the object at ffff88809af5c000 [ 1952.906667][T26458] which belongs to the cache kmalloc-8k of size 8192 [ 1952.920710][T26458] The buggy address is located 480 bytes inside of [ 1952.920710][T26458] 8192-byte region [ffff88809af5c000, ffff88809af5e000) [ 1952.934077][T26458] The buggy address belongs to the page: [ 1952.939694][T26458] page:ffffea00026bd600 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x9af58 [ 1952.949839][T26458] head:ffffea00026bd600 order:3 compound_mapcount:0 compound_pincount:0 [ 1952.958153][T26458] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff) [ 1952.966136][T26458] raw: 00fff00000010200 ffffea0001edb800 dead000000000003 ffff888010c42280 [ 1952.974740][T26458] raw: 0000000000000000 0000000000020002 00000001ffffffff 0000000000000000 [ 1952.983325][T26458] page dumped because: kasan: bad access detected [ 1952.989730][T26458] page_owner tracks the page as allocated [ 1952.995435][T26458] page last allocated via order 3, migratetype Unmovable, gfp_mask 0x1d20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL), pid 20326, ts 1733715483087, free_ts 1733619694050 [ 1953.016362][T26458] get_page_from_freelist+0xa72/0x2f50 [ 1953.021849][T26458] __alloc_pages+0x1b2/0x500 [ 1953.026457][T26458] alloc_pages+0x1a7/0x300 [ 1953.030870][T26458] new_slab+0x32d/0x4a0 [ 1953.035018][T26458] ___slab_alloc+0x918/0xfe0 [ 1953.039617][T26458] __slab_alloc.constprop.0+0x4d/0xa0 [ 1953.044996][T26458] kmem_cache_alloc_trace+0x289/0x2c0 [ 1953.050384][T26458] ovs_dp_cmd_new+0x378/0xeb0 [ 1953.055148][T26458] genl_family_rcv_msg_doit+0x228/0x320 [ 1953.060727][T26458] genl_rcv_msg+0x328/0x580 [ 1953.065238][T26458] netlink_rcv_skb+0x153/0x420 [ 1953.069998][T26458] genl_rcv+0x24/0x40 [ 1953.073974][T26458] netlink_unicast+0x533/0x7d0 [ 1953.078733][T26458] netlink_sendmsg+0x86d/0xda0 [ 1953.083503][T26458] sock_sendmsg+0xcf/0x120 [ 1953.087917][T26458] ____sys_sendmsg+0x6e8/0x810 [ 1953.092685][T26458] page last free stack trace: [ 1953.097344][T26458] free_pcp_prepare+0x374/0x870 [ 1953.102201][T26458] free_unref_page+0x19/0x690 [ 1953.106887][T26458] __unfreeze_partials+0x343/0x360 [ 1953.111993][T26458] qlist_free_all+0x5a/0xc0 [ 1953.116495][T26458] kasan_quarantine_reduce+0x180/0x200 [ 1953.121953][T26458] __kasan_slab_alloc+0xa2/0xc0 [ 1953.126801][T26458] kmem_cache_alloc+0x202/0x3a0 [ 1953.131646][T26458] getname_flags.part.0+0x50/0x4f0 [ 1953.136762][T26458] getname+0x8e/0xd0 [ 1953.140651][T26458] do_sys_openat2+0xf5/0x4d0 [ 1953.145254][T26458] __x64_sys_openat+0x13f/0x1f0 [ 1953.150099][T26458] do_syscall_64+0x35/0xb0 [ 1953.154515][T26458] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1953.160407][T26458] [ 1953.162722][T26458] Memory state around the buggy address: [ 1953.168362][T26458] ffff88809af5c080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1953.176415][T26458] ffff88809af5c100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1953.184466][T26458] >ffff88809af5c180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1953.192512][T26458] ^ [ 1953.199695][T26458] ffff88809af5c200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1953.207834][T26458] ffff88809af5c280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1953.215884][T26458] ================================================================== [ 1953.223929][T26458] Disabling lock debugging due to kernel taint [ 1953.231044][T26458] Kernel panic - not syncing: panic_on_warn set ... [ 1953.237666][T26458] CPU: 0 PID: 26458 Comm: systemd-udevd Tainted: G B 5.15.0-rc6-next-20211021-syzkaller #0 [ 1953.248958][T26458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1953.259019][T26458] Call Trace: [ 1953.262301][T26458] [ 1953.265239][T26458] dump_stack_lvl+0xcd/0x134 [ 1953.269850][T26458] panic+0x2b0/0x6dd [ 1953.273792][T26458] ? __warn_printk+0xf3/0xf3 [ 1953.278399][T26458] ? blk_mq_sched_tags_teardown+0x2a1/0x2d0 [ 1953.284314][T26458] ? trace_hardirqs_on+0x38/0x1c0 [ 1953.289368][T26458] ? trace_hardirqs_on+0x51/0x1c0 [ 1953.294409][T26458] ? blk_mq_sched_tags_teardown+0x2a1/0x2d0 [ 1953.300312][T26458] ? blk_mq_sched_tags_teardown+0x2a1/0x2d0 [ 1953.306226][T26458] end_report.cold+0x63/0x6f [ 1953.310832][T26458] kasan_report.cold+0x71/0xdf [ 1953.315611][T26458] ? blk_mq_sched_tags_teardown+0x2a1/0x2d0 [ 1953.321538][T26458] blk_mq_sched_tags_teardown+0x2a1/0x2d0 [ 1953.327250][T26458] ? dd_depth_updated+0x160/0x160 [ 1953.332291][T26458] blk_mq_exit_sched+0x21f/0x300 [ 1953.337247][T26458] ? lockdep_hardirqs_on+0x79/0x100 [ 1953.342473][T26458] __elevator_exit+0x28/0x40 05:43:14 executing program 4: r0 = syz_usb_connect(0x0, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000bc61b408b4070a0102010000000109022400010000005b090400000219a4b40009050e0200001f000009058202"], 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_connect(0x0, 0x0, 0x0, 0x0) syz_usb_connect$hid(0x0, 0x0, 0x0, 0x0) 05:43:14 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0), 0xc) recvmsg(0xffffffffffffffff, 0x0, 0x40030020) bpf$ITER_CREATE(0x21, &(0x7f000000fe40), 0x8) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002400)={0x0, 0x8, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000006fc0)={&(0x7f0000005b80), 0x6e, &(0x7f0000006e40)=[{&(0x7f0000005c00)=""/17, 0x11}, {&(0x7f0000005c40)=""/69, 0x45}, {&(0x7f0000005cc0)=""/178, 0xb2}, {&(0x7f0000005e40)=""/4096, 0x1000}], 0x4, &(0x7f0000006ec0)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x60}, 0x123) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000140)={0x100}, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000f40)=ANY=[@ANYBLOB="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"/2010], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x143}, 0x48) 05:43:14 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x80a31095ed59702d}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000340)=@caif=@util={0x25, "45a0eaff409b5917bb51aa7640ec32ba"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)}, {0x0}, {&(0x7f0000000640)}], 0x3}, 0x40800) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x2001004, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file1\x00', 0x0, 0x200c, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280), 0x84010, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x4abf}}, {}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xfff}}], [{@obj_role={'obj_role', 0x3d, '^MAY_WRITE'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^)&!\x10\x02I'}}]}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xa02423, &(0x7f0000000580)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@uid_lt={'uid<', 0xee01}}, {@subj_type={'subj_type', 0x3d, '\xf7'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'smackfsfloor'}}, {@smackfshat={'smackfshat', 0x3d, '[+W{@\xba/%'}}, {@uid_lt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@euid_gt}]}) 05:43:14 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) 05:43:14 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) 05:43:14 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xdb8, 0x0, 0x0, 0x0, 0x0, "b0473019f75f3399ba084805d2d26ec6ce1bce"}) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0'}, 0xb) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000180)) [ 1953.347071][T26458] blk_release_queue+0x25c/0x490 [ 1953.352034][T26458] kobject_put+0x1c8/0x540 [ 1953.356484][T26458] disk_release+0x173/0x230 [ 1953.360996][T26458] ? block_uevent+0x80/0x80 [ 1953.365508][T26458] device_release+0x9f/0x240 [ 1953.370111][T26458] kobject_put+0x1c8/0x540 [ 1953.374542][T26458] put_device+0x1b/0x30 [ 1953.378712][T26458] blkdev_close+0x6a/0x80 [ 1953.383047][T26458] __fput+0x286/0x9f0 [ 1953.387030][T26458] ? blkdev_fsync+0xa0/0xa0 [ 1953.391548][T26458] task_work_run+0xdd/0x1a0 [ 1953.396064][T26458] exit_to_user_mode_prepare+0x27e/0x290 [ 1953.401709][T26458] syscall_exit_to_user_mode+0x19/0x60 [ 1953.407188][T26458] do_syscall_64+0x42/0xb0 [ 1953.411617][T26458] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1953.417519][T26458] RIP: 0033:0x7fd1239a5270 [ 1953.421938][T26458] Code: 73 01 c3 48 8b 0d 38 7d 20 00 f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 83 3d 59 c1 20 00 00 75 10 b8 03 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 ee fb ff ff 48 89 04 24 [ 1953.441556][T26458] RSP: 002b:00007ffd7bd2a228 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 1953.449982][T26458] RAX: 0000000000000000 RBX: 0000000000000007 RCX: 00007fd1239a5270 [ 1953.457963][T26458] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1953.465943][T26458] RBP: 00007fd12485f710 R08: 000055d3370a9490 R09: 000055d33709b100 [ 1953.473920][T26458] R10: 00007fd12485f8c0 R11: 0000000000000246 R12: 0000000000000000 [ 1953.481897][T26458] R13: 000055d33708c0e0 R14: 0000000000000003 R15: 000000000000000e [ 1953.489887][T26458] [ 1953.492982][T26458] Kernel Offset: disabled [ 1953.497294][T26458] Rebooting in 86400 seconds..